SlideShare a Scribd company logo
BODOLAND
UNIVERSITY
Department of Computer
Science And Technology
Bijay Kumar Singh
MCA 2nd Semester 2017
Roll No:01
CONTENTS
• Introduction: What is Darknet?
• Search Engine.
• Contents found on Darknet.
• Advantages of Darknet.
• Accessing the Darknet.
• How it works?
• Currency of Darknet.
• Top Threats of Darknet.
• Share of Darknet Contents
• Conclusion.
A Presentation on Darknet
What Is DarkNet ?
• Darknet also known as Deep Net / Hidden Web, is
an overlay of networks that can be accessed
through specific softwares, configurations or
Authorization.
• It is all the information that cannot be indexed
using general web search engines.
Search Engines
• Programs that search documents for specified
keywords or phrases and returns a list of
documents where the keywords are found.
• Examples are
In Simple words it can be said that, All pages that
are indexed by a search engine are the visible
web or the surface web, and what’s left of it or
which it can’t access is the Hidden Web,
DeepWeb or the Darknet.
Some experts estimate that as much as 96% of
the entire internet is invisible web content.
Content Found On The Darknet
• Webpages with no links on them, called
disconnected pages.
• Password protected webpages.
• Webpages generated from databases.
• Dynamically generated webpages.
• Real-time content.
• Webpages with non-html text, or any coding
that the program of a regular search engines
cannot understand.
Advantages Of Dark NeT
• Specialized content focus – large amounts of information focused
on an exact subject
• Contains information that might not be available on the visible
web
• Allows a user to find a precise answer to a specific question
• Allows a user to find webpages from a specific date or time.
• Provides Full Version Softwares
• Availability of Pro versions of Android and iOS Apps on Markets
like Blackmart
• Can aquire Banned Books and Applications
• Access to Documentaries Movies and Propaganda videos Banned
by Governments , even Youtube and Facebook is accessed in
Countries where they are banned eg: Pakistan, Iran Gambia ,China
etc.
Accessing the Darknet
Darknet Content can be accessed only through special
anonymizing software called TOR.
TOR Stands for The Onion Routing, it protects the user from
being traced, as the name suggests it has layers of bouncing
Addresses like layers of onion, so no one can either track the
user or can know easily what the user viewed, browsed or
even Purchased.
The Darknet is a Big Market for illegal goods, it can be
referred to as Chorbazar of Internet, and its market is so big
that Amazon and Alibaba Together will appear a Dwarf if
compared.
How IT works ?
Only Graphical Representation
Currency of the Deep Web
Bitcoins an electronic cash system using peer-to-peer
networking, digital signatures and cryptographic proof to enable
irreversible payments between parties without relying on trust.
Payments are issued and transferred by the Bitcoin network.
Participants begin using Bitcoin by first acquiring a Bitcoin wallet and
one or more Bitcoin addresses. Bitcoin addresses are used for receiving
Bitcoins, similar to how e-mail addresses are used for receiving e-mail.
In April 2014, 1 BTC traded at around $4.80 (288 INR). Taking into
account the total number of Bitcoins in circulation, the market
capitalization of the Bitcoin network stands at over 40 million USD (2400
INR)
Top Threats posesSed by DarkNet
Threat #1: Free entry for any cybercriminal
Anyone can choose to enter the darknet markets as a
cybercriminal. There is no bar and this has been made
largely possible with the expanding malware toolsets
now available for the newbie.
Threat #2: Drugs are available in plenty
It is estimated that over 50 percent of the darknet
markets that function using Tor offer narcotics for sale.
These are easily accessible and are sure to incite
interest among the ones that are ready to enter the
world of drugs and cybercrime.
Threat #3: No legislature in place for use of hidden
Threat #4: Cybercrime-Child Pornography
Though it is a fact that the financially and politiccally
motivated often are involved in blackmailing,their
actions are more challenging and they are harder to
control. And since there is no boundation or limitation
and certainly its impossible to impose censorship on
contents on web, hence the major source of
childpornography on the darkweb is the one of the
biggest problem that government all over the six
Continents are concerned about.
Threat #5: Seamless terrorism and
cybercrime
The spread of cybercrime is inevitable and is, of course,
hastened by the facilities provided by hidden services.
The year 2015 saw the globalization of crime. With
Child pornography
Drugs
Counterfeit goods
Hacking information
Politics
Hardware/Software
information
Art
Other/Unknown
Share of Darknet Contents
Conclusion
•Darknet is Mostly used for illegal activities, like
Purchasing of Drugs, Arms, Selling of confidential
Credential of hacked emails and other personal data.
•It is Heaven of Hackers one must always be very careful
while accessing the DarkNet, it is an ocean of Data with
tons of Phishers in it.
•Always be sure to have an authentic Netprotector while
browsing Darknet.
•If used safely and with the right intention it is an universe
of Knowledge, waiting to be explored.
Sources:
•Internet
•Digit Magazines and Russia Today
•Newspaper
Thank You

