SlideShare a Scribd company logo
1 of 38
The Deep Web
PRESENTED BY ABHIMANYU SINGH
1308210005; MIT MORADABAD
1
Contents
Introduction
Contents of Deep Web
Accessing Deep Web
Advisement
Deep Web vs. Surface Web
Importance of Anonymity and Privacy
Conclusion
2
Introduction
WHAT IS DEEP WEB?
3
Surface Web
Surface Web is that portion of the World Wide Web that is
indexable by standard search engines.
It is also called the Clear Net, Visible Web or Indexable Web.
Under constant surveillance by the Government and ISPs.
4
Deep Web
Deep Web is the content that cannot be indexed by
standard search engines.
It is also called the Deep Net, Invisible Web or Hidden
Web.
Estimated 400-550 times more data than the Surface Web.
Used by all sorts of people to stay anonymous, including
Journalists, Whistle Blowers, Politicians, etc.
5
Visualisation
The Surface Web
Deep Web
6
Visualisation 2 7
Internet; Deep Web; Dark
Web
Internet
Accessible, Indexed
Dark Web
Restricted, Non-indexed
Deep Web
Accessible, Non-indexed
8
Contents of the
Deep Web
WHAT’S INSIDE THE HIDDEN PART OF THE WEB?
9
Contents [1] 10
• Dynamic pages which are returned in response to a submitted
query or accessed only through a form.
Dynamic Content
• Pages which are not linked to by other pages
• These pages are referred to as pages without backlinks.
Unlinked Content
• Sites that require registration and login
• All password protected resources.
Private Web
Contents [2] 11
• Pages with content varying for different access contexts.
Contextual Web
• Sites that limit access to their pages in a technical way using Robots
Exclusion Standard.
• Example: Websites secured by Captcha codes.
Limited Access Content
• Pages that are only accessible through links produced by JavaScript
• Content dynamically downloaded from Web Servers via Flash or Ajax
Scripted Content
Inside the Deep Web: Content
which is explicitly hidden
12
Presence of hidden networks such as TOR, I2P, Free net.
The Deep Web may be a Shadow Land of untapped
potential.
The bad stuff, as always, gets most of the headlines.
You can find illegal goods and activities of all kinds
through Dark Web
Silk Road 13
Bitcoin e-Wallet Service 14
Hitman Network 15
The Hidden Wiki 16
You won’t find this
information in a Google
search!
These kinds of Websites require you to use a special software,
such as The Onion Router, more commonly known as the TOR
Browser.
17
Accessing the
Deep Web
TECHNIQUES TO HAVE ANONYMITY AND ACCESS TO
THE HIDDEN WEB
18
The Onion Router (TOR) 19
TOR Browser Bundle installs into your Web browser and sets it
up to access Dark Websites.
Technically, it is a free software for enabling online Anonymity
and Censorship Resistance.
All websites on the TOR hidden network have a .onion address.
TOR Installation 20
How TOR works? 21
• Data passes through a circuit of at least three different routers.
• The data that passes through the network is encrypted. But at
the end nodes there is no encryption.
User
R1
R2
R3
R4
R5
R6
Server
1
Server
2
TOR Network Circuit 22
• “This browser” is the entry node.
• The system connected in France is the exit node.
Onion-Routing 23
An example Onion
24
• ’Source’ negotiates an AES key with each router.
• Messages are divided into equal sized cells.
• Each router knows only its predecessor and successor .
• Only the Exit router can see the message,
however it does not know where the message is from.
Format of a cell 25
CircID Relay StreamID Digest Len DATA
2 1 2 6 2 498
• TOR implements Perfect Forward Secrecy (PFC) by using AES encryption.
• In AES (Advanced Encryption Standard), a private key is generated and
shared between the two users, and from this key, session keys are
generated.
• Original key-pairs are only used for signatures (i.e. to verify the authenticity of
messages).
Advisement
THINGS TO REMEMBER WHILE SURFING DEEP WEB/
USING TOR
26
27
• Disable JavaScript and Flash content in the browser
while surfing in the Dark Web.
• Never log in with any of your real digital accounts
using TOR, it’ll be against the Anonymity.
• Prevent yourself from getting carried away into illicit
activities.
Vulnerabilities
 While the inter-relay communications might be secure,
the entry and exit nodes are vulnerable to packet
sniffing.
 The exit node decrypts the packet it received from its
sibling on the chain of nodes and receives your full
plaintext request. This can be easily seen by the
operator of the exit node.
28
29
Deep Web vs.
Surface Web
WHY ARE WE CONSIDERING THE DEEP WEB?
30
The Internet is facing 3 main
threats.
• Every activity online is under constant surveillance by Government and the ISPS.
• Xkeyscore program! It sees everything.
NSA Revelations
• If you think something is free, it inevitably isn’t. “If you’re not paying, YOU are the
product”
• Our online activities get tracked and harvested for money.
Rampant Commercialisation
• You can easily purchase a service which can track and cause harm to you digitally; to a
great extent.
• All your information is out there vulnerable to Cyber Crime.
Criminals and Stalkers.
31
32
Edward Snowden
“I DON’T WANT TO LIVE IN
A WORLD WHERE
EVERYTHING THAT I SAY,
EVERYTHING I DO,
EVERYONE I TALK TO ,
EVERY EXPRESSION OF
CREATIVITY OR LOVE OR
FRIENDSHIP IS BEING
RECORDED”
• The man who is responsible for the NSA revelations.
• He showed the world how everything digital is been
surveillance and recorded by the Governments.
Even Microsoft Windows! 33
Privacy Policy of Windows 10 Operating System
We can learn and choose to
be ANONYMOUS.
34
• In an age where NSA-type surveillance is
omnipresent and privacy seems like a thing
of the past, the Dark Web offers some relief
to people who prioritize their anonymity.
• By masking our activities, we can prevent
people from monitoring us, following us or
doing us harm.
DuckDuckGo Search Engine 35
Conclusion 36
We’re looking at the end of the internet, as we know it.
It’s growing into a two tier-internet. One being a toll highway
and another being a slow freeway.
But we can do something about it. We can all go Deep Web.
It’s not a place. It’s a state of mind, a way of being; being
Anonymous and safe.
References
 http://en.wikipedia.org/wiki/Deep_Web
 https://en.wikipedia.org/wiki/Tor_(anonymity_network)
 https://www.torproject.org/
 Adrian Lamo’s answer to “What is Deep Web” on Quora.
 Alen Pearce TEDx Talks
https://www.youtube.com/watch?v=Va07q3HFEZQ
 Kyle Terry TEDx Talks
https://www.youtube.com/watch?v=HfuZJVpNWR4
 Alex Winter TEDx Talks
https://www.youtube.com/watch?v=luvthTjC0OI
 http://computer.howstuffworks.com/internet/basics/how-the-
deep-web- works5.htm
 Citizenfour Documentary
37
Any Questions?
THANK YOU
38

