Presentation is loading. Please wait.

Presentation is loading. Please wait.

DARKNET. ●tor - the onion router ○U.S. Navy ■Communications ■Data Transmission ○Security through layers of encrypted communication between nodes. https://www.torproject.org/index.html.en.

Similar presentations


Presentation on theme: "DARKNET. ●tor - the onion router ○U.S. Navy ■Communications ■Data Transmission ○Security through layers of encrypted communication between nodes. https://www.torproject.org/index.html.en."— Presentation transcript:

1 DARKNET

2 ●tor - the onion router ○U.S. Navy ■Communications ■Data Transmission ○Security through layers of encrypted communication between nodes. https://www.torproject.org/index.html.en

3 Image Source: darknet-the-hidden-anonymous-underbelly-of- the-searchable-web.html

4

5 Access Through Tor ● “The onion router” ● Similar to a Firefox browser ● Simple, anyone can get it ● Host machine is untraceable ○ Can stay anonymous ○ Can access Darknet ○ Can see.onion extensions

6

7

8

9 Alternative Access with I2P ● The “Invisible Internet Project” ● Messages encrypted ● Outbound and Inbound tunnels ○ Data exchange ● 1st query must be made to I2P network’s “database” ○ Acts like a distributed hash table

10 Access to The Silk Road and Knowledge ● Access to Darknet = Access to Information ○ Onions ○ Government Secrets ○ Conspiracy Theories ● The Silk Road (Market) ○ Weapons and drugs sold ○ 60,000 visits per day ○ $1.9 million in sales every month Image source: content/uploads/2013/01/00_lead_image_encrypted_ .png

11 telegraph.co.uk, 22 April 2014 Darknet Usage

12 Anonymity? Tor designed to hide identity Surface internet browsing Doesn’t protect against vulnerabilities o Server  Anonymous  Showboating? o User’s computers  Compromise = exposure  Traps? Impossible to be completely anonymous online!

13 Alternatives Lots of reasons not to use Darknet Lavabit o Court order Silent Circle o Silent Mail Image source:

14 Takeaways Created by the US gov’t Secure communications Fraction of the Deep Web Use the Onion Tor/I2P Illegal marketplace Never anonymous Restoring purpose

15 Bibliography Bartlett, Jamie. "Pretty Soon, We Could All Be Using the Dark Net – Telegraph Blogs." Technology Pretty Soon We Could All Be Using the Dark Net Comments. The Telegraph, 22 Apr Web. 27 Apr Chacos, Brad. "Meet Darknet, the Hidden, Anonymous Underbelly of the Searchable Web | PCWorld." PCWorld. PCWorld, 12 Aug Web. 27 Apr Clayton, Nick. "Anonymous Hacktivists Target Child Pornography Sites." Tech Europe. The Wall Street Journal, 24 Oct Web. 27 Apr "The Darknet: Surfing on the Brink." Forum Alpbach Medientage The Darknet Surfing on the Brink Comments. N.p., Web. 27 Apr Greenwald, Glenn. " Service Used by Snowden Shuts Itself Down, Warns against Using US-based Companies." Theguardian.com. Guardian News and Media, 09 Aug Web. 27 Apr "Intro." I2P. Invisible Internet Project, n.d. Web. 27 Apr Kolomi, Rogi. "Dark Net 101." Ask the Computer Guy RSS. N.p., 13 June Web. 27 Apr Mesner, Doug. "Darknet." Darknet. N.p., Web. 27 Apr Syverson, Paul. "Onion Routing." Onion Routing. Historic Mirror of 2005 Onion-router Project, Web. 27 Apr "Tor: Overview." Project: Overview. The Tor Project, n.d. Web. 27 Apr Walsh, Dean. "A Beginner's Guide to Exploring the Darknet." Electronician. HubPages, 24 Apr Web. 27 Apr "The World's Most Secure Solution in Mobile Privacy." Silent Circle. N.p., Web. 27 Apr


Download ppt "DARKNET. ●tor - the onion router ○U.S. Navy ■Communications ■Data Transmission ○Security through layers of encrypted communication between nodes. https://www.torproject.org/index.html.en."

Similar presentations


Ads by Google