SlideShare a Scribd company logo

Dark Web and Privacy

Presentation with @JustinDenton (http://www.slideshare.net/JustinDenton)

1 of 44
Download to read offline
The Dark Web and Privacy
Who’s Speaking?
• President & Chief Education Officer, LibChalk
• Director of Strategic Innovation, Evolve Project
• Manager of the Personal Support Center, Collegis Education
Brian is a presenter, a collaborator, an innovator, and a
technology expert/trend spotter. Brian is able to provide
technology audits, make library design recommendations, and
provide solutions to problems all with an effective cost strategy.
Justin DentonBrian Pichman
• President & Chief Innovation Officer, Libchalk
• Director of the Personal Support Center, Collegis Education
Justin Denton is a driven new technology adopter that utilizes
his vast experience within the technology industry to implement
and manage solutions based environments. Driven by the
passion to learn Justin also co-focuses on developmental
learning activities through his efforts as Faculty Member and
Leader.
The Dark Web and Privacy
• The term the dark web is often used - but what does it mean? While
its often associated with the under-belly of the Internet. It goes
beyond the under-belly and can provide resources to protect your
users privacy.
• In this session, we will explore:
• The origins of the Dark Web
• Anonymous Browsing tools like the Tor Project
• Navigating the Dark Web - Including the pitfalls
• Explore tools hackers use to exploit companies and us
• Whether you plan to implement new tools at your library or educate
your users - this workshop will help you become knowledgeable on
the Dark Web.
Disclaimer
• Technology is inherently neutral.
• It can be used by bad people to bad things
• It can be used by good people to do good things.
• This presentation is provided for informational and technical training
purposes only.
• It is intended to familiarize you with some of the methods, tools, and
services used to provide Internet anonymity.
• It may, at times, “pull back the veil” and offer a look at the other side
of the Internet.
• We do not encourage or support using the information presented in
this session for illegal or unethical purposes.
Agenda
• WHAT? Dial-up!
• How DEEP can you get?
• Cloak of Invisibility
• How to navigate and prevent wrong turns
• Tools to become a hacker
Dark Web and Privacy

Recommended

The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
 

More Related Content

What's hot

What's hot (20)

Dark wed
Dark wedDark wed
Dark wed
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
 
The dark web
The dark webThe dark web
The dark web
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Dark web
Dark webDark web
Dark web
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
The dark web
The dark webThe dark web
The dark web
 
Deep web
Deep webDeep web
Deep web
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
dark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfdark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdf
 
Dark Web
Dark WebDark Web
Dark Web
 
PPT dark web
PPT dark webPPT dark web
PPT dark web
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
ABOUT DARK WEB
ABOUT DARK WEB ABOUT DARK WEB
ABOUT DARK WEB
 

Viewers also liked

The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
 
Deep Web
Deep WebDeep Web
Deep WebSt John
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsAndres Baravalle
 
Designing Interactive Learning Spaces
Designing Interactive Learning Spaces Designing Interactive Learning Spaces
Designing Interactive Learning Spaces Brian Pichman
 
Programming Ideas in Makerspaces
Programming Ideas in MakerspacesProgramming Ideas in Makerspaces
Programming Ideas in MakerspacesBrian Pichman
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine ImpasClaudine Impas
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?Mark Fisher
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark WebJohn Liu
 
How to Insert your Library into the mobile sharing economy
How to Insert your Library into the mobile sharing economyHow to Insert your Library into the mobile sharing economy
How to Insert your Library into the mobile sharing economyJustin Denton
 
7 Programación Web con .NET y C#
7 Programación Web con .NET y C#7 Programación Web con .NET y C#
7 Programación Web con .NET y C#guidotic
 

Viewers also liked (18)

The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
Deep Web & Dark Web
Deep Web & Dark WebDeep Web & Dark Web
Deep Web & Dark Web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developments
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Designing Interactive Learning Spaces
Designing Interactive Learning Spaces Designing Interactive Learning Spaces
Designing Interactive Learning Spaces
 
Programming Ideas in Makerspaces
Programming Ideas in MakerspacesProgramming Ideas in Makerspaces
Programming Ideas in Makerspaces
 
Programming ideas
Programming ideasProgramming ideas
Programming ideas
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?How Much is My Information Worth on the Dark Web?
How Much is My Information Worth on the Dark Web?
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Deep web
Deep webDeep web
Deep web
 
