SlideShare a Scribd company logo
DARK WEB
DARK WEB
DARK WEB
A SECRET WORLD
1
1
1 2
2
2
3
3
3 4
4
4
TODAY'S AGENDA
TODAY'S AGENDA
TODAY'S AGENDA
INTRODUCTION TYPES OF WEB
TOR BROWSER
5
RISKY CONTENTS THAT
FOUND IN DARK WEB
6 LEGAL ACTIONS
7
DANGERS OF THE DARK WEB TO
USERS
CONCLUSION
8
CASE LAW
Tomas and Chloe
INTRODUCTION
INTRODUCTION
INTRODUCTION
The dark web, also known as the
darknet, makes up a large portion of
the internet.
The Dark Web contains information
that is not searchable using the
traditional search engines such as
google,yahoo,etc.
Deep net, Invicible web or Hidden web,
Under net.
TYPES OF WEB
TYPES OF WEB
TYPES OF WEB
1. SURFACE WEB: It includes websites, web pages, and other online
content that can be easily accessed through search engines like
Google, Yahoo, and Bing.
2. DEEP WEB: This is the part of the internet that is not indexed by
search engines and is hidden from public view. It includes websites
and online content that require authentication, such as email
accounts, online banking, and social media profiles.
3. DARK WEB: The dark web is known for hosting illegal activities, such
as drug trafficking, weapons sales, and human trafficking, but it can also
be used for legitimate purposes such as anonymous communication and
protecting privacy in countries with oppressive governments or
surveillance.
TOR is software that installs into your browser and sets up
the specific connections you need to access Dark Web
sites.
This helps to the users to hide their locations.
The IP address of the site cannot be identified, hiding
information about its host, location or content .
Instead of seeing Domains that end in .com or .org, these
hidden sites end in .onion.
It was originally developed by the U.S. Naval Research
Laboratory in the mid-1990s and later released as a free
software project.
THE ONION ROUTER (TOR)
THE ONION ROUTER (TOR)
THE ONION ROUTER (TOR)
1. HiddenWiki
2. TorDir
3. deepweblinks.org
4. http://2vlqpcqpjlhmd5r2.onion/ - Gateway to Freenet
5. http://wiki5kauuihowqi5.onion/ - Onion Wiki
Some common sites to walk in the tor
network.
RISKY CONTENTS THAT ARE FOUND
RISKY CONTENTS THAT ARE FOUND
RISKY CONTENTS THAT ARE FOUND
IN DARK WEB
IN DARK WEB
IN DARK WEB
1. ILLEGAL GOODS AND SERVICES: The dark web is known for hosting marketplaces where
users can buy and sell illegal goods and services, such as drugs, weapons, counterfeit
documents, stolen credit card information, and hacking tools.
2. ADULT CONTENT: There are also sites on the dark web that host adult content, including
pornography and extreme or illegal forms of pornography.
3. POLITICAL AND EXTREMIST CONTENT: The dark web is often used by individuals and
groups to share and promote extremist ideologies and political agendas.
4. WHISTLEBLOWER SITES: There are sites on the dark web that allow individuals to
anonymously report illegal or unethical activities, often targeted at governments or
corporations.
5. ANONYMOUS COMMUNICATION: The dark web is also used by individuals who want to
communicate anonymously, such as journalists, activists, and whistleblowers.
1. ILLEGAL ACTIVITIES: The dark web is often associated with illegal activities, including drug
trafficking, human trafficking, weapon sales, and other criminal enterprises. Engaging in such
activities can lead to legal troubles and even physical harm.
2. MALWARE AND VIRUSES: Dark web sites can contain malware and viruses that can infect a
user's computer or device, potentially leading to data theft, identity theft, or financial fraud.
3. SCAMS AND FRAUDS: Many sites on the dark wb are scams, designed to trick users into
giving up personal information or money. These scams can be difficult to identify and can
lead to financial losses.
4. CYBER ATTACKS: The dark web is a haven for hackers and cybercriminals, who may use it to
launch attacks on individuals, businesses, and governments.
5. VIOLENT CONTENT: The dark web can also contain content related to extremist ideologies,
violent acts, and other dangerous material. Exposing oneself to such content can have
negative psychological effects.
DANGERS OF
DANGERS OF
DANGERS OF DARK WEB TO USERS
DARK WEB TO USERS
DARK WEB TO USERS
1. The Information Technology (IT) Act, 2000 is the
primary law that deals with cybercrime in India.
2. Section 66 of the IT Act deals with computer-related offenses, including
unauthorized access, damage to computer systems, and hacking.
3. Section 67 of the IT Act deals with the publishing or transmission of
obscene material in electronic form, including through the dark web.
4. The penalties for these offenses can vary depending
on the severity of the crime and the jurisdiction.
LEGAL ACTIONS
LEGAL ACTIONS
LEGAL ACTIONS
Silk Road was an online marketplace on the dark web that
Ross Ulbricht created the Silk Road website in 2011.
Silk Road used the Tor network to anonymize user activity and make it difficult for
law enforcement to track.
"Dread Pirate Roberts" was the online pseudonym used by Ross Ulbricht.
In 2013, the FBI shut down the Silk Road website and arrested Ulbricht.
operated from 2011 to 2013, where users could buy and sell illegal
drugs, fake IDs, and other illegal items.
CASE
CASE
CASE LAWS
LAWS
LAWS
THE SILK ROAD CASE
The dark web is a part of the internet that is not easily accessible
and is often associated with illegal activities. While it does have
legitimate uses, individuals who use the dark web for illegal
purposes can face severe legal consequences. Law enforcement
agencies around the world are working to combat criminal activity
on the dark web, but the anonymous nature of the network makes it
challenging to identify and prosecute those involved. It is important
for individuals to be aware of the risks associated with the dark web
and to take steps to protect themselves online.
CONCLUSION
CONCLUSION
CONCLUSION
THANK
THANK
THANK
YOU
YOU
YOU
A VENKATA SAI
VU22LAWS0200036

