SlideShare a Scribd company logo
The
Darknet/Invisible
Web is the hidden
underbelly, home to
both rogues, political
activists, and those
who want to be
anonymous. It is
It’s a secretive place, where
people can talk about
anything and everything, a
place where being anonymous
thrives, a place where people
believe that is for the freedom
of speech. It is also a
dangerous place, where a lot
of illicit, underground, black
market transactions occur.
They lurk in the
blind spots of search
engines. It's a
lawless zone,
it’s not a place most
people visit nor
should they. It
sounds like a murky,
inaccessible
underworld but the
reality is that it's
right there, a click
away, at the end of
your mouse.
To access the Dark Net you need to have
access to the regular internet and connect
to the Tor network. Tor is a network of
virtual tunnels which allows people to
improve their privacy and security on the
Internet.
The Darknet strives on privacy and being
anonymous. Part of the promise of recent
digital and social innovations has been
the new ability of businesses to learn tons
of valuable and insightful information
about their current and potential
customers. The loss or compromise of that
data could undermine recent marketing
progress.
Businesses will have to confront a potentially
darker Internet, with a block to data-driven
marketing with an increase in being
anonymous. There will be real consequences,
including in investments in marketing, if it
becomes more difficult to quantify customer
engagement. Imagine if e-commerce site
where all the profiles are anonymous, all
payments utilize cryptic currencies, and all
deliveries of physical goods use inexpensive,
multi-hop services that conceal the end
delivery address.
There is mounting pressure from elected
officials to do something about the
Darknet. The problem facing anyone
trying to block illegal dealings is that it
doesn't happen on the public internet.
Online criminals know what they're doing
is illegal, and they'll take complex
precautions to hide their locations and the
services. This gives the government a
hard time to stop these illegal actions.
The future is uncertain. The tool used by
oppressed people across the globe is also
the tool used for illegal and heinous
actions, so will this still thrive for the
good of freedom of speech and privacy?

More Related Content

Viewers also liked

5 Proven Digital Marketing Strategies for 2016
5 Proven Digital Marketing Strategies for 20165 Proven Digital Marketing Strategies for 2016
5 Proven Digital Marketing Strategies for 2016
seoplus+
 
How SEO Can Help Grow Your Home Inspection Business
How SEO Can Help Grow Your Home Inspection BusinessHow SEO Can Help Grow Your Home Inspection Business
How SEO Can Help Grow Your Home Inspection Business
seoplus+
 
Preparing for “Mobilegeddon” on April 21 – Google Mobile Search Changes
Preparing for “Mobilegeddon” on April 21 –  Google Mobile Search ChangesPreparing for “Mobilegeddon” on April 21 –  Google Mobile Search Changes
Preparing for “Mobilegeddon” on April 21 – Google Mobile Search Changes
seoplus+
 
Penn State Social Media Boot Camp - Blogging Presentation
Penn State Social Media Boot Camp - Blogging PresentationPenn State Social Media Boot Camp - Blogging Presentation
Penn State Social Media Boot Camp - Blogging Presentation
kaitlynzurcher
 
Introduction to Google Analytics
Introduction to Google AnalyticsIntroduction to Google Analytics
Introduction to Google Analytics
seoplus+
 
Habitat for Humanity Lakeside's Spring 2014 Newsletter
Habitat for Humanity Lakeside's Spring 2014 NewsletterHabitat for Humanity Lakeside's Spring 2014 Newsletter
Habitat for Humanity Lakeside's Spring 2014 Newsletter
habitatlakeside
 
Habitat for Humanity Lakeside Fall/Winter 2013 newsletter
Habitat for Humanity Lakeside Fall/Winter 2013 newsletterHabitat for Humanity Lakeside Fall/Winter 2013 newsletter
Habitat for Humanity Lakeside Fall/Winter 2013 newsletter
habitatlakeside
 
Press Releases and Media Alerts, Corcoran Gallery of Art
Press Releases and Media Alerts, Corcoran Gallery of ArtPress Releases and Media Alerts, Corcoran Gallery of Art
Press Releases and Media Alerts, Corcoran Gallery of Art
kaitlynzurcher
 
Social Media Strategy Report
Social Media Strategy ReportSocial Media Strategy Report
Social Media Strategy Report
kaitlynzurcher
 