More Related Content

What's hot

Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
Anshu Prateek
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
MiteshWani
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
Khaled Sany
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
PraneshKulkarni22
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
Swecha | స్వేచ్ఛ
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
Md. Nazmus Shakib Robin
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
albafg55
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
Kenny Yu
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
Seth Porter, MA, MLIS
 
Dark wed
Dark wedDark wed
Dark wed
AraVind Pillai
 
The dark web
The dark webThe dark web
The dark web
Bella M
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
vinod kumar
 
Dark web
Dark webDark web
Dark web
aakshidhingra
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
Connor Willer
 
Osint
OsintOsint
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
Ali Saif Mirza
 
Deep web
Deep webDeep web
Deep web
Abu Kaisar
 
Darknet
DarknetDarknet
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
Paula Ripoll Cacho
 

What's hot (20)

Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
The dark web
The dark webThe dark web
The dark web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Dark wed
Dark wedDark wed
Dark wed
 
The dark web
The dark webThe dark web
The dark web
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Dark web
Dark webDark web
Dark web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Osint
OsintOsint
Osint
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Deep web
Deep webDeep web
Deep web
 
Darknet
DarknetDarknet
Darknet
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 

Similar to Darknet

Dw communication
Dw communicationDw communication
Dw communication
Arjun Chetry
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Geetha982072
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
eliofatjon
 
5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web
Amit Biwaal
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
Marlabs
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
Medina Núñez
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
Ali Shahbazi Khojasteh
 
Darknet (ec)
Darknet (ec) Darknet (ec)
Darknet (ec)
Bradley W. Deacon
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
Jayna Mistry
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
Muhammad Azeem Mazhar
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
IRJET Journal
 
Dark Web Site.pdf
Dark Web Site.pdfDark Web Site.pdf
Dark Web Site.pdf
DarkWebLink1
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
Srinivas Kanakala
 
What Is Dark Web.docx
What Is Dark Web.docxWhat Is Dark Web.docx
What Is Dark Web.docx
RoshniChauhan24
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
IbrahimSami14
 
Dark Net
Dark NetDark Net
Dark Net
Riya V
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
Apostolos Syropoulos
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
Shubh Thakkar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 

Similar to Darknet (20)

Dw communication
Dw communicationDw communication
Dw communication
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Darknet (ec)
Darknet (ec) Darknet (ec)
Darknet (ec)
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
 
Dark Web Site.pdf
Dark Web Site.pdfDark Web Site.pdf
Dark Web Site.pdf
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
What Is Dark Web.docx
What Is Dark Web.docxWhat Is Dark Web.docx
What Is Dark Web.docx
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
 
Dark Net
Dark NetDark Net
Dark Net
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Recently uploaded

一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 

Recently uploaded (20)

