SUBMITTED BY:
GEETHA C [1GG21CS404]
GOVERNMENT ENGINEERING COLLEGE RAMANAGARA
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
VII SEM
TECHNICAL SEMINAR
ON
DARK WEB
Under The Guidance of:
Mrs.Harsharani K S
Assistant Professor
Department of CSE
CONTENTS
 Abstract
 Introduction
 Background of the study
 Research problem
 Objectives of the study
 Scope of the study
 Parts of web
 Tor
 Legal uses of Dark web
 Results and Discussion
 Conclusions and Scope for Future Work
Abstract
In recent years, the Dark web has become one of the most discussed topics
in cyber security circles.
Current academic studies and media reports tend to highlight how the
anonymous nature of the Dark web is used to facilitate criminal activities.
The dark web is a hidden part of the world wide web that can only be
accessed using a special browser known as Tor
INTRODUCTION
BACKGROUND OF THE STUDY
 The term dark web first appeared in print in a 2009 newspaper
article describing these criminal applications.
 The rise of cryptocurrency, and in particular Bitcoin, significantly
increased the dark web's use in illegal trade.
RESEARCH PROBLEM
 The study concludes that the Dark Web influences various aspects of society
such as privacy, security and criminal justice.
 The research seeks to unveil both the potential benefits and risks associated
with the Dark Web and which challenges it poses for law enforcement agencies.
OBJECTIVES OF THE STUDY
 The dark web is the hidden collective of internet sites only accessible by a specialized web
browser.
 It is used for keeping internet activity anonymous and private, which can be helpful in both
legal and illegal applications.
1.Enabling Cybercrime: Criminals Dependence on the Dark Web
2. Distributed Hidden Services & Dark Web Scalability
3.Role & Capability of Law Enforcement
SCOPE OF THE STUDY
 The Dark Web, popularly referred to as the internet’s “malevolent side”, has received a
reputation as a sanctuary for drugs, red rooms and pedophiles.
 Rumors about the products and services that can be acquired in this network are constantly in
the news, leading people to develop a very negative opinion on the topic at hand.
 The Public policy perspective of the dark web is an extremely hard policy to write, due to spite
of the illegal activity that anonymity enables.
 Policy-makers must gain an understanding of the Dark Web in order to engage intelligently in
the debate and enact effective dark web policy.
Parts of Web
To understand what the dark web is, we need to understand its
terminology. The internet is often described as consisting of three
parts:
i. The surface web,
ii. The deep web
iii.The dark web.
Tor (The Onion Routing project)
The Tor project is a non-profit organization that conducts research and
development into online privacy and anonymity.
It is intended to prevent anybody from tracking your browsing history or
discovering where you are, including businesses and the government.
The Tor network is a secure, encrypted protocol that can ensure privacy for
data and communications on the web.
Tor is legal to use but Tor is not designed nor intended for Tor users or Tor
network operators to break the law
Who created Tor?
Onion routing,The original technology behind Tor was developed by the
United States Naval Research Laboratory in 1990s.
The Onion Routing project (which later simply became "Tor), was
launched on 20 September 2002
The US Navy used tor with the specific purpose of insuring the
anonymity of communications over the Internet.
With the help of tor the US Navy protects the identity of US Navy
intelligence agents
How Tor works?
Tor is a network of virtual tunnels
Tor works by sending your traffic through three
random servers (also known as relays) in the Tor
network
The last relay in the circuit (the “exit relay”) then
sends the traffic out onto the public Internet.
Thus, it creates multi-layered encryption (layers
like an onion) and a hard-to-follow path
There are over 7,000 of these servers, which
mostly belong to volunteers.
Is the Dark Web Safe?
Like most things, it depends. Here are some cybersecurity issues you should consider:
◦ Remote administration tools can be auto downloaded
◦ Malware Like Spyware / Ransomware
◦ Hackers may
◦ Phishing scams
◦ Suspicious links
◦ Criminal element
It’s dangerous to buy or download anything from illegal marketplaces it may
contain malware.