How to Insert your Library into the mobile sharing economy
How to Insert your Library into the mobile sharing economyHow to Insert your Library into the mobile sharing economy
How to Insert your Library into the mobile sharing economy
 
7 Programación Web con .NET y C#
7 Programación Web con .NET y C#7 Programación Web con .NET y C#
7 Programación Web con .NET y C#
 
setting goals
setting goals setting goals
setting goals
 

Similar to Dark Web and Privacy

Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) WebJeroen Baert
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR BrowserArjith K Raj
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed webNitish Joshi
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark WebTom Kranz
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingSamip Shah
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012inf8nity
 
Dark Side of the Net Lecture 1 Introduction
Dark Side of the Net Lecture 1 IntroductionDark Side of the Net Lecture 1 Introduction
Dark Side of the Net Lecture 1 IntroductionMarcus Leaning
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Andrew Schwabe
 

Similar to Dark Web and Privacy (20)

Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
 
Deep Web
Deep WebDeep Web
Deep Web
 
Darknet
DarknetDarknet
Darknet
 
Dark Net
Dark NetDark Net
Dark Net
 
Darknet
DarknetDarknet
Darknet
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Dark net
Dark netDark net
Dark net
 
Cyber crime &_info_security
Cyber crime &_info_securityCyber crime &_info_security
Cyber crime &_info_security
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Dark net (escalona)
Dark net (escalona)Dark net (escalona)
Dark net (escalona)
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Surfing with Sharks KS ED TECH 2012
Surfing with Sharks   KS ED TECH 2012Surfing with Sharks   KS ED TECH 2012
Surfing with Sharks KS ED TECH 2012
 
Dark Side of the Net Lecture 1 Introduction
Dark Side of the Net Lecture 1 IntroductionDark Side of the Net Lecture 1 Introduction
Dark Side of the Net Lecture 1 Introduction
 
Darknet (ec)
Darknet (ec) Darknet (ec)
Darknet (ec)
 
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
Reigning in the Data (FOSSCON 2014) - Ephemeral Messaging and Privacy In Post...
 

More from Brian Pichman

AI tools in Scholarly Research and Publishing
AI tools in Scholarly Research and PublishingAI tools in Scholarly Research and Publishing
AI tools in Scholarly Research and PublishingBrian Pichman
 
Tech Trends 2024 and Beyond - AI and VR and MOre
Tech Trends 2024 and Beyond - AI and VR and MOreTech Trends 2024 and Beyond - AI and VR and MOre
Tech Trends 2024 and Beyond - AI and VR and MOreBrian Pichman
 
Content Creation and Social Media Tools for Libraries
Content Creation and Social Media Tools for LibrariesContent Creation and Social Media Tools for Libraries
Content Creation and Social Media Tools for LibrariesBrian Pichman
 
Artificial Intelligence (AI) – Powering Data and Conversations.pptx
Artificial Intelligence (AI) – Powering Data and Conversations.pptxArtificial Intelligence (AI) – Powering Data and Conversations.pptx
Artificial Intelligence (AI) – Powering Data and Conversations.pptxBrian Pichman
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
NCompass Live: AI: The Modern Day Pandora's Box
NCompass Live: AI: The Modern Day Pandora's BoxNCompass Live: AI: The Modern Day Pandora's Box
NCompass Live: AI: The Modern Day Pandora's BoxBrian Pichman
 
Lets Chat AI - and Not Just ChatGPT
Lets Chat AI - and Not Just ChatGPTLets Chat AI - and Not Just ChatGPT
Lets Chat AI - and Not Just ChatGPTBrian Pichman
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Lets Chat AI – And Not Just ChatGPT
Lets Chat AI – And Not Just ChatGPTLets Chat AI – And Not Just ChatGPT
Lets Chat AI – And Not Just ChatGPTBrian Pichman
 
STEM Programming Ideas at the Library.pdf
STEM Programming Ideas at the Library.pdfSTEM Programming Ideas at the Library.pdf
STEM Programming Ideas at the Library.pdfBrian Pichman
 
Getting Started With Using AI In Libraries (PLAN)
Getting Started With Using AI In Libraries (PLAN)Getting Started With Using AI In Libraries (PLAN)
Getting Started With Using AI In Libraries (PLAN)Brian Pichman
 
