SlideShare a Scribd company logo
Cuartero, John Brian D.

DARKNET: THE OTHER SIDE
 A place in the internet where people can

be anonymous and hidden from the usual
search engines.
The Internet
 The Visible
 This is what most people visit and use.

 Example of these websites are:
 Facebook, Google, Yahoo, Twitter, etc.

 The Invisible
 Information that are not for public consumption
 Websites that hide from authority (Illegal Markets)
The Internet Iceberg
 The invisible web

does not
necessarily mean
that it is
something bad.
 There are just
cases that it is
used for a purpose
that is not ethical
or moral
The Bad Side of the Darknet
 There are sites

like Silk Road that
sell drugs,
weaponry and
other things that
are not available
normally since
they are
dangerous for the
society.
Effects on e-commerce
 There might be a small effect on e-commerce

knowing that legal businesses won’t need to
go in the deep web to sell.
 The only businesses that go underground are

those who need to hide something or illegal.
What will happen in the next
2 years?
 The founder of Silk Road was just recently

caught. There might be an increase in
aggressiveness shutting down these hidden
illegal websites.
 Simultaneously, other people who actively

use the deep web for illegal activities will try
to open up new markets and at the same time
The e-commerce boom
 Business transactions online will become more
normal and people will become less concerned in

putting up their information in the internet
because the generation who consumes products
have more knowledge regarding technology and
basically the norm.
 Traditional businesses will have to add an online
facility to cope up with the competitors that
utilize the opportunities that is the web
availability or presence of a product.

More Related Content

What's hot

Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Law
blaine_5
 
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan HeuerYour Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Univention GmbH
 
2008 07-20 Google China.turnoy
2008 07-20 Google China.turnoy2008 07-20 Google China.turnoy
2008 07-20 Google China.turnoy
Sharon Turnoy, Senior Communications Manager
 
Darkside
DarksideDarkside
Darkside
Kenie Moses
 
Online defamation
Online defamationOnline defamation
Online defamation
Apostolos Syropoulos
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
jcullishpum
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
DaliahSaper
 
Misuse of internet - ppt
Misuse of internet - pptMisuse of internet - ppt
Misuse of internet - ppt
Jincy24
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcRay Brannon
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual Property
PrimumMarketing
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
opeyemiatilola1992
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)
kmcintire84
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevarajessica97
 
Blog Law
Blog LawBlog Law
Blog Law
Brett Atwood
 
SOPA
SOPASOPA
SOPA
TylerWen
 
Online Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent ItOnline Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent It
bglover136
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
REVULN
 
Gloria flores
Gloria floresGloria flores
Gloria floresyaya700
 

What's hot (20)

Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Law
 
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan HeuerYour Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
 
2008 07-20 Google China.turnoy
2008 07-20 Google China.turnoy2008 07-20 Google China.turnoy
2008 07-20 Google China.turnoy
 
Darkside
DarksideDarkside
Darkside
 
Online defamation
Online defamationOnline defamation
Online defamation
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Misuse of internet - ppt
Misuse of internet - pptMisuse of internet - ppt
Misuse of internet - ppt
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual Property
 
Forbidden Fruit
Forbidden FruitForbidden Fruit
Forbidden Fruit
 
Allan Watt
Allan WattAllan Watt
Allan Watt
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevara
 
Blog Law
Blog LawBlog Law
Blog Law
 
SOPA
SOPASOPA
SOPA
 
Online Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent ItOnline Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent It
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
Gloria flores
Gloria floresGloria flores
Gloria flores
 

Viewers also liked

Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
Ahmed Mater
 
日本刀
日本刀日本刀
日本刀
Abraham Wong
 
Drugs & tthe Dark Net
Drugs & tthe Dark NetDrugs & tthe Dark Net
Drugs & tthe Dark Net
Tim Bingham
 
Darknet (ec)
Darknet (ec) Darknet (ec)
Darknet (ec)
Bradley W. Deacon
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
Manabu Kobayashi
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
Swecha | స్వేచ్ఛ
 
Ceramic Bearing ppt
Ceramic Bearing pptCeramic Bearing ppt
Ceramic Bearing ppt
Seminar Links
 
Deep Web
Deep WebDeep Web
Deep WebSt John
 

Viewers also liked (10)

Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
日本刀
日本刀日本刀
日本刀
 
Drugs & tthe Dark Net
Drugs & tthe Dark NetDrugs & tthe Dark Net
Drugs & tthe Dark Net
 
Darknet (ec)
Darknet (ec) Darknet (ec)
Darknet (ec)
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Darknet
DarknetDarknet
Darknet
 
Deep web
Deep webDeep web
Deep web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Ceramic Bearing ppt
Ceramic Bearing pptCeramic Bearing ppt
Ceramic Bearing ppt
 
