SlideShare a Scribd company logo
How The Silk Road 2.0 Started
Silk Road is an online market that is worked as a Tor
(The Orange Router) hidden service in which clients
can browse namelessly without being checked.
Besides it being normally known for drug
trafficking, it also deals with different things like
books, art, digital devices, apparel and different
sorts of materials. Taking after the conclusion of the
Silk Road by the Federal Government, there has
been a presentation of the Silk Road 2.0, an
untouchable site.
The Closure of Silk Road
Ross William Ulbricht, the claimed holder of Silkroad who
masked himself as Dread Pirate Roberts', as indicated by the
FBI, was captured on the 2nd of October 2013. He was
associated with trafficking drugs, facilitating computer
hacking, money laundering and soliciting murder.
The Federal Bureau of Investigation held more than 26,000
BTC from the Silkroad accounts that were approximated to
cost around 3.6 million dollars. 144,000 BTC that were
worth around 28 million were seized and it was accepted
that they were possessed by Ulbricht.
The Rebirth
Because of the always developing Technology, the
Silk Road 2.0 started to be on the 6th of November,
2013 and was under the control of Dread Pirate
Roberts. The system revamped the starting point
website's expense and it guaranteed to upgrade its
security. The holder took safety measure of
supplying encrypted duplicates of the source of the
site so as to give it a chance to be made effortlessly
in the event that it is closed down once more.
The Silk Road 2.0 utilizes the anonymity tool Tor along
with the crypto-currency Bitcoin that shields the
personality of the clients. There is likewise another
security characteristic which lets the clients utilize their
PGP encryption key to play as a validation act. An
amazing characteristic is the login page of the site
which is a spoof of the seizure of the first site by the
Department of Justice.
Since the shutdown of the first Silk Road, it just took
the system somewhat over a month to launch the new
site that is named “the dim web” that recorded a listing
of very nearly 500 unlawful drugs.
The Silk Road 2.0 Operation
It was proclaimed on the 20th of December, 2013
that 3 suspected Silk Road overseers have been
captured. Around the three, two of them were
Gary Davis and Andrew Michael Jones named as
“Libertas” and “Inigo” in the site admin section.
Throughout this period, the new Dread Pirate
Roberts out of the blue surrendered the control of
the site and solidified all the exercises on it
together with its escrow system.
Another acting administrator utilizing the screen
name Defcon took its control and pledged to
restore the site. However, in February thirteenth,
2014, Defcon reported that the escrow accounts on
the site had been interfered through the
defenselessness in Britcoin's system called the
Transaction Malleability. The site stayed dynamic,
however bitcoins in the escrow accounts that were
worth 2.7 million dollars were accounted for to
have been stolen. It is accepted that the records
were hacked and individuals stole the bitcoins from
the unacknowledged online commercial center,
which brought about a huge misfortune of the
framework altogether.
The Silk Road 2.0 is as of now running, yet it is not
as dynamic as it used to be in its resurrection and
throughout the original website era. Visit this link
http://silkroaddrugs.org/

More Related Content

Viewers also liked

Demlink Travel presentation
Demlink Travel presentationDemlink Travel presentation
Demlink Travel presentationdemlink
 
Group 2 halo halo bandung (indonesian telecommunication condition today)
Group 2 halo halo bandung (indonesian telecommunication condition today)Group 2 halo halo bandung (indonesian telecommunication condition today)
Group 2 halo halo bandung (indonesian telecommunication condition today)Marthin Rajagukguk
 
Cost concept and design economics
Cost concept and design economicsCost concept and design economics
Cost concept and design economicsMarthin Rajagukguk
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion routerAshly Liza
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymityanurag singh
 
Deep Web
Deep WebDeep Web
Deep WebSt John
 

Viewers also liked (11)

Demlink Travel presentation
Demlink Travel presentationDemlink Travel presentation
Demlink Travel presentation
 
Group 2 halo halo bandung (indonesian telecommunication condition today)
Group 2 halo halo bandung (indonesian telecommunication condition today)Group 2 halo halo bandung (indonesian telecommunication condition today)
Group 2 halo halo bandung (indonesian telecommunication condition today)
 
