SlideShare a Scribd company logo
1 of 45
Husband, father, blogger, marketer
Nearly 20 years in online marketing
Marketing Technologist (Capgemini)
Master of Science in IT (CMU)
Lobbied against Child Pornography
Paul Wilson
(Charlotte, NC)
Follow me on Twitter
@PaulWilson
Visit me at
http://mymarketer.net
THE FORCE vs THE DARK SIDE
The Deep Dark Web
The Landscape
The Force
The Dark Side
A Deeper Look
Understanding the Landscape of the Dark Web
The REAL Web
Timing Attack
Entry Monitoring
Intersection Attack
Ddos Attack
Predecessor Attack (Replay)
Exit node Sniffing
TOR: The Force or The Dark Side?
Home Users: protect themselves when online
Activists: anonymously report abuses from danger
zones
Whistleblowers: safely report on corruption
Journalists: protect their research and sources online
Military and law enforcement: protect
communications, investigations, and intelligence
Drug Dealers: Controlled substance marketplaces
Arm Dealer: selling all kinds of weapons
Pedifiler: Child pornography
Traitor: Unauthorized leaks of sensitive information
Thief: Money laundering and Credit Card Fraud
Plagiarist: Copyright infringement
Exploring the Dark Web
Comments
The Extras…
TOR Node
Encrypted
Alice
Bob
Jane
Unencrypted
•Each OR maintains a connection
to every other OR
•Users run an onion proxy (OP) to
fetch directories, establish circuits
across the network
•Each OR maintains a long & short
term onion identity key (10 mins)
Port 9001
Port 9090
Port 443
TOR Node
Encrypted
Alice
Dave
Bob
Jane
Unencrypted
Step 1: Alice’s TOR Client
obtains a list of TOR
Clients from a directory
server
Port 9001
Port 9030
TOR Node
Encrypted
Alice
Dave
Bob
Jane
Unencrypted
Step 2: Alice’s TOR
Client picks a random
path to a destination
server. Green links are
encrypted, red links are
in the clear
Port 443
Port 80
TOR Node
Encrypted
Alice
Dave
Bob
Jane
Unencrypted
Step 3: If at a later time
Alice connects to a
different resource then a
different, random route
is selected. Again Green
links are encrypted, red
links are in the clear
Port 80
Port 443
TOR Node
Encrypted
Unencrypted
Security Agencies TOR is
a key technology in the
fight against organized
crime on the internet
Illegal Site
Agency IP Address Hidden from Site owner
TOR Node
Encrypted
Bob
Unencrypted
Criminal posts
anonymous content
out to Compromised
Server Compromised
Node
Police
Law Enforcement
Monitor suspects
client machine
(Entry Point)
TOR Node
Encrypted
Target
Unencrypted
Criminal posts
anonymous content
onto Server
Compromised
Node
Infected with malicious code
Police
Law Enforcement
Monitors Target client
machine (Exit Point)
• An exit node has complete
access to the content being
transmitted from the sender
to the recipient
• If the message is encrypted
by SSL, the exit node cannot
read the information, just as
any encrypted link over the
regular internet
TOR Node
Encrypted
Bob
Unencrypted
Criminal posts
anonymous content
out to Compromised
Server
Compromised
Node
Police
Network Analysis
Nodes periodically fail of
the network; any chain
that remains functioning
cannot have been
routed through either
the nodes that left or
the nodes that recently
joined the network,
increasing the chances
of a successful traffic
analysis
Offline Node
Tor is vulnerable to DoS attacks because users can
consume more network resources than allowed or
render the network unusable for other users.
Tor deals with these attacks with
Puzzle solving: At beginning of TLS handshake or
accepting create cells, this limits the attack multiplier.
Limiting rates: Limits rates of accepting of create cell
and TLS connections so the computational work of
processing them doesn’t disrupt the symmetric
cryptography operations that allow cells to flow.