Legal Uses of the Dark Web
While using the dark web may seem suspect on the surface, it is perfectly legal,
and there are many legitimate uses of Tor and anonymous browsing
For example,
In countries where government surveillance may be used to spy on and
oppress political dissidents, the dark web is often a place for communication
that avoids government censorship and scrutiny
Harmful contents of darkweb
Due to the dark web's encryption, websites cannot track geolocation or IP address of
users. This allows users to talk, blog, transact and share files confidentially.
Some contents of Dark web.
I. Stolen Information
II. Drugs and Stolen Goods
III. Disturbing Content
IV. Bitcoin Lottery Tickets
V. Terrorist Content
VI. Hacking Services
The Dark Side of the Dark Web
Hackers use the dark web as their playground to sell their services and earn a living.
One can hire a hacker or hire an assassin
Drug marketplace where drugs are been sold
Weapons
Child Pornography
Red Rooms
Human Flesh
Disturbing contents and a lot more
How to visit dark web
The safest way to get on the dark web is through the Tor network which is a browser support
Tor network also known as Tor Browser.
Then you will have to get the onion links with .onion extension links because dark websites are not
indexed publicly.
The easiest way to search for the link are https://onion.live/
Tor supports duckduck go search engine which does not store IP addresses or user
information
While visiting .onion links or the darkweb one should turn off his/her javascript of the Tor
browser.
Conclusion
The dark web is a part of the Internet that is usually used by users
to do some activity in a hidden manner without leaving any traces.
Navigating the darkweb can be quite interesting yet you must
exercise safety as you ride the dark tunnel.
First block web cam, second don’t download anything from the
darknet, and lastly don't maximize the tor browser screen.
It has become a hub of criminal activities like child pornography,
arms trafficking, drug trafficking, onion cloning, etc.
Thank you

darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx

  • 1.
    SUBMITTED BY: GEETHA C[1GG21CS404] GOVERNMENT ENGINEERING COLLEGE RAMANAGARA DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING VII SEM TECHNICAL SEMINAR ON DARK WEB Under The Guidance of: Mrs.Harsharani K S Assistant Professor Department of CSE
  • 2.
    CONTENTS  Abstract  Introduction Background of the study  Research problem  Objectives of the study  Scope of the study  Parts of web  Tor  Legal uses of Dark web  Results and Discussion  Conclusions and Scope for Future Work
  • 3.
    Abstract In recent years,the Dark web has become one of the most discussed topics in cyber security circles. Current academic studies and media reports tend to highlight how the anonymous nature of the Dark web is used to facilitate criminal activities. The dark web is a hidden part of the world wide web that can only be accessed using a special browser known as Tor
  • 4.
  • 5.
    BACKGROUND OF THESTUDY  The term dark web first appeared in print in a 2009 newspaper article describing these criminal applications.  The rise of cryptocurrency, and in particular Bitcoin, significantly increased the dark web's use in illegal trade.
  • 6.
    RESEARCH PROBLEM  Thestudy concludes that the Dark Web influences various aspects of society such as privacy, security and criminal justice.  The research seeks to unveil both the potential benefits and risks associated with the Dark Web and which challenges it poses for law enforcement agencies.
  • 7.
    OBJECTIVES OF THESTUDY  The dark web is the hidden collective of internet sites only accessible by a specialized web browser.  It is used for keeping internet activity anonymous and private, which can be helpful in both legal and illegal applications. 1.Enabling Cybercrime: Criminals Dependence on the Dark Web 2. Distributed Hidden Services & Dark Web Scalability 3.Role & Capability of Law Enforcement
  • 8.