Coding with Maker Tech
   Coding with Maker Tech   Coding with Maker Tech
Coding with Maker TechBrian Pichman
 
Innovation and Libraries Building a Collaborative Learning Ecosystem.pptx
Innovation and Libraries Building a Collaborative Learning Ecosystem.pptxInnovation and Libraries Building a Collaborative Learning Ecosystem.pptx
Innovation and Libraries Building a Collaborative Learning Ecosystem.pptxBrian Pichman
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
AI for Beginners - SWFLN Makerpalooza - Session 1
AI for Beginners - SWFLN Makerpalooza - Session 1AI for Beginners - SWFLN Makerpalooza - Session 1
AI for Beginners - SWFLN Makerpalooza - Session 1Brian Pichman
 
Developing a Coding Program for Users - SWFLN Makerpalooza - Session 4
Developing a Coding Program for Users  - SWFLN Makerpalooza - Session 4Developing a Coding Program for Users  - SWFLN Makerpalooza - Session 4
Developing a Coding Program for Users - SWFLN Makerpalooza - Session 4Brian Pichman
 
Using AI at the Library - SWFLN Makerpalooza - Session 2
Using AI at the Library  - SWFLN Makerpalooza - Session 2Using AI at the Library  - SWFLN Makerpalooza - Session 2
Using AI at the Library - SWFLN Makerpalooza - Session 2Brian Pichman
 

More from Brian Pichman (20)

AI tools in Scholarly Research and Publishing
AI tools in Scholarly Research and PublishingAI tools in Scholarly Research and Publishing
AI tools in Scholarly Research and Publishing
 
Tech Trends 2024 and Beyond - AI and VR and MOre
Tech Trends 2024 and Beyond - AI and VR and MOreTech Trends 2024 and Beyond - AI and VR and MOre
Tech Trends 2024 and Beyond - AI and VR and MOre
 
Content Creation and Social Media Tools for Libraries
Content Creation and Social Media Tools for LibrariesContent Creation and Social Media Tools for Libraries
Content Creation and Social Media Tools for Libraries
 
Artificial Intelligence (AI) – Powering Data and Conversations.pptx
Artificial Intelligence (AI) – Powering Data and Conversations.pptxArtificial Intelligence (AI) – Powering Data and Conversations.pptx
Artificial Intelligence (AI) – Powering Data and Conversations.pptx
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
40 Day Challenge
40 Day Challenge40 Day Challenge
40 Day Challenge
 
NCompass Live: AI: The Modern Day Pandora's Box
NCompass Live: AI: The Modern Day Pandora's BoxNCompass Live: AI: The Modern Day Pandora's Box
NCompass Live: AI: The Modern Day Pandora's Box
 
Lets Chat AI - and Not Just ChatGPT
Lets Chat AI - and Not Just ChatGPTLets Chat AI - and Not Just ChatGPT
Lets Chat AI - and Not Just ChatGPT
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
CES 2023
CES 2023CES 2023
CES 2023
 
Lets Chat AI – And Not Just ChatGPT
Lets Chat AI – And Not Just ChatGPTLets Chat AI – And Not Just ChatGPT
Lets Chat AI – And Not Just ChatGPT
 
STEM Programming Ideas at the Library.pdf
STEM Programming Ideas at the Library.pdfSTEM Programming Ideas at the Library.pdf
STEM Programming Ideas at the Library.pdf
 
Getting Started With Using AI In Libraries (PLAN)
Getting Started With Using AI In Libraries (PLAN)Getting Started With Using AI In Libraries (PLAN)
Getting Started With Using AI In Libraries (PLAN)
 
Coding with Maker Tech
   Coding with Maker Tech   Coding with Maker Tech
Coding with Maker Tech
 
CES 2023
CES 2023CES 2023
CES 2023
 
Innovation and Libraries Building a Collaborative Learning Ecosystem.pptx
Innovation and Libraries Building a Collaborative Learning Ecosystem.pptxInnovation and Libraries Building a Collaborative Learning Ecosystem.pptx
Innovation and Libraries Building a Collaborative Learning Ecosystem.pptx
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
AI for Beginners - SWFLN Makerpalooza - Session 1
AI for Beginners - SWFLN Makerpalooza - Session 1AI for Beginners - SWFLN Makerpalooza - Session 1
AI for Beginners - SWFLN Makerpalooza - Session 1
 