More Related Content

What's hot

Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsAndres Baravalle
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
The Dark Web
The Dark WebThe Dark Web
The Dark WebJan Siy
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Bich (Evelyn) Chu
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep webKhaled Sany
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark webJisc
 

What's hot (20)

Dark web
Dark webDark web
Dark web
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developments
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Dark wed
Dark wedDark wed
Dark wed
 
Dark web
Dark webDark web
Dark web
 
The dark web
The dark webThe dark web
The dark web
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 

Viewers also liked

Dlaczego warto prowadzić blog firmowy concept4u
Dlaczego warto prowadzić blog firmowy concept4uDlaczego warto prowadzić blog firmowy concept4u
Dlaczego warto prowadzić blog firmowy concept4uModelarnia Marki
 
Disney Consumer Product
Disney Consumer ProductDisney Consumer Product
Disney Consumer ProductAyush Gupta
 
2 11 contrato a tiempo parcial
2 11 contrato a tiempo parcial2 11 contrato a tiempo parcial
2 11 contrato a tiempo parcialsupervegallevis
 
Violación convención Colectiva ETB
Violación convención Colectiva ETBViolación convención Colectiva ETB
Violación convención Colectiva ETBTribunaObrera
 
Presentation XML-Holland 2006 - Dynamic Publishing
Presentation XML-Holland 2006 - Dynamic PublishingPresentation XML-Holland 2006 - Dynamic Publishing
Presentation XML-Holland 2006 - Dynamic PublishingRoger Dols
 
Student Immunization Campaign Proposal - PU520 Epidemiology
Student Immunization Campaign Proposal - PU520 EpidemiologyStudent Immunization Campaign Proposal - PU520 Epidemiology
Student Immunization Campaign Proposal - PU520 Epidemiologyorion0010
 
Presentación de la asignatura informática
Presentación de la asignatura informáticaPresentación de la asignatura informática
Presentación de la asignatura informáticatecnojulio
 
System CAM inventorcam dla Autodesk inventor
System CAM inventorcam dla Autodesk inventorSystem CAM inventorcam dla Autodesk inventor
System CAM inventorcam dla Autodesk inventorPremium Solutions Polska
 
Presentation on one rank one pension
Presentation on one rank one pensionPresentation on one rank one pension
Presentation on one rank one pensionRavi Ramchandani
 
Prepaid energy meter using gprs gsm technology
Prepaid energy meter using gprs gsm technologyPrepaid energy meter using gprs gsm technology
Prepaid energy meter using gprs gsm technologySasikala Nawarathne
 
Cómo registrase en Savia Digital...
Cómo registrase en  Savia Digital...Cómo registrase en  Savia Digital...
Cómo registrase en Savia Digital...antorome3
 

Viewers also liked (18)

Dlaczego warto prowadzić blog firmowy concept4u
Dlaczego warto prowadzić blog firmowy concept4uDlaczego warto prowadzić blog firmowy concept4u
Dlaczego warto prowadzić blog firmowy concept4u
 
PaMeraki
PaMerakiPaMeraki
PaMeraki
 
Disney Consumer Product
Disney Consumer ProductDisney Consumer Product
Disney Consumer Product
 
2 11 contrato a tiempo parcial
2 11 contrato a tiempo parcial2 11 contrato a tiempo parcial
2 11 contrato a tiempo parcial
 
Violación convención Colectiva ETB
Violación convención Colectiva ETBViolación convención Colectiva ETB
Violación convención Colectiva ETB
 
Presentation XML-Holland 2006 - Dynamic Publishing
Presentation XML-Holland 2006 - Dynamic PublishingPresentation XML-Holland 2006 - Dynamic Publishing
Presentation XML-Holland 2006 - Dynamic Publishing
 
Dharma Rao Dronadula CompEx Cert 2016
Dharma Rao Dronadula CompEx Cert 2016Dharma Rao Dronadula CompEx Cert 2016
Dharma Rao Dronadula CompEx Cert 2016
 
Student Immunization Campaign Proposal - PU520 Epidemiology
Student Immunization Campaign Proposal - PU520 EpidemiologyStudent Immunization Campaign Proposal - PU520 Epidemiology
Student Immunization Campaign Proposal - PU520 Epidemiology
 
Nietypowe święta - Luty
Nietypowe święta - LutyNietypowe święta - Luty
Nietypowe święta - Luty
 