Cost concept and design economics
Cost concept and design economicsCost concept and design economics
Cost concept and design economics
 
Evaluasi Strategi
Evaluasi StrategiEvaluasi Strategi
Evaluasi Strategi
 
Tor the onion router
Tor  the onion routerTor  the onion router
Tor the onion router
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Onion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and AnonymityOnion routing and tor: Fundamentals and Anonymity
Onion routing and tor: Fundamentals and Anonymity
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Deep web
Deep webDeep web
Deep web
 
Tor Presentation
Tor PresentationTor Presentation
Tor Presentation
 
Deep Web
Deep WebDeep Web
Deep Web
 

Recently uploaded

Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxabhinandnam9997
 
Case study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxCase study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxAnkitscribd
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresencePC Doctors NET
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfappinfoedgeca
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?Linksys Velop Login
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfOndejSur
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理aagad
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkklolsDocherty
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideVarun Mithran
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyDamar Juniarto
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxChloeMeadows1
 

Recently uploaded (14)

Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
Case study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptxCase study on merger of Vodafone and Idea (VI).pptx
Case study on merger of Vodafone and Idea (VI).pptx
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 

How The Silk Road 2.0 Started

  • 1. How The Silk Road 2.0 Started
  • 2. Silk Road is an online market that is worked as a Tor (The Orange Router) hidden service in which clients can browse namelessly without being checked. Besides it being normally known for drug trafficking, it also deals with different things like books, art, digital devices, apparel and different sorts of materials. Taking after the conclusion of the Silk Road by the Federal Government, there has been a presentation of the Silk Road 2.0, an untouchable site.
  • 3. The Closure of Silk Road Ross William Ulbricht, the claimed holder of Silkroad who masked himself as Dread Pirate Roberts', as indicated by the FBI, was captured on the 2nd of October 2013. He was associated with trafficking drugs, facilitating computer hacking, money laundering and soliciting murder. The Federal Bureau of Investigation held more than 26,000 BTC from the Silkroad accounts that were approximated to cost around 3.6 million dollars. 144,000 BTC that were worth around 28 million were seized and it was accepted that they were possessed by Ulbricht.
  • 4. The Rebirth Because of the always developing Technology, the Silk Road 2.0 started to be on the 6th of November, 2013 and was under the control of Dread Pirate Roberts. The system revamped the starting point website's expense and it guaranteed to upgrade its security. The holder took safety measure of supplying encrypted duplicates of the source of the site so as to give it a chance to be made effortlessly in the event that it is closed down once more.
  • 5. The Silk Road 2.0 utilizes the anonymity tool Tor along with the crypto-currency Bitcoin that shields the personality of the clients. There is likewise another security characteristic which lets the clients utilize their PGP encryption key to play as a validation act. An amazing characteristic is the login page of the site which is a spoof of the seizure of the first site by the Department of Justice. Since the shutdown of the first Silk Road, it just took the system somewhat over a month to launch the new site that is named “the dim web” that recorded a listing of very nearly 500 unlawful drugs.
  • 6. The Silk Road 2.0 Operation It was proclaimed on the 20th of December, 2013 that 3 suspected Silk Road overseers have been captured. Around the three, two of them were Gary Davis and Andrew Michael Jones named as “Libertas” and “Inigo” in the site admin section. Throughout this period, the new Dread Pirate Roberts out of the blue surrendered the control of the site and solidified all the exercises on it together with its escrow system.
  • 7. Another acting administrator utilizing the screen name Defcon took its control and pledged to restore the site. However, in February thirteenth, 2014, Defcon reported that the escrow accounts on the site had been interfered through the defenselessness in Britcoin's system called the Transaction Malleability. The site stayed dynamic, however bitcoins in the escrow accounts that were worth 2.7 million dollars were accounted for to have been stolen. It is accepted that the records were hacked and individuals stole the bitcoins from the unacknowledged online commercial center, which brought about a huge misfortune of the framework altogether.
  • 8. The Silk Road 2.0 is as of now running, yet it is not as dynamic as it used to be in its resurrection and throughout the original website era. Visit this link http://silkroaddrugs.org/