Developing a Coding Program for Users - SWFLN Makerpalooza - Session 4
Developing a Coding Program for Users  - SWFLN Makerpalooza - Session 4Developing a Coding Program for Users  - SWFLN Makerpalooza - Session 4
Developing a Coding Program for Users - SWFLN Makerpalooza - Session 4
 
Using AI at the Library - SWFLN Makerpalooza - Session 2
Using AI at the Library  - SWFLN Makerpalooza - Session 2Using AI at the Library  - SWFLN Makerpalooza - Session 2
Using AI at the Library - SWFLN Makerpalooza - Session 2
 

Recently uploaded

DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
Elevate Your Business: Unleashing Collaboration and Efficiency through Expert...
Elevate Your Business: Unleashing Collaboration and Efficiency through Expert...Elevate Your Business: Unleashing Collaboration and Efficiency through Expert...
Elevate Your Business: Unleashing Collaboration and Efficiency through Expert...Prometix Pty Ltd
 
Regulation is Coming - Trusted Media Summit 2023
Regulation is Coming - Trusted Media Summit 2023Regulation is Coming - Trusted Media Summit 2023
Regulation is Coming - Trusted Media Summit 2023Damar Juniarto
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPTBiometrics Technology Intresting PPT
Biometrics Technology Intresting PPTPraveenKumarThota7
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
Model Jaringan network jaringan komputer.pdf
Model Jaringan network jaringan komputer.pdfModel Jaringan network jaringan komputer.pdf
Model Jaringan network jaringan komputer.pdfgalfinprihardiputra0
 

Recently uploaded (6)

DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
Elevate Your Business: Unleashing Collaboration and Efficiency through Expert...
Elevate Your Business: Unleashing Collaboration and Efficiency through Expert...Elevate Your Business: Unleashing Collaboration and Efficiency through Expert...
Elevate Your Business: Unleashing Collaboration and Efficiency through Expert...
 
Regulation is Coming - Trusted Media Summit 2023
Regulation is Coming - Trusted Media Summit 2023Regulation is Coming - Trusted Media Summit 2023
Regulation is Coming - Trusted Media Summit 2023
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPTBiometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
Model Jaringan network jaringan komputer.pdf
Model Jaringan network jaringan komputer.pdfModel Jaringan network jaringan komputer.pdf
Model Jaringan network jaringan komputer.pdf
 