Contrato
ContratoContrato
Contrato
 
Presentación de la asignatura informática
Presentación de la asignatura informáticaPresentación de la asignatura informática
Presentación de la asignatura informática
 
Twitter 101 for execs
Twitter 101 for execsTwitter 101 for execs
Twitter 101 for execs
 
System CAM inventorcam dla Autodesk inventor
System CAM inventorcam dla Autodesk inventorSystem CAM inventorcam dla Autodesk inventor
System CAM inventorcam dla Autodesk inventor
 
#ebnews - Alina Kubowicz, 29.06.2016 Kraków
#ebnews - Alina Kubowicz, 29.06.2016 Kraków#ebnews - Alina Kubowicz, 29.06.2016 Kraków
#ebnews - Alina Kubowicz, 29.06.2016 Kraków
 
osobyzasobyPL - #ebnews - 03112015
osobyzasobyPL - #ebnews - 03112015osobyzasobyPL - #ebnews - 03112015
osobyzasobyPL - #ebnews - 03112015
 
Presentation on one rank one pension
Presentation on one rank one pensionPresentation on one rank one pension
Presentation on one rank one pension
 
Prepaid energy meter using gprs gsm technology
Prepaid energy meter using gprs gsm technologyPrepaid energy meter using gprs gsm technology
Prepaid energy meter using gprs gsm technology
 
Cómo registrase en Savia Digital...
Cómo registrase en  Savia Digital...Cómo registrase en  Savia Digital...
Cómo registrase en Savia Digital...
 

Similar to My darkweb-presentation

Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured DefCamp
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure ChannelViral Parmar
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat IntelligenceMarlabs
 
Computer hacking
Computer hackingComputer hacking
Computer hackingArjun Tomar
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security Mehedi Hasan
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hackingjignesh khunt
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharksNalneesh Gaur
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 

Similar to My darkweb-presentation (20)

Dw communication
Dw communicationDw communication
Dw communication
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
What Is Dark Web.docx
What Is Dark Web.docxWhat Is Dark Web.docx
What Is Dark Web.docx
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
 
Godfather 2.0
Godfather 2.0Godfather 2.0
Godfather 2.0
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknet
 
Unit-2 ICS.ppt
Unit-2 ICS.pptUnit-2 ICS.ppt
Unit-2 ICS.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hacking
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Web forensics
Web forensicsWeb forensics
Web forensics
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 

More from Paul Wilson

What It Means To Have A Slideshare Style Presentation
What It Means To Have A Slideshare Style PresentationWhat It Means To Have A Slideshare Style Presentation
What It Means To Have A Slideshare Style PresentationPaul Wilson
 
SOLVING HAWAII PROPERTY CRIME
SOLVING HAWAII PROPERTY CRIMESOLVING HAWAII PROPERTY CRIME
SOLVING HAWAII PROPERTY CRIMEPaul Wilson
 
Online Missionary Work (LDS)
Online Missionary Work (LDS)Online Missionary Work (LDS)
Online Missionary Work (LDS)Paul Wilson
 
How To Make Money Right Now As A Student
How To Make Money Right Now As A StudentHow To Make Money Right Now As A Student
How To Make Money Right Now As A StudentPaul Wilson
 
Improving Your Wordpress Blog (For BYU-H ENTR 383 Students)
Improving Your Wordpress Blog (For BYU-H ENTR 383 Students)Improving Your Wordpress Blog (For BYU-H ENTR 383 Students)
Improving Your Wordpress Blog (For BYU-H ENTR 383 Students)Paul Wilson
 
How To Build An Infographic Using Microsoft Powerpoint
How To Build An Infographic Using Microsoft PowerpointHow To Build An Infographic Using Microsoft Powerpoint
How To Build An Infographic Using Microsoft PowerpointPaul Wilson
 
Homelessness in Hawaii
Homelessness in HawaiiHomelessness in Hawaii
Homelessness in HawaiiPaul Wilson
 
Considering Solutions To Decrease Property Crime in Hawaii
Considering Solutions To Decrease Property Crime in HawaiiConsidering Solutions To Decrease Property Crime in Hawaii
Considering Solutions To Decrease Property Crime in HawaiiPaul Wilson
 

