Presentation is loading. Please wait.

Presentation is loading. Please wait.


Similar presentations

Presentation on theme: "DARKNET."— Presentation transcript:


2 Security through layers of encrypted communication between nodes.
tor - the onion router U.S. Navy Communications Data Transmission Security through layers of encrypted communication between nodes.

3 Image Source:


5 Access Through Tor ● “The onion router” ● Similar to a Firefox browser
● Simple, anyone can get it ● Host machine is untraceable ○ Can stay anonymous ○ Can access Darknet ○ Can see .onion extensions




9 Alternative Access with I2P
● The “Invisible Internet Project” ● Messages encrypted ● Outbound and Inbound tunnels ○ Data exchange ● 1st query must be made to I2P network’s “database” ○ Acts like a distributed hash table

10 Access to The Silk Road and Knowledge
● Access to Darknet = Access to Information ○ Onions ○ Government Secrets ○ Conspiracy Theories ● The Silk Road (Market) ○ Weapons and drugs sold ○ 60,000 visits per day ○ $1.9 million in sales every month Image source:

11 Darknet Usage 40,000 sites (fraction of all content…), 22 April 2014

12 Anonymity? Tor designed to hide identity Surface internet browsing
Doesn’t protect against vulnerabilities Server Anonymous Showboating? User’s computers Compromise = exposure Traps? Impossible to be completely anonymous online!

13 Alternatives Lots of reasons not to use Darknet Lavabit Silent Circle
Court order Silent Circle Silent Mail Image source:

14 Takeaways Created by the US gov’t Use the Onion Never anonymous
Secure communications Fraction of the Deep Web Use the Onion Tor/I2P Illegal marketplace Never anonymous Restoring purpose

15 Bibliography Bartlett, Jamie. "Pretty Soon, We Could All Be Using the Dark Net – Telegraph Blogs." Technology Pretty Soon We Could All Be Using the Dark Net Comments. The Telegraph, 22 Apr Web. 27 Apr Chacos, Brad. "Meet Darknet, the Hidden, Anonymous Underbelly of the Searchable Web | PCWorld." PCWorld. PCWorld, 12 Aug Web. 27 Apr Clayton, Nick. "Anonymous Hacktivists Target Child Pornography Sites." Tech Europe. The Wall Street Journal, 24 Oct Web Apr "The Darknet: Surfing on the Brink." Forum Alpbach Medientage The Darknet Surfing on the Brink Comments. N.p., Web. 27 Apr Greenwald, Glenn. " Service Used by Snowden Shuts Itself Down, Warns against Using US-based Companies." Guardian News and Media, 09 Aug Web. 27 Apr "Intro." I2P. Invisible Internet Project, n.d. Web. 27 Apr Kolomi, Rogi. "Dark Net 101." Ask the Computer Guy RSS. N.p., 13 June Web. 27 Apr Mesner, Doug. "Darknet." Darknet. N.p., Web. 27 Apr Syverson, Paul. "Onion Routing." Onion Routing. Historic Mirror of 2005 Onion-router Project, Web. 27 Apr "Tor: Overview." Project: Overview. The Tor Project, n.d. Web. 27 Apr Walsh, Dean. "A Beginner's Guide to Exploring the Darknet." Electronician. HubPages, 24 Apr Web. 27 Apr "The World's Most Secure Solution in Mobile Privacy." Silent Circle. N.p., Web. 27 Apr

Download ppt "DARKNET."

Similar presentations

Ads by Google