More Related Content

What's hot

Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
Adityakumar Yadav
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
Cysinfo Cyber Security Community
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
vinod kumar
 
PPT dark web
PPT dark webPPT dark web
PPT dark web
jitiyaashwin
 
Dark web
Dark webDark web
Dark web
Safwan Hashmi
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
MiteshWani
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
albafg55
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
Brian Pichman
 
Dark wed
Dark wedDark wed
Dark wed
AraVind Pillai
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
To Mal
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNetJames Bollen
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
Jspider - Noida
 
Dark web
Dark webDark web
Dark web
aakshidhingra
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
Khaled Sany
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
Kenny Yu
 
Darkweb
DarkwebDarkweb
Darkweb
CHANDRESH PAL
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
Md. Nazmus Shakib Robin
 
Deep web
Deep webDeep web
Deep web
Abu Kaisar
 

What's hot (20)

Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
PPT dark web
PPT dark webPPT dark web
PPT dark web
 
Dark web
Dark webDark web
Dark web
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Dark wed
Dark wedDark wed
Dark wed
 
The dark web
The dark webThe dark web
The dark web
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Dark web
Dark webDark web
Dark web
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
 
Darkweb
DarkwebDarkweb
Darkweb
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
Deep web
Deep webDeep web
Deep web
 

Similar to ABOUT DARK WEB

darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Geetha982072
 
Dark Web
Dark WebDark Web
Dark Web
KunalDas889957
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
eliofatjon
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
Ali Shahbazi Khojasteh
 
5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web
Amit Biwaal
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic Se
OllieShoresna
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Auto Parts Wholesale Online
 
Godfather 2.0
Godfather 2.0Godfather 2.0
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Auto Parts Wholesale Online
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
Ahmed Mater
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Auto Parts Wholesale Online
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
Shubh Thakkar
 
Dark Net
Dark NetDark Net
Dark Net
Riya V
 
Deep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfDeep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdf
kabirhasan11
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh
 
Deep web
Deep webDeep web
Deep web
GauravPandey319
 

Similar to ABOUT DARK WEB (20)

darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Dark Web
Dark WebDark Web
Dark Web
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic Se
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
 
Godfather 2.0
Godfather 2.0Godfather 2.0
Godfather 2.0
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Dark Net
Dark NetDark Net
Dark Net
 
Deep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfDeep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdf
 
Deep web
Deep webDeep web
Deep web
 
Ecommer
Ecommer Ecommer
Ecommer
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Ecommer
Ecommer Ecommer
Ecommer
 
Deep web
Deep webDeep web
Deep web
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 