Dark Web and Privacy

  • 1. The Dark Web and Privacy
  • 2. Who’s Speaking? • President & Chief Education Officer, LibChalk • Director of Strategic Innovation, Evolve Project • Manager of the Personal Support Center, Collegis Education Brian is a presenter, a collaborator, an innovator, and a technology expert/trend spotter. Brian is able to provide technology audits, make library design recommendations, and provide solutions to problems all with an effective cost strategy. Justin DentonBrian Pichman • President & Chief Innovation Officer, Libchalk • Director of the Personal Support Center, Collegis Education Justin Denton is a driven new technology adopter that utilizes his vast experience within the technology industry to implement and manage solutions based environments. Driven by the passion to learn Justin also co-focuses on developmental learning activities through his efforts as Faculty Member and Leader.
  • 3. The Dark Web and Privacy • The term the dark web is often used - but what does it mean? While its often associated with the under-belly of the Internet. It goes beyond the under-belly and can provide resources to protect your users privacy. • In this session, we will explore: • The origins of the Dark Web • Anonymous Browsing tools like the Tor Project • Navigating the Dark Web - Including the pitfalls • Explore tools hackers use to exploit companies and us • Whether you plan to implement new tools at your library or educate your users - this workshop will help you become knowledgeable on the Dark Web.
  • 4. Disclaimer • Technology is inherently neutral. • It can be used by bad people to bad things • It can be used by good people to do good things. • This presentation is provided for informational and technical training purposes only. • It is intended to familiarize you with some of the methods, tools, and services used to provide Internet anonymity. • It may, at times, “pull back the veil” and offer a look at the other side of the Internet. • We do not encourage or support using the information presented in this session for illegal or unethical purposes.
  • 5. Agenda • WHAT? Dial-up! • How DEEP can you get? • Cloak of Invisibility • How to navigate and prevent wrong turns • Tools to become a hacker
  • 7. WHAT? Dial-up! How the movement started? (Dial-up and BBS’s) – The REAL History!
  • 8. WHAT? Dial-up! • Originated back in the 80’s as computers entered many peoples homes. • Computer + Modem + Boredom = FUN! • Users collaborated over Bulletin Board Systems
  • 9. WHAT? Dial-up! • Users on BBS’s then wanted to meet in person • The “User Group” was spawned. • AKA – Hacker Groups Spawned right after. • The “Anti-User Group”. • And they wanted there own place to meet.
  • 10. WHAT? Dial-up! • User groups spawned collective thinking/planning • Competitions ensued • Who gets Bragging Rights? • Post back to BBS • Competition spawned teams • Teams worked to find flaws • Individuals exposed flaws for fun/personal gain
  • 11. WHAT? Dial-up! • Hacking goes Mainstream with larger Internet Providers • Service oriented “Annoyance Tools” recruited more people. • https://en.wikipedia.org/wiki/AOHell • The existence of software like AOHell provided a sort of parallel 'lite' version of the hacker underground that had existed for years before, based around bulletin board systems.
  • 12. WHAT? Broadband! • Hacking has evolved because of Social Media • Core values haven’t changed • But Social websites have pushed this Hacktivism to the mainstream. • The news keeps covering to drive more awareness.
  • 13. WHAT? Broadband! • Social media continues to draw awareness & new recruits • Mainstream is for show • Dark Web is for go
  • 14. WHAT? Broadband! • With Social Media & a new found Cause, “Hacktivism” • Born in the era of the Internet • Rooted in Hacker Culture/Ethics with ties related to Free Speech, Human Rights, and Freedom of Information. • Cyber attacks ensue • Most with a purpose • Some for fun • Minimal for Personal Gain
  • 15. How DEEP can you get? Deep/Dark Web – Hacker BBS’s Evolved
  • 16. Surface Web, Deep Web, Dark Web • The Deep Web is anything a search engine can’t find. • Search Engines use links to “crawl” the internet. • Within the Deep Web is the Dark Web which requires special software or network configurations, and access rights in order to access. • The Dark Web is a small portion of the Deep Web
  • 17. Onion Routing, Tor Browsing • Technique for anonymous communication to take place over a network. The encryption takes place at three different times: • Entry Node • Relay Node • Exit Node • Tor is made up of volunteers running relay servers. No single router knows the entire network (only its to and from). • Tor can bypass internet content filtering, restricted government networks (like China) or allow people to be anonymous whistle blowers. • Tor allows you to gain access to “.onion” websites that are not accessible via a normal web browser. • Communication on the Dark Web happens, via Web, Telnet, IRC, and other means of communication being developed daily.
  • 18. Some History • Originally grew with help from the U.S. Military as a way to communicate without detection. • In 1995 the concept of “onion routing” was born. • The Deep Web was coined in 2001 by BrightPlanet which specializes in locating content within the dark web. • In 2004 the U.S. Naval Research Lab released the Tor code to the public, and in 2006 it was retooled as the Tor Project.
  • 19. The Silk Road • Former Online Black Market the first “darknet” market for selling illegal drugs. • Launched in February 2011 where users had to purchase an account through an auction and later would be set at fixed fees. • October 2013 the site was shutdown by the FBI after arresting the hacker named “Dread Pirate Roberts” (Ross William Ulbricht). One month later the site resurfaced but was shut down again.
  • 20. Operation Onymous • International law enforcement operation targeting over 400 darknet markets on the Tor network that sold drugs, money laundering, and other contraband.
  • 21. Cloak of Invisibility Anonymous Browsing tools like the Tor Project
  • 22. Cloak of Invisibility Top reasons why people want to hide their IP address: 1. Hide their geographical location 2. Prevent Web tracking 3. Avoid leaving a digital footprint 4. Bypass any bans or blacklisting of their IP address 5. Perform illegal acts without being detected
  • 23. Cloak of Invisibility How do you Hide an 800lb Gorilla? • Use Free Wifi (To Hide your location) • Use a Secure Web Browser • Use a Private VPN • Go back to Dial-up • Setup RF Data Transfer over CB Radio Waves • Use Kali linux to hack someone else’s Wifi Encryption. • Setup long-range Wireless Antennas
  • 24. Cloak of Invisibility • How to hide yourself? • Private VPN • You want a TOTALLY anonymous service. • Look for one that keeps no log history (Verify via reviews) • Look at Bandwidth & Available Servers • Recommendations: • Private Internet Access (PIA) • TorGuard VPN • Pure VPN • Opera Web Browser • Avast AntiVirus (SecureLine) • Worst Case: Free WIFI
  • 25. Cloak of Invisibility • How Tor anonymizes – “You”. • How VPN keeps ”You” protected.
  • 26. How to navigate and prevent wrong turns Navigating the Dark Web - Including the pitfalls
  • 27. How to navigate and prevent wrong turns • Who are the people we’re trying to void? Hacker Groups • Lizard Squad. ... • Anonymous. ... • LulzSec. ... • Syrian Electronic Army. ... • Chaos Computer Club (CCC) ... • Iran's Tarh Andishan. ... • The Level Seven Crew. ... • globalHell.
  • 28. Using a VPN Client
  • 29. Normal Users and How They Appear:
  • 34. Tools to become a hacker Explore tools hackers use to exploit companies and us
  • 35. How do you Hide an 800lb Gorilla? • TorBrowser • Mainstream browser that helps gain access to a private collection of websites and servers. This runs on a separate, “Parallel Universe” on the Internet. • IRC • Typical way to communicate, its been around since the 80’s. • Telnet to a BBS • Bulletin Board Systems never died. They just got modernized! • Kodi • Leverage tools for your entertainment.
  • 36. Tools to become a hacker • Get a router that allows for VPN at the router • Install a second VPN Client on the PC • Use Tor Browser for Browsing • Access Kodi • Use other tools form this point • Keeps everything anonymized
  • 37. Tools to become a hacker • The Basics. • Social Engineering • Get a Voice that’s not behind a computer. • Write a Batch File • Odd, but Windows still has DOS hidden underneath
  • 38. Top Hacker Tools • #1 Metasploit. • #2 Nmap. • #3 Acunetix WVS. • #4 Wireshark. • #5 oclHashcat. ... • #6 Nessus Vulnerability Scanner. ... • #7 Maltego. ... • #8 Social-Engineer Toolkit.
  • 39. BackTrack can get you ALOT • BackTrack was a Linux distribution that focused on security based on the Knoppix Linux distribution aimed at digital forensics and penetration testing use. In March 2013, the Offensive Security team rebuilt BackTrack around the Debian distribution and released it under the name Kali Linux. https://en.wikipedia.org/wiki/BackTrack
  • 40. More Sources • https://www.reddit.com/r/deepweb/ • DuckDuckGo.Com doesn’t track searches • Also lets you search of .onion sites when using TorBrowser to access.
  • 44. • President & Chief Education Officer, LibChalk • https://www.linkedin.com/in/bpichman • Twitter: @bpichman Justin DentonBrian Pichman • President & Chief Innovation Officer, Libchalk • https://www.linkedin.com/in/justindenton1 • Twitter: @cyberdenton How to contact us?