More from Paul Wilson (8)

What It Means To Have A Slideshare Style Presentation
What It Means To Have A Slideshare Style PresentationWhat It Means To Have A Slideshare Style Presentation
What It Means To Have A Slideshare Style Presentation
 
SOLVING HAWAII PROPERTY CRIME
SOLVING HAWAII PROPERTY CRIMESOLVING HAWAII PROPERTY CRIME
SOLVING HAWAII PROPERTY CRIME
 
Online Missionary Work (LDS)
Online Missionary Work (LDS)Online Missionary Work (LDS)
Online Missionary Work (LDS)
 
How To Make Money Right Now As A Student
How To Make Money Right Now As A StudentHow To Make Money Right Now As A Student
How To Make Money Right Now As A Student
 
Improving Your Wordpress Blog (For BYU-H ENTR 383 Students)
Improving Your Wordpress Blog (For BYU-H ENTR 383 Students)Improving Your Wordpress Blog (For BYU-H ENTR 383 Students)
Improving Your Wordpress Blog (For BYU-H ENTR 383 Students)
 
How To Build An Infographic Using Microsoft Powerpoint
How To Build An Infographic Using Microsoft PowerpointHow To Build An Infographic Using Microsoft Powerpoint
How To Build An Infographic Using Microsoft Powerpoint
 
Homelessness in Hawaii
Homelessness in HawaiiHomelessness in Hawaii
Homelessness in Hawaii
 
Considering Solutions To Decrease Property Crime in Hawaii
Considering Solutions To Decrease Property Crime in HawaiiConsidering Solutions To Decrease Property Crime in Hawaii
Considering Solutions To Decrease Property Crime in Hawaii
 

Recently uploaded

Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857
Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857
Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857delhimodel235
 
Strip Zagor Extra 322 - Dva ortaka.pdf
Strip   Zagor Extra 322 - Dva ortaka.pdfStrip   Zagor Extra 322 - Dva ortaka.pdf
Strip Zagor Extra 322 - Dva ortaka.pdfStripovizijacom
 
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?kexey39068
 
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 60009654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000Sapana Sha
 
Call Girls in Islamabad | 03274100048 | Call Girl Service
Call Girls in Islamabad | 03274100048 | Call Girl ServiceCall Girls in Islamabad | 03274100048 | Call Girl Service
Call Girls in Islamabad | 03274100048 | Call Girl ServiceAyesha Khan
 
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubai
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur DubaiBur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubai
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubaidajasot375
 
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | DelhiMalviyaNagarCallGirl
 
Karachi Escorts | +923070433345 | Escort Service in Karachi
Karachi Escorts | +923070433345 | Escort Service in KarachiKarachi Escorts | +923070433345 | Escort Service in Karachi
Karachi Escorts | +923070433345 | Escort Service in KarachiAyesha Khan
 
Zagor VČ OP 055 - Oluja nad Haitijem.pdf
Zagor VČ OP 055 - Oluja nad Haitijem.pdfZagor VČ OP 055 - Oluja nad Haitijem.pdf
Zagor VČ OP 055 - Oluja nad Haitijem.pdfStripovizijacom
 
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...akbard9823
 
Call Girl Service in Karachi +923081633338 Karachi Call Girls
Call Girl Service in Karachi +923081633338 Karachi Call GirlsCall Girl Service in Karachi +923081633338 Karachi Call Girls
Call Girl Service in Karachi +923081633338 Karachi Call GirlsAyesha Khan
 
Olivia Cox. intertextual references.pptx
Olivia Cox. intertextual references.pptxOlivia Cox. intertextual references.pptx
Olivia Cox. intertextual references.pptxLauraFagan6
 
MinSheng Gaofeng Estate commercial storyboard
MinSheng Gaofeng Estate commercial storyboardMinSheng Gaofeng Estate commercial storyboard
MinSheng Gaofeng Estate commercial storyboardjessica288382
 