ABOUT DARK WEB

  • 1. DARK WEB DARK WEB DARK WEB A SECRET WORLD
  • 2. 1 1 1 2 2 2 3 3 3 4 4 4 TODAY'S AGENDA TODAY'S AGENDA TODAY'S AGENDA INTRODUCTION TYPES OF WEB TOR BROWSER 5 RISKY CONTENTS THAT FOUND IN DARK WEB 6 LEGAL ACTIONS 7 DANGERS OF THE DARK WEB TO USERS CONCLUSION 8 CASE LAW
  • 3. Tomas and Chloe INTRODUCTION INTRODUCTION INTRODUCTION The dark web, also known as the darknet, makes up a large portion of the internet. The Dark Web contains information that is not searchable using the traditional search engines such as google,yahoo,etc. Deep net, Invicible web or Hidden web, Under net.
  • 4. TYPES OF WEB TYPES OF WEB TYPES OF WEB 1. SURFACE WEB: It includes websites, web pages, and other online content that can be easily accessed through search engines like Google, Yahoo, and Bing. 2. DEEP WEB: This is the part of the internet that is not indexed by search engines and is hidden from public view. It includes websites and online content that require authentication, such as email accounts, online banking, and social media profiles. 3. DARK WEB: The dark web is known for hosting illegal activities, such as drug trafficking, weapons sales, and human trafficking, but it can also be used for legitimate purposes such as anonymous communication and protecting privacy in countries with oppressive governments or surveillance.
  • 5. TOR is software that installs into your browser and sets up the specific connections you need to access Dark Web sites. This helps to the users to hide their locations. The IP address of the site cannot be identified, hiding information about its host, location or content . Instead of seeing Domains that end in .com or .org, these hidden sites end in .onion. It was originally developed by the U.S. Naval Research Laboratory in the mid-1990s and later released as a free software project. THE ONION ROUTER (TOR) THE ONION ROUTER (TOR) THE ONION ROUTER (TOR)
  • 6. 1. HiddenWiki 2. TorDir 3. deepweblinks.org 4. http://2vlqpcqpjlhmd5r2.onion/ - Gateway to Freenet 5. http://wiki5kauuihowqi5.onion/ - Onion Wiki Some common sites to walk in the tor network.
  • 7. RISKY CONTENTS THAT ARE FOUND RISKY CONTENTS THAT ARE FOUND RISKY CONTENTS THAT ARE FOUND IN DARK WEB IN DARK WEB IN DARK WEB 1. ILLEGAL GOODS AND SERVICES: The dark web is known for hosting marketplaces where users can buy and sell illegal goods and services, such as drugs, weapons, counterfeit documents, stolen credit card information, and hacking tools. 2. ADULT CONTENT: There are also sites on the dark web that host adult content, including pornography and extreme or illegal forms of pornography. 3. POLITICAL AND EXTREMIST CONTENT: The dark web is often used by individuals and groups to share and promote extremist ideologies and political agendas. 4. WHISTLEBLOWER SITES: There are sites on the dark web that allow individuals to anonymously report illegal or unethical activities, often targeted at governments or corporations. 5. ANONYMOUS COMMUNICATION: The dark web is also used by individuals who want to communicate anonymously, such as journalists, activists, and whistleblowers.
  • 8. 1. ILLEGAL ACTIVITIES: The dark web is often associated with illegal activities, including drug trafficking, human trafficking, weapon sales, and other criminal enterprises. Engaging in such activities can lead to legal troubles and even physical harm. 2. MALWARE AND VIRUSES: Dark web sites can contain malware and viruses that can infect a user's computer or device, potentially leading to data theft, identity theft, or financial fraud. 3. SCAMS AND FRAUDS: Many sites on the dark wb are scams, designed to trick users into giving up personal information or money. These scams can be difficult to identify and can lead to financial losses. 4. CYBER ATTACKS: The dark web is a haven for hackers and cybercriminals, who may use it to launch attacks on individuals, businesses, and governments. 5. VIOLENT CONTENT: The dark web can also contain content related to extremist ideologies, violent acts, and other dangerous material. Exposing oneself to such content can have negative psychological effects. DANGERS OF DANGERS OF DANGERS OF DARK WEB TO USERS DARK WEB TO USERS DARK WEB TO USERS
  • 9. 1. The Information Technology (IT) Act, 2000 is the primary law that deals with cybercrime in India. 2. Section 66 of the IT Act deals with computer-related offenses, including unauthorized access, damage to computer systems, and hacking. 3. Section 67 of the IT Act deals with the publishing or transmission of obscene material in electronic form, including through the dark web. 4. The penalties for these offenses can vary depending on the severity of the crime and the jurisdiction. LEGAL ACTIONS LEGAL ACTIONS LEGAL ACTIONS
  • 10. Silk Road was an online marketplace on the dark web that Ross Ulbricht created the Silk Road website in 2011. Silk Road used the Tor network to anonymize user activity and make it difficult for law enforcement to track. "Dread Pirate Roberts" was the online pseudonym used by Ross Ulbricht. In 2013, the FBI shut down the Silk Road website and arrested Ulbricht. operated from 2011 to 2013, where users could buy and sell illegal drugs, fake IDs, and other illegal items. CASE CASE CASE LAWS LAWS LAWS THE SILK ROAD CASE
  • 11. The dark web is a part of the internet that is not easily accessible and is often associated with illegal activities. While it does have legitimate uses, individuals who use the dark web for illegal purposes can face severe legal consequences. Law enforcement agencies around the world are working to combat criminal activity on the dark web, but the anonymous nature of the network makes it challenging to identify and prosecute those involved. It is important for individuals to be aware of the risks associated with the dark web and to take steps to protect themselves online. CONCLUSION CONCLUSION CONCLUSION