SEO: How to Drive More Traffic to Your Website
SEO: How to Drive More Traffic to Your WebsiteSEO: How to Drive More Traffic to Your Website
SEO: How to Drive More Traffic to Your Website
seoplus+
 
What is SoLoMo?
What is SoLoMo?What is SoLoMo?
What is SoLoMo?
suehutchison
 
Studi h dan q m ririn
Studi h dan q m ririnStudi h dan q m ririn
Studi h dan q m ririn
ririn Triwahyuni
 
Mock Media Kit
Mock Media KitMock Media Kit
Mock Media Kit
kaitlynzurcher
 
Shopify SEO & Analytics Training
Shopify SEO & Analytics TrainingShopify SEO & Analytics Training
Shopify SEO & Analytics Training
seoplus+
 
My Top SEO Tactics in 2016 & LIVE SEO Case Study: One Year Later
My Top SEO Tactics in 2016 & LIVE SEO Case Study: One Year LaterMy Top SEO Tactics in 2016 & LIVE SEO Case Study: One Year Later
My Top SEO Tactics in 2016 & LIVE SEO Case Study: One Year Later
seoplus+
 

Viewers also liked (15)

5 Proven Digital Marketing Strategies for 2016
5 Proven Digital Marketing Strategies for 20165 Proven Digital Marketing Strategies for 2016
5 Proven Digital Marketing Strategies for 2016
 
How SEO Can Help Grow Your Home Inspection Business
How SEO Can Help Grow Your Home Inspection BusinessHow SEO Can Help Grow Your Home Inspection Business
How SEO Can Help Grow Your Home Inspection Business
 
Preparing for “Mobilegeddon” on April 21 – Google Mobile Search Changes
Preparing for “Mobilegeddon” on April 21 –  Google Mobile Search ChangesPreparing for “Mobilegeddon” on April 21 –  Google Mobile Search Changes
Preparing for “Mobilegeddon” on April 21 – Google Mobile Search Changes
 
Penn State Social Media Boot Camp - Blogging Presentation
Penn State Social Media Boot Camp - Blogging PresentationPenn State Social Media Boot Camp - Blogging Presentation
Penn State Social Media Boot Camp - Blogging Presentation
 
Introduction to Google Analytics
Introduction to Google AnalyticsIntroduction to Google Analytics
Introduction to Google Analytics
 
Habitat for Humanity Lakeside's Spring 2014 Newsletter
Habitat for Humanity Lakeside's Spring 2014 NewsletterHabitat for Humanity Lakeside's Spring 2014 Newsletter
Habitat for Humanity Lakeside's Spring 2014 Newsletter
 
Habitat for Humanity Lakeside Fall/Winter 2013 newsletter
Habitat for Humanity Lakeside Fall/Winter 2013 newsletterHabitat for Humanity Lakeside Fall/Winter 2013 newsletter
Habitat for Humanity Lakeside Fall/Winter 2013 newsletter
 
Press Releases and Media Alerts, Corcoran Gallery of Art
Press Releases and Media Alerts, Corcoran Gallery of ArtPress Releases and Media Alerts, Corcoran Gallery of Art
Press Releases and Media Alerts, Corcoran Gallery of Art
 
Social Media Strategy Report
Social Media Strategy ReportSocial Media Strategy Report
Social Media Strategy Report
 
SEO: How to Drive More Traffic to Your Website
SEO: How to Drive More Traffic to Your WebsiteSEO: How to Drive More Traffic to Your Website
SEO: How to Drive More Traffic to Your Website
 
What is SoLoMo?
What is SoLoMo?What is SoLoMo?
What is SoLoMo?
 
Studi h dan q m ririn
Studi h dan q m ririnStudi h dan q m ririn
Studi h dan q m ririn
 
Mock Media Kit
Mock Media KitMock Media Kit
Mock Media Kit
 
Shopify SEO & Analytics Training
Shopify SEO & Analytics TrainingShopify SEO & Analytics Training
Shopify SEO & Analytics Training
 
My Top SEO Tactics in 2016 & LIVE SEO Case Study: One Year Later
My Top SEO Tactics in 2016 & LIVE SEO Case Study: One Year LaterMy Top SEO Tactics in 2016 & LIVE SEO Case Study: One Year Later
My Top SEO Tactics in 2016 & LIVE SEO Case Study: One Year Later
 

Similar to Lurking Beneath The Internet

DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetPaul Elliott
 
What Is Dark Web.docx
What Is Dark Web.docxWhat Is Dark Web.docx
What Is Dark Web.docx
RoshniChauhan24
 