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | DelhiMalviyaNagarCallGirl
 
Retail Store Scavanger Hunt - Foundation College Park
Retail Store Scavanger Hunt - Foundation College ParkRetail Store Scavanger Hunt - Foundation College Park
Retail Store Scavanger Hunt - Foundation College Parkjosebenzaquen
 
Lucknow 💋 Virgin Call Girls Lucknow | Book 8923113531 Extreme Naughty Call Gi...
Lucknow 💋 Virgin Call Girls Lucknow | Book 8923113531 Extreme Naughty Call Gi...Lucknow 💋 Virgin Call Girls Lucknow | Book 8923113531 Extreme Naughty Call Gi...
Lucknow 💋 Virgin Call Girls Lucknow | Book 8923113531 Extreme Naughty Call Gi...anilsa9823
 
Turn Lock Take Key Storyboard Daniel Johnson
Turn Lock Take Key Storyboard Daniel JohnsonTurn Lock Take Key Storyboard Daniel Johnson
Turn Lock Take Key Storyboard Daniel Johnsonthephillipta
 
Downtown Call Girls O5O91O128O Pakistani Call Girls in Downtown
Downtown Call Girls O5O91O128O Pakistani Call Girls in DowntownDowntown Call Girls O5O91O128O Pakistani Call Girls in Downtown
Downtown Call Girls O5O91O128O Pakistani Call Girls in Downtowndajasot375
 

Recently uploaded (20)

Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857
Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857
Low Rate Call Girls in Laxmi Nagar Delhi Call 9990771857
 
Strip Zagor Extra 322 - Dva ortaka.pdf
Strip   Zagor Extra 322 - Dva ortaka.pdfStrip   Zagor Extra 322 - Dva ortaka.pdf
Strip Zagor Extra 322 - Dva ortaka.pdf
 
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
How Can You Get Dubai Call Girls +971564860409 Call Girls Dubai?
 
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 60009654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
9654467111 Call Girls In Noida Sector 62 Short 1500 Night 6000
 
Call Girls in Islamabad | 03274100048 | Call Girl Service
Call Girls in Islamabad | 03274100048 | Call Girl ServiceCall Girls in Islamabad | 03274100048 | Call Girl Service
Call Girls in Islamabad | 03274100048 | Call Girl Service
 
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubai
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur DubaiBur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubai
Bur Dubai Call Girls O58993O4O2 Call Girls in Bur Dubai
 
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in Moti Nagar | Delhi
 
Karachi Escorts | +923070433345 | Escort Service in Karachi
Karachi Escorts | +923070433345 | Escort Service in KarachiKarachi Escorts | +923070433345 | Escort Service in Karachi
Karachi Escorts | +923070433345 | Escort Service in Karachi
 
Zagor VČ OP 055 - Oluja nad Haitijem.pdf
Zagor VČ OP 055 - Oluja nad Haitijem.pdfZagor VČ OP 055 - Oluja nad Haitijem.pdf
Zagor VČ OP 055 - Oluja nad Haitijem.pdf
 
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
Hazratganj ] (Call Girls) in Lucknow - 450+ Call Girl Cash Payment 🧄 89231135...
 
Dxb Call Girls # +971529501107 # Call Girls In Dxb Dubai || (UAE)
Dxb Call Girls # +971529501107 # Call Girls In Dxb Dubai || (UAE)Dxb Call Girls # +971529501107 # Call Girls In Dxb Dubai || (UAE)
Dxb Call Girls # +971529501107 # Call Girls In Dxb Dubai || (UAE)
 
Call Girl Service in Karachi +923081633338 Karachi Call Girls
Call Girl Service in Karachi +923081633338 Karachi Call GirlsCall Girl Service in Karachi +923081633338 Karachi Call Girls
Call Girl Service in Karachi +923081633338 Karachi Call Girls
 
Olivia Cox. intertextual references.pptx
Olivia Cox. intertextual references.pptxOlivia Cox. intertextual references.pptx
Olivia Cox. intertextual references.pptx
 
MinSheng Gaofeng Estate commercial storyboard
MinSheng Gaofeng Estate commercial storyboardMinSheng Gaofeng Estate commercial storyboard
MinSheng Gaofeng Estate commercial storyboard
 