Editor's Notes

  1. Hacking originated back in the 80’s computers finally started to enter homes in masses.
  2. BBS kind of like an Old Age Twitter but the user groups were smaller Talk to how some of these groups were more social and spent some time online and sometime in person and during in person activities got into things like Social Engineering and Anarchist activities.
  3. Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer hacker and DIY media organization founded in 1984 in Lubbock, Texas. The group maintains a weblog on its site, also titled "Cult of the Dead Cow". New media are released first through the blog, which also features thoughts and opinions of the group's members. The term was coined in 1994 by a Cult of the Dead Cow (cDc) member known as "Omega" in an e-mail to the group.[2][3] Due to the variety of meanings of its root words, hacktivism is sometimes ambiguous and there exists significant disagreement over the kinds of activities and purposes it encompasses. Some definitions include acts of cyberterrorism while others simply reaffirm the use of technological hacking to effect social change.[ https://en.wikipedia.org/wiki/Hacktivism
  4. http://www.pcmag.com/article2/0,2817,2403388,00.asp
  5. These are also the people that use TorBrowser as well to hide themselves
  6. https://en.wikipedia.org/wiki/BackTrack
  7. https://en.wikipedia.org/wiki/BackTrack
  8. https://en.wikipedia.org/wiki/BackTrack
  9. https://en.wikipedia.org/wiki/BackTrack