    SCOPE OF THESTUDY  The Dark Web, popularly referred to as the internet’s “malevolent side”, has received a reputation as a sanctuary for drugs, red rooms and pedophiles.  Rumors about the products and services that can be acquired in this network are constantly in the news, leading people to develop a very negative opinion on the topic at hand.  The Public policy perspective of the dark web is an extremely hard policy to write, due to spite of the illegal activity that anonymity enables.  Policy-makers must gain an understanding of the Dark Web in order to engage intelligently in the debate and enact effective dark web policy.
  • 9.
    Parts of Web Tounderstand what the dark web is, we need to understand its terminology. The internet is often described as consisting of three parts: i. The surface web, ii. The deep web iii.The dark web.
  • 11.
    Tor (The OnionRouting project) The Tor project is a non-profit organization that conducts research and development into online privacy and anonymity. It is intended to prevent anybody from tracking your browsing history or discovering where you are, including businesses and the government. The Tor network is a secure, encrypted protocol that can ensure privacy for data and communications on the web. Tor is legal to use but Tor is not designed nor intended for Tor users or Tor network operators to break the law
  • 12.
    Who created Tor? Onionrouting,The original technology behind Tor was developed by the United States Naval Research Laboratory in 1990s. The Onion Routing project (which later simply became "Tor), was launched on 20 September 2002 The US Navy used tor with the specific purpose of insuring the anonymity of communications over the Internet. With the help of tor the US Navy protects the identity of US Navy intelligence agents
  • 13.
    How Tor works? Toris a network of virtual tunnels Tor works by sending your traffic through three random servers (also known as relays) in the Tor network The last relay in the circuit (the “exit relay”) then sends the traffic out onto the public Internet. Thus, it creates multi-layered encryption (layers like an onion) and a hard-to-follow path There are over 7,000 of these servers, which mostly belong to volunteers.
  • 14.
    Is the DarkWeb Safe? Like most things, it depends. Here are some cybersecurity issues you should consider: ◦ Remote administration tools can be auto downloaded ◦ Malware Like Spyware / Ransomware ◦ Hackers may ◦ Phishing scams ◦ Suspicious links ◦ Criminal element It’s dangerous to buy or download anything from illegal marketplaces it may contain malware.
  • 15.
    Legal Uses ofthe Dark Web While using the dark web may seem suspect on the surface, it is perfectly legal, and there are many legitimate uses of Tor and anonymous browsing For example, In countries where government surveillance may be used to spy on and oppress political dissidents, the dark web is often a place for communication that avoids government censorship and scrutiny
  • 16.
    Harmful contents ofdarkweb Due to the dark web's encryption, websites cannot track geolocation or IP address of users. This allows users to talk, blog, transact and share files confidentially. Some contents of Dark web. I. Stolen Information II. Drugs and Stolen Goods III. Disturbing Content IV. Bitcoin Lottery Tickets V. Terrorist Content VI. Hacking Services
  • 17.
    The Dark Sideof the Dark Web Hackers use the dark web as their playground to sell their services and earn a living. One can hire a hacker or hire an assassin Drug marketplace where drugs are been sold Weapons Child Pornography Red Rooms Human Flesh Disturbing contents and a lot more
  • 18.
    How to visitdark web The safest way to get on the dark web is through the Tor network which is a browser support Tor network also known as Tor Browser. Then you will have to get the onion links with .onion extension links because dark websites are not indexed publicly. The easiest way to search for the link are https://onion.live/ Tor supports duckduck go search engine which does not store IP addresses or user information While visiting .onion links or the darkweb one should turn off his/her javascript of the Tor browser.
  • 19.
    Conclusion The dark webis a part of the Internet that is usually used by users to do some activity in a hidden manner without leaving any traces. Navigating the darkweb can be quite interesting yet you must exercise safety as you ride the dark tunnel. First block web cam, second don’t download anything from the darknet, and lastly don't maximize the tor browser screen. It has become a hub of criminal activities like child pornography, arms trafficking, drug trafficking, onion cloning, etc.
  • 20.