Bur Dubai Call Girls # 971504361175 # Call Girls In Bur Dubai || (UAE)
Bur Dubai Call Girls # 971504361175 # Call Girls In Bur Dubai || (UAE)Bur Dubai Call Girls # 971504361175 # Call Girls In Bur Dubai || (UAE)
Bur Dubai Call Girls # 971504361175 # Call Girls In Bur Dubai || (UAE)
 
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | DelhiFULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | Delhi
FULL ENJOY - 9953040155 Call Girls in New Ashok Nagar | Delhi
 
Retail Store Scavanger Hunt - Foundation College Park
Retail Store Scavanger Hunt - Foundation College ParkRetail Store Scavanger Hunt - Foundation College Park
Retail Store Scavanger Hunt - Foundation College Park
 
Lucknow 💋 Virgin Call Girls Lucknow | Book 8923113531 Extreme Naughty Call Gi...
Lucknow 💋 Virgin Call Girls Lucknow | Book 8923113531 Extreme Naughty Call Gi...Lucknow 💋 Virgin Call Girls Lucknow | Book 8923113531 Extreme Naughty Call Gi...
Lucknow 💋 Virgin Call Girls Lucknow | Book 8923113531 Extreme Naughty Call Gi...
 
Turn Lock Take Key Storyboard Daniel Johnson
Turn Lock Take Key Storyboard Daniel JohnsonTurn Lock Take Key Storyboard Daniel Johnson
Turn Lock Take Key Storyboard Daniel Johnson
 
Downtown Call Girls O5O91O128O Pakistani Call Girls in Downtown
Downtown Call Girls O5O91O128O Pakistani Call Girls in DowntownDowntown Call Girls O5O91O128O Pakistani Call Girls in Downtown
Downtown Call Girls O5O91O128O Pakistani Call Girls in Downtown
 

My darkweb-presentation

  • 1. Husband, father, blogger, marketer Nearly 20 years in online marketing Marketing Technologist (Capgemini) Master of Science in IT (CMU) Lobbied against Child Pornography Paul Wilson (Charlotte, NC) Follow me on Twitter @PaulWilson Visit me at http://mymarketer.net
  • 2. THE FORCE vs THE DARK SIDE The Deep Dark Web
  • 3. The Landscape The Force The Dark Side A Deeper Look
  • 4. Understanding the Landscape of the Dark Web
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Timing Attack Entry Monitoring Intersection Attack Ddos Attack Predecessor Attack (Replay) Exit node Sniffing
  • 11. TOR: The Force or The Dark Side?
  • 12.
  • 13.
  • 14.
  • 15. Home Users: protect themselves when online Activists: anonymously report abuses from danger zones Whistleblowers: safely report on corruption Journalists: protect their research and sources online Military and law enforcement: protect communications, investigations, and intelligence
  • 16.
  • 17.
  • 18.
  • 19. Drug Dealers: Controlled substance marketplaces Arm Dealer: selling all kinds of weapons Pedifiler: Child pornography Traitor: Unauthorized leaks of sensitive information Thief: Money laundering and Credit Card Fraud Plagiarist: Copyright infringement
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 28.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. TOR Node Encrypted Alice Bob Jane Unencrypted •Each OR maintains a connection to every other OR •Users run an onion proxy (OP) to fetch directories, establish circuits across the network •Each OR maintains a long & short term onion identity key (10 mins) Port 9001 Port 9090 Port 443
  • 36. TOR Node Encrypted Alice Dave Bob Jane Unencrypted Step 1: Alice’s TOR Client obtains a list of TOR Clients from a directory server Port 9001 Port 9030
  • 37. TOR Node Encrypted Alice Dave Bob Jane Unencrypted Step 2: Alice’s TOR Client picks a random path to a destination server. Green links are encrypted, red links are in the clear Port 443 Port 80
  • 38. TOR Node Encrypted Alice Dave Bob Jane Unencrypted Step 3: If at a later time Alice connects to a different resource then a different, random route is selected. Again Green links are encrypted, red links are in the clear Port 80 Port 443
  • 39. TOR Node Encrypted Unencrypted Security Agencies TOR is a key technology in the fight against organized crime on the internet Illegal Site Agency IP Address Hidden from Site owner
  • 40.
  • 41. TOR Node Encrypted Bob Unencrypted Criminal posts anonymous content out to Compromised Server Compromised Node Police Law Enforcement Monitor suspects client machine (Entry Point)
  • 42. TOR Node Encrypted Target Unencrypted Criminal posts anonymous content onto Server Compromised Node Infected with malicious code Police Law Enforcement Monitors Target client machine (Exit Point) • An exit node has complete access to the content being transmitted from the sender to the recipient • If the message is encrypted by SSL, the exit node cannot read the information, just as any encrypted link over the regular internet
  • 43. TOR Node Encrypted Bob Unencrypted Criminal posts anonymous content out to Compromised Server Compromised Node Police Network Analysis Nodes periodically fail of the network; any chain that remains functioning cannot have been routed through either the nodes that left or the nodes that recently joined the network, increasing the chances of a successful traffic analysis Offline Node
  • 44.
  • 45. Tor is vulnerable to DoS attacks because users can consume more network resources than allowed or render the network unusable for other users. Tor deals with these attacks with Puzzle solving: At beginning of TLS handshake or accepting create cells, this limits the attack multiplier. Limiting rates: Limits rates of accepting of create cell and TLS connections so the computational work of processing them doesn’t disrupt the symmetric cryptography operations that allow cells to flow.