一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 

Darknet

  • 1. BODOLAND UNIVERSITY Department of Computer Science And Technology Bijay Kumar Singh MCA 2nd Semester 2017 Roll No:01
  • 2. CONTENTS • Introduction: What is Darknet? • Search Engine. • Contents found on Darknet. • Advantages of Darknet. • Accessing the Darknet. • How it works? • Currency of Darknet. • Top Threats of Darknet. • Share of Darknet Contents • Conclusion. A Presentation on Darknet
  • 3. What Is DarkNet ? • Darknet also known as Deep Net / Hidden Web, is an overlay of networks that can be accessed through specific softwares, configurations or Authorization. • It is all the information that cannot be indexed using general web search engines.
  • 4. Search Engines • Programs that search documents for specified keywords or phrases and returns a list of documents where the keywords are found. • Examples are
  • 5. In Simple words it can be said that, All pages that are indexed by a search engine are the visible web or the surface web, and what’s left of it or which it can’t access is the Hidden Web, DeepWeb or the Darknet.
  • 6. Some experts estimate that as much as 96% of the entire internet is invisible web content.
  • 7. Content Found On The Darknet • Webpages with no links on them, called disconnected pages. • Password protected webpages. • Webpages generated from databases. • Dynamically generated webpages. • Real-time content. • Webpages with non-html text, or any coding that the program of a regular search engines cannot understand.
  • 8.
  • 9. Advantages Of Dark NeT • Specialized content focus – large amounts of information focused on an exact subject • Contains information that might not be available on the visible web • Allows a user to find a precise answer to a specific question • Allows a user to find webpages from a specific date or time. • Provides Full Version Softwares • Availability of Pro versions of Android and iOS Apps on Markets like Blackmart • Can aquire Banned Books and Applications • Access to Documentaries Movies and Propaganda videos Banned by Governments , even Youtube and Facebook is accessed in Countries where they are banned eg: Pakistan, Iran Gambia ,China etc.
  • 10. Accessing the Darknet Darknet Content can be accessed only through special anonymizing software called TOR. TOR Stands for The Onion Routing, it protects the user from being traced, as the name suggests it has layers of bouncing Addresses like layers of onion, so no one can either track the user or can know easily what the user viewed, browsed or even Purchased. The Darknet is a Big Market for illegal goods, it can be referred to as Chorbazar of Internet, and its market is so big that Amazon and Alibaba Together will appear a Dwarf if compared.
  • 11. How IT works ? Only Graphical Representation
  • 12. Currency of the Deep Web Bitcoins an electronic cash system using peer-to-peer networking, digital signatures and cryptographic proof to enable irreversible payments between parties without relying on trust. Payments are issued and transferred by the Bitcoin network. Participants begin using Bitcoin by first acquiring a Bitcoin wallet and one or more Bitcoin addresses. Bitcoin addresses are used for receiving Bitcoins, similar to how e-mail addresses are used for receiving e-mail. In April 2014, 1 BTC traded at around $4.80 (288 INR). Taking into account the total number of Bitcoins in circulation, the market capitalization of the Bitcoin network stands at over 40 million USD (2400 INR)
  • 13. Top Threats posesSed by DarkNet Threat #1: Free entry for any cybercriminal Anyone can choose to enter the darknet markets as a cybercriminal. There is no bar and this has been made largely possible with the expanding malware toolsets now available for the newbie. Threat #2: Drugs are available in plenty It is estimated that over 50 percent of the darknet markets that function using Tor offer narcotics for sale. These are easily accessible and are sure to incite interest among the ones that are ready to enter the world of drugs and cybercrime. Threat #3: No legislature in place for use of hidden
  • 14. Threat #4: Cybercrime-Child Pornography Though it is a fact that the financially and politiccally motivated often are involved in blackmailing,their actions are more challenging and they are harder to control. And since there is no boundation or limitation and certainly its impossible to impose censorship on contents on web, hence the major source of childpornography on the darkweb is the one of the biggest problem that government all over the six Continents are concerned about. Threat #5: Seamless terrorism and cybercrime The spread of cybercrime is inevitable and is, of course, hastened by the facilities provided by hidden services. The year 2015 saw the globalization of crime. With
  • 15. Child pornography Drugs Counterfeit goods Hacking information Politics Hardware/Software information Art Other/Unknown Share of Darknet Contents
  • 16. Conclusion •Darknet is Mostly used for illegal activities, like Purchasing of Drugs, Arms, Selling of confidential Credential of hacked emails and other personal data. •It is Heaven of Hackers one must always be very careful while accessing the DarkNet, it is an ocean of Data with tons of Phishers in it. •Always be sure to have an authentic Netprotector while browsing Darknet. •If used safely and with the right intention it is an universe of Knowledge, waiting to be explored.
  • 17. Sources: •Internet •Digit Magazines and Russia Today •Newspaper

Editor's Notes

  1. Bijay Kumar Singh MCA 2nd Semester Roll No:01