More Related Content

What's hot

Deep Web
Deep WebDeep Web
Deep WebSt John
 
The dark web
The dark webThe dark web
The dark webBella M
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep webKhaled Sany
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth YuKenny Yu
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark webJisc
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNetJames Bollen
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine ImpasClaudine Impas
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentationalbafg55
 

What's hot (20)

Deep Web
Deep WebDeep Web
Deep Web
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
The dark web
The dark webThe dark web
The dark web
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
Dark Web
Dark WebDark Web
Dark Web
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
Deep web
Deep webDeep web
Deep web
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Dark web
Dark webDark web
Dark web
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 

Similar to The Deep Web, TOR Network and Internet Anonymity

The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Darkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxDarkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxJamalAmzil6
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterMohammed Bharmal
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosisP-e-t-a-r
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfAuto Parts Wholesale Online
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebNicholas Davis
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfTopLinkSeo
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Auto Parts Wholesale Online
 

Similar to The Deep Web, TOR Network and Internet Anonymity (20)

Deep web
Deep webDeep web
Deep web
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Darkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxDarkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptx
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Darknet
DarknetDarknet
Darknet
 
Darkweb
DarkwebDarkweb
Darkweb
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Darknet
DarknetDarknet
Darknet
 
78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosis
 
Dw communication
Dw communicationDw communication
Dw communication
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep Web
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdf
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
 

Recently uploaded

Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 

Recently uploaded (20)

Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 

The Deep Web, TOR Network and Internet Anonymity

  • 1. The Deep Web PRESENTED BY ABHIMANYU SINGH 1308210005; MIT MORADABAD 1
  • 2. Contents Introduction Contents of Deep Web Accessing Deep Web Advisement Deep Web vs. Surface Web Importance of Anonymity and Privacy Conclusion 2
  • 4. Surface Web Surface Web is that portion of the World Wide Web that is indexable by standard search engines. It is also called the Clear Net, Visible Web or Indexable Web. Under constant surveillance by the Government and ISPs. 4
  • 5. Deep Web Deep Web is the content that cannot be indexed by standard search engines. It is also called the Deep Net, Invisible Web or Hidden Web. Estimated 400-550 times more data than the Surface Web. Used by all sorts of people to stay anonymous, including Journalists, Whistle Blowers, Politicians, etc. 5
  • 8. Internet; Deep Web; Dark Web Internet Accessible, Indexed Dark Web Restricted, Non-indexed Deep Web Accessible, Non-indexed 8
  • 9. Contents of the Deep Web WHAT’S INSIDE THE HIDDEN PART OF THE WEB? 9
  • 10. Contents [1] 10 • Dynamic pages which are returned in response to a submitted query or accessed only through a form. Dynamic Content • Pages which are not linked to by other pages • These pages are referred to as pages without backlinks. Unlinked Content • Sites that require registration and login • All password protected resources. Private Web
  • 11. Contents [2] 11 • Pages with content varying for different access contexts. Contextual Web • Sites that limit access to their pages in a technical way using Robots Exclusion Standard. • Example: Websites secured by Captcha codes. Limited Access Content • Pages that are only accessible through links produced by JavaScript • Content dynamically downloaded from Web Servers via Flash or Ajax Scripted Content
  • 12. Inside the Deep Web: Content which is explicitly hidden 12 Presence of hidden networks such as TOR, I2P, Free net. The Deep Web may be a Shadow Land of untapped potential. The bad stuff, as always, gets most of the headlines. You can find illegal goods and activities of all kinds through Dark Web
  • 17. You won’t find this information in a Google search! These kinds of Websites require you to use a special software, such as The Onion Router, more commonly known as the TOR Browser. 17
  • 18. Accessing the Deep Web TECHNIQUES TO HAVE ANONYMITY AND ACCESS TO THE HIDDEN WEB 18
  • 19. The Onion Router (TOR) 19 TOR Browser Bundle installs into your Web browser and sets it up to access Dark Websites. Technically, it is a free software for enabling online Anonymity and Censorship Resistance. All websites on the TOR hidden network have a .onion address.
  • 21. How TOR works? 21 • Data passes through a circuit of at least three different routers. • The data that passes through the network is encrypted. But at the end nodes there is no encryption. User R1 R2 R3 R4 R5 R6 Server 1 Server 2
  • 22. TOR Network Circuit 22 • “This browser” is the entry node. • The system connected in France is the exit node.
  • 24. 24 • ’Source’ negotiates an AES key with each router. • Messages are divided into equal sized cells. • Each router knows only its predecessor and successor . • Only the Exit router can see the message, however it does not know where the message is from.
  • 25. Format of a cell 25 CircID Relay StreamID Digest Len DATA 2 1 2 6 2 498 • TOR implements Perfect Forward Secrecy (PFC) by using AES encryption. • In AES (Advanced Encryption Standard), a private key is generated and shared between the two users, and from this key, session keys are generated. • Original key-pairs are only used for signatures (i.e. to verify the authenticity of messages).
  • 26. Advisement THINGS TO REMEMBER WHILE SURFING DEEP WEB/ USING TOR 26
  • 27. 27 • Disable JavaScript and Flash content in the browser while surfing in the Dark Web. • Never log in with any of your real digital accounts using TOR, it’ll be against the Anonymity. • Prevent yourself from getting carried away into illicit activities.
  • 28. Vulnerabilities  While the inter-relay communications might be secure, the entry and exit nodes are vulnerable to packet sniffing.  The exit node decrypts the packet it received from its sibling on the chain of nodes and receives your full plaintext request. This can be easily seen by the operator of the exit node. 28
  • 29. 29
  • 30. Deep Web vs. Surface Web WHY ARE WE CONSIDERING THE DEEP WEB? 30
  • 31. The Internet is facing 3 main threats. • Every activity online is under constant surveillance by Government and the ISPS. • Xkeyscore program! It sees everything. NSA Revelations • If you think something is free, it inevitably isn’t. “If you’re not paying, YOU are the product” • Our online activities get tracked and harvested for money. Rampant Commercialisation • You can easily purchase a service which can track and cause harm to you digitally; to a great extent. • All your information is out there vulnerable to Cyber Crime. Criminals and Stalkers. 31
  • 32. 32 Edward Snowden “I DON’T WANT TO LIVE IN A WORLD WHERE EVERYTHING THAT I SAY, EVERYTHING I DO, EVERYONE I TALK TO , EVERY EXPRESSION OF CREATIVITY OR LOVE OR FRIENDSHIP IS BEING RECORDED” • The man who is responsible for the NSA revelations. • He showed the world how everything digital is been surveillance and recorded by the Governments.
  • 33. Even Microsoft Windows! 33 Privacy Policy of Windows 10 Operating System
  • 34. We can learn and choose to be ANONYMOUS. 34 • In an age where NSA-type surveillance is omnipresent and privacy seems like a thing of the past, the Dark Web offers some relief to people who prioritize their anonymity. • By masking our activities, we can prevent people from monitoring us, following us or doing us harm.
  • 36. Conclusion 36 We’re looking at the end of the internet, as we know it. It’s growing into a two tier-internet. One being a toll highway and another being a slow freeway. But we can do something about it. We can all go Deep Web. It’s not a place. It’s a state of mind, a way of being; being Anonymous and safe.
  • 37. References  http://en.wikipedia.org/wiki/Deep_Web  https://en.wikipedia.org/wiki/Tor_(anonymity_network)  https://www.torproject.org/  Adrian Lamo’s answer to “What is Deep Web” on Quora.  Alen Pearce TEDx Talks https://www.youtube.com/watch?v=Va07q3HFEZQ  Kyle Terry TEDx Talks https://www.youtube.com/watch?v=HfuZJVpNWR4  Alex Winter TEDx Talks https://www.youtube.com/watch?v=luvthTjC0OI  http://computer.howstuffworks.com/internet/basics/how-the- deep-web- works5.htm  Citizenfour Documentary 37