Dark Web Site.pdf
Dark Web Site.pdfDark Web Site.pdf
Dark Web Site.pdf
DarkWebLink1
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic Se
OllieShoresna
 
Dark Web Sites and the Silk Road Legacy.pdf
Dark Web Sites and the Silk Road Legacy.pdfDark Web Sites and the Silk Road Legacy.pdf
Dark Web Sites and the Silk Road Legacy.pdf
kabirhasan11
 
Dark web links - The Disputable Appeal of Dark Web Links.pdf
Dark web links - The Disputable Appeal of Dark Web Links.pdfDark web links - The Disputable Appeal of Dark Web Links.pdf
Dark web links - The Disputable Appeal of Dark Web Links.pdf
Auto Parts Wholesale Online
 
Darknet
DarknetDarknet
Dark web
Dark webDark web
Dw communication
Dw communicationDw communication
Dw communication
Arjun Chetry
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)itgsabc
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark web
Paul Brooks
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
Darwin de Leon
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leonDarwin de Leon
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Geetha982072
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
Jayna Mistry
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
eliofatjon
 
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptxCS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
prathamchhabra166
 

Similar to Lurking Beneath The Internet (20)

DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
 
Deep web
Deep webDeep web
Deep web
 
Dark net
Dark netDark net
Dark net
 
What Is Dark Web.docx
What Is Dark Web.docxWhat Is Dark Web.docx
What Is Dark Web.docx
 
Dark Web Site.pdf
Dark Web Site.pdfDark Web Site.pdf
Dark Web Site.pdf
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic Se
 
Dark Web Sites and the Silk Road Legacy.pdf
Dark Web Sites and the Silk Road Legacy.pdfDark Web Sites and the Silk Road Legacy.pdf
Dark Web Sites and the Silk Road Legacy.pdf
 
Dark web links - The Disputable Appeal of Dark Web Links.pdf
Dark web links - The Disputable Appeal of Dark Web Links.pdfDark web links - The Disputable Appeal of Dark Web Links.pdf
Dark web links - The Disputable Appeal of Dark Web Links.pdf
 
Darknet
DarknetDarknet
Darknet
 
Dark web
Dark webDark web
Dark web
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Dw communication
Dw communicationDw communication
Dw communication
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark web
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptxCS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
CS PPT Art Integrated Project by Rudraksh Chakraborty and Pratham Chhabra.pptx
 

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Lurking Beneath The Internet

  • 1. The Darknet/Invisible Web is the hidden underbelly, home to both rogues, political activists, and those who want to be anonymous. It is
  • 2. It’s a secretive place, where people can talk about anything and everything, a place where being anonymous thrives, a place where people believe that is for the freedom of speech. It is also a dangerous place, where a lot of illicit, underground, black market transactions occur.
  • 3. They lurk in the blind spots of search engines. It's a lawless zone, it’s not a place most people visit nor should they. It sounds like a murky, inaccessible underworld but the reality is that it's right there, a click away, at the end of your mouse.
  • 4. To access the Dark Net you need to have access to the regular internet and connect to the Tor network. Tor is a network of virtual tunnels which allows people to improve their privacy and security on the Internet.
  • 5. The Darknet strives on privacy and being anonymous. Part of the promise of recent digital and social innovations has been the new ability of businesses to learn tons of valuable and insightful information about their current and potential customers. The loss or compromise of that data could undermine recent marketing progress.
  • 6. Businesses will have to confront a potentially darker Internet, with a block to data-driven marketing with an increase in being anonymous. There will be real consequences, including in investments in marketing, if it becomes more difficult to quantify customer engagement. Imagine if e-commerce site where all the profiles are anonymous, all payments utilize cryptic currencies, and all deliveries of physical goods use inexpensive, multi-hop services that conceal the end delivery address.
  • 7. There is mounting pressure from elected officials to do something about the Darknet. The problem facing anyone trying to block illegal dealings is that it doesn't happen on the public internet. Online criminals know what they're doing is illegal, and they'll take complex precautions to hide their locations and the services. This gives the government a hard time to stop these illegal actions.
  • 8. The future is uncertain. The tool used by oppressed people across the globe is also the tool used for illegal and heinous actions, so will this still thrive for the good of freedom of speech and privacy?

Editor's Notes

  1. By: Susanna D. Hutchison