Deep Web
Deep WebDeep Web
Deep Web
 

Similar to Darknet: The Other Side

ABOUT DARK WEB
ABOUT DARK WEB ABOUT DARK WEB
ABOUT DARK WEB
VenkatVs7
 
5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web
Amit Biwaal
 
Deep web
Deep webDeep web
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic Se
OllieShoresna
 
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
helzerpatrina
 
Legal, Ethical and Societal Issues in Media and Information
Legal, Ethical and Societal Issues in Media and Information Legal, Ethical and Societal Issues in Media and Information
Legal, Ethical and Societal Issues in Media and Information
AshleyPlays1
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetPaul Elliott
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Geetha982072
 
Dark Net
Dark NetDark Net
Dark Net
Riya V
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
eliofatjon
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark web
Paul Brooks
 
Do not put too much information pdf
Do not put too much information pdfDo not put too much information pdf
Do not put too much information pdfShangli Jiang
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
sainnrg
 
Do not put too much information
Do not put too much informationDo not put too much information
Do not put too much informationShangli Jiang
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
WHAT LURKS BEHIND YOUR INTERNET?
WHAT LURKS BEHIND YOUR INTERNET?WHAT LURKS BEHIND YOUR INTERNET?
WHAT LURKS BEHIND YOUR INTERNET?
Ana Margaret Tan
 
Fake news is just the beginning why the internet needs a fix
Fake news is just the beginning why the internet needs a fixFake news is just the beginning why the internet needs a fix
Fake news is just the beginning why the internet needs a fix
Chirag Thumar
 
Lurking Beneath The Internet
Lurking Beneath The InternetLurking Beneath The Internet
Lurking Beneath The Internet
suehutchison
 

Similar to Darknet: The Other Side (20)

Deep web
Deep webDeep web
Deep web
 
ABOUT DARK WEB
ABOUT DARK WEB ABOUT DARK WEB
ABOUT DARK WEB
 
5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Deep web
Deep webDeep web
Deep web
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic Se
 
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
 
Legal, Ethical and Societal Issues in Media and Information
Legal, Ethical and Societal Issues in Media and Information Legal, Ethical and Societal Issues in Media and Information
Legal, Ethical and Societal Issues in Media and Information
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Dark Net
Dark NetDark Net
Dark Net
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark web
 
Do not put too much information pdf
Do not put too much information pdfDo not put too much information pdf
Do not put too much information pdf
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Do not put too much information
Do not put too much informationDo not put too much information
Do not put too much information
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
WHAT LURKS BEHIND YOUR INTERNET?
WHAT LURKS BEHIND YOUR INTERNET?WHAT LURKS BEHIND YOUR INTERNET?
WHAT LURKS BEHIND YOUR INTERNET?
 
Fake news is just the beginning why the internet needs a fix
Fake news is just the beginning why the internet needs a fixFake news is just the beginning why the internet needs a fix
Fake news is just the beginning why the internet needs a fix
 
Lurking Beneath The Internet
Lurking Beneath The InternetLurking Beneath The Internet
Lurking Beneath The Internet
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 

Darknet: The Other Side

  • 1. Cuartero, John Brian D. DARKNET: THE OTHER SIDE
  • 2.  A place in the internet where people can be anonymous and hidden from the usual search engines.
  • 3. The Internet  The Visible  This is what most people visit and use.  Example of these websites are:  Facebook, Google, Yahoo, Twitter, etc.  The Invisible  Information that are not for public consumption  Websites that hide from authority (Illegal Markets)
  • 4. The Internet Iceberg  The invisible web does not necessarily mean that it is something bad.  There are just cases that it is used for a purpose that is not ethical or moral
  • 5. The Bad Side of the Darknet  There are sites like Silk Road that sell drugs, weaponry and other things that are not available normally since they are dangerous for the society.
  • 6. Effects on e-commerce  There might be a small effect on e-commerce knowing that legal businesses won’t need to go in the deep web to sell.  The only businesses that go underground are those who need to hide something or illegal.
  • 7. What will happen in the next 2 years?  The founder of Silk Road was just recently caught. There might be an increase in aggressiveness shutting down these hidden illegal websites.  Simultaneously, other people who actively use the deep web for illegal activities will try to open up new markets and at the same time
  • 8. The e-commerce boom  Business transactions online will become more normal and people will become less concerned in putting up their information in the internet because the generation who consumes products have more knowledge regarding technology and basically the norm.  Traditional businesses will have to add an online facility to cope up with the competitors that utilize the opportunities that is the web availability or presence of a product.

Editor's Notes

  1. http://www.theguardian.com/society/2013/oct/06/dark-net-drugs