Editor's Notes

  1. >>In 1994 Jill Ellsworth used the term invisible web to refer to the websites that were not registered with any search engines. >>In 2000 Computer Scientist Mike Bergman used the term “Deep Web” in a NewYorkTimes article.
  2. >>Private Web: All content that requires authentication.
  3. >>Contextual Web Content: Location based result by client IP; or; result by previous navigation sequence. >> Limited Access Content: these sites prevents the search engines from creating cached copies. An Internet bot, also known as web robot, WWW robot or simply bot, is a software application that runs automated tasks (scripts) over theInternet.
  4. >>Bad stuff on dark web: illicit drugs, stolen credit card numbers, human trafficking, weapons, copyrighted media and anything else you can think of.
  5. Point is not to let you know about the illegal stuff, but to emphasise on a very crucial
  6. All sorts of people use them for anonymity. Journalists, Politicians, whistle-blowers, dissidents. whistleblower is a person who exposes any kind of information or activity that is deemed illegal, unethical, or not correct Dissident a person who opposes official policy.
  7. TOR- Node based, decentralized anonymity network. US NAVAL Research; 80% of their budget still comes from US Government. Websites have a .onion address
  8. R[i] are network relays. Relay is a Fixed stationor a mobile station that receives signals and rebroadcasts them at the same or a different frequency Your system could be a relay unknowingly.
  9. AES: Advanced Encryption Standard
  10. CircID: ID of the complete circuit Relay: RelayID of a particular Relay Node StreamID: ID of the data stream. Digest: SHA-1 produces a 160-bit (20-byte) hash value known as a message digest. (for integrity checking at the edges of the stream).
  11. Don’t use TOR alone, use some VPN service as well. Preferrably try not to use it on windows.
  12. Rampant Commercialization: Rampant means something unwelcomed, flourishing or spreading unchecked. NSA Revelations: Why are the surveillancing? Because they can.Every govt wants to know what it’s people are saying or thinking. “Information is power”
  13. Snowden: Former CIA employee. Worked on contract bases for “Classified” surveillance programs of NSA.
  14. You’re made to agree to this policy in the end-user agreement, at the tie of installation.
  15. We can change our digital practices such as Email, Search Engines, etc. DuckDuckGo is a search engine that doesn’t keep track of your searches. Similarly you can use different services.
  16. Doesn’t track your online searches. Good alternate to Google, something you can rely on,