Editor's Notes

  1. Tor (anonymity network) Garlic Routing Anonymous P2P The Amnesic Incognito Live System Degree of anonymity Chaum mixes Bitblinder Java Anonymous Proxy
  2. In 2009 A technical paper was posted on the internet by Satoshi Nakamoto titled Bitcoin: A Peer-to-Peer Electronic Cash System It described a system of cryptocurrency that was not backed by any government or any form of existing currency. Interestingly, there is no such person. It’s a pseudonym. Bitcoins are intended to be digital currency. Buyers and sellers will use them and eliminate all the middlemen such as credit cards, ATM machines, etc. Bitcoins are safer than carrying a plastic card. Bitcoins are an international currency with no exchange transaction fees. Bitcoins have no rules, regulations ,or oversight. To Buy Bitcoins on an Exchange: Create an account at an exchange like Coinbase.com Wire them some money (no credit cards allowed) Funds will show up in your account Purchase or sell Bitcoins whenever you wish from your account. You can have all or some sent to your Bitcoin wallet on your computer Currently there are 60,000 to 70,000 Bitcoin transactions each day The level hasn’t changed significantly in the last year. Log into Blockchain.info to see the transaction activity. Wall Street just opened the “Bitcoin Investment Trust” to speculate in Bitcoin prices without owning the currency. Minimum investment is $25,000. Currently has $70 Million in assets. Expect Wall Street to develop leveraging instruments such as calls, shorts, straddles, etc. Bitcoin transactions are untraceable. Seller doesn’t tell the IRS. Buyer can be anonymous U.S. Treasury and IRS wants it stopped. First big user of Bitcoin was Silk Road It’s very hard to stop Bitcoin – it’s an international scheme.
  3. Edward Joseph Snowden (born June 21, 1983) is an American computer professional, former CIA employee, and former contractor for the federal government who copied and leaked classified information from the NSA in 2013 without prior authorization. His disclosures revealed numerous global surveillance programs, many run by the NSA and Five Eyes with the cooperation of telecommunication companies and European governments. Julian Paul Assange (born 3 July 1971) is an Australian computer programmer, publisher and journalist. He is editor-in-chief of the organization WikiLeaks, which he founded in 2006. Since November 2010, Assange has been subject to extradition to Sweden, where he is wanted for questioning concerning an allegation of rape. Assange denies the allegation and has expressed concern that he will be extradited from Sweden to the United States of America due to his perceived role in publishing secret American documents. After exhausting his legal options in the United Kingdom, Assange failed to surrender for extradition. Instead, he sought and was granted asylum by Ecuador in August 2012. Assange has since remained in Ecuador's London Embassy, unable to leave without being arrested for breaching his bail conditions.