SlideShare uma empresa Scribd logo
1 de 8
Darknet
ALPHONSE VALENZUELA
What is the darknet?
 The darknet is an area of the web that is invisible to

most internet users
 It may be even larger than the surface web (or the
web which is seen by most users through search
engines such as google)
 Most users do not have direct access to the darknet
or the invisible web
Accessing the invisible web
 The invisible web can be accessed through “special

browsers” such as TOR
 These special browsers allow users to access both the
surface web and the invisible web without allowing
others (such as intelligence agencies) to track his or
her history
 These browsers do this by bouncing around the IP
address with encrypted codes of the user throughout
the globe which makes it difficult for anyone to track
the original origin
How to access the invisible web
 Certain search engines allow users to view pages in

the invisible web
 The invisible web is usually accessed through
browsers that use encrypted codes
 Ex. TOR
Negative Implications
 The invisible web usually has negative implications
 This is because the invisible web is very difficult to

regulate thus resulting into many illegal activities
 Ex. Drug dealing (silkroad), child pornography, black
market trading
Positive Implications
 There are a few positive implications associated with

the invisible web
 The invisible web is often used by journalists that
fear prosecution from government
 Freedom of information is encouraged through the
invisible web
 Due to the freedom of information made possible by
the invisible web, facts regarding oppression in many
parts of the world can be shared
Trend (2014)
 Illegal activities in the invisible web will continue
 More users will gain access to the invisible web

because of its gaining popularity
 Journalist in countries with regulated internet will
continue to share information that may affect
political matters
 More and more false information will spread in the
invisible web
Trend (2015)
 Government agencies will crack down on many

illegal activities done in the invisible web
 The invisible web will begin to see its downfall as
many governments will see the potential risk of
allowing the invisible web to continue
 Special government agencies will find more ways to
regulate the invisible web
 The rapid development of technology will allow
government agencies to track users of the invisible
web

Mais conteúdo relacionado

Destaque (7)

Darknet: We Are Not Alone
Darknet: We Are Not AloneDarknet: We Are Not Alone
Darknet: We Are Not Alone
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknet
 
Darknet - Jerv Marquez
Darknet - Jerv MarquezDarknet - Jerv Marquez
Darknet - Jerv Marquez
 
Tor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden SitesTor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden Sites
 
Darknet
DarknetDarknet
Darknet
 
Darknet
DarknetDarknet
Darknet
 
Darknet
DarknetDarknet
Darknet
 

Semelhante a The DarkNet

darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Geetha982072
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
Gavin O'Toole
 
Artificial Intelligence On The Dark Web
Artificial Intelligence On The Dark WebArtificial Intelligence On The Dark Web
Artificial Intelligence On The Dark Web
abraxasdarknetmarket
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic Se
OllieShoresna
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)
itgsabc
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 

Semelhante a The DarkNet (20)

Deep web
Deep webDeep web
Deep web
 
Dark web
Dark webDark web
Dark web
 
Deep web
Deep webDeep web
Deep web
 
5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web
 
Darknet
DarknetDarknet
Darknet
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Dark Web Site.pdf
Dark Web Site.pdfDark Web Site.pdf
Dark Web Site.pdf
 
Deep web
Deep webDeep web
Deep web
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
 
Artificial Intelligence On The Dark Web
Artificial Intelligence On The Dark WebArtificial Intelligence On The Dark Web
Artificial Intelligence On The Dark Web
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic Se
 
Social Impacts of Computing Science
Social Impacts of Computing ScienceSocial Impacts of Computing Science
Social Impacts of Computing Science
 
The Internet and World Wide Web
The Internet and World Wide Web The Internet and World Wide Web
The Internet and World Wide Web
 
What Is Dark Web.docx
What Is Dark Web.docxWhat Is Dark Web.docx
What Is Dark Web.docx
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)
 
How To Use The Agora URL Properly
How To Use The Agora URL ProperlyHow To Use The Agora URL Properly
How To Use The Agora URL Properly
 
Dw communication
Dw communicationDw communication
Dw communication
 
Lurking Beneath The Internet
Lurking Beneath The InternetLurking Beneath The Internet
Lurking Beneath The Internet
 
Dark Net
Dark NetDark Net
Dark Net
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 

Último

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

The DarkNet

  • 2. What is the darknet?  The darknet is an area of the web that is invisible to most internet users  It may be even larger than the surface web (or the web which is seen by most users through search engines such as google)  Most users do not have direct access to the darknet or the invisible web
  • 3. Accessing the invisible web  The invisible web can be accessed through “special browsers” such as TOR  These special browsers allow users to access both the surface web and the invisible web without allowing others (such as intelligence agencies) to track his or her history  These browsers do this by bouncing around the IP address with encrypted codes of the user throughout the globe which makes it difficult for anyone to track the original origin
  • 4. How to access the invisible web  Certain search engines allow users to view pages in the invisible web  The invisible web is usually accessed through browsers that use encrypted codes  Ex. TOR
  • 5. Negative Implications  The invisible web usually has negative implications  This is because the invisible web is very difficult to regulate thus resulting into many illegal activities  Ex. Drug dealing (silkroad), child pornography, black market trading
  • 6. Positive Implications  There are a few positive implications associated with the invisible web  The invisible web is often used by journalists that fear prosecution from government  Freedom of information is encouraged through the invisible web  Due to the freedom of information made possible by the invisible web, facts regarding oppression in many parts of the world can be shared
  • 7. Trend (2014)  Illegal activities in the invisible web will continue  More users will gain access to the invisible web because of its gaining popularity  Journalist in countries with regulated internet will continue to share information that may affect political matters  More and more false information will spread in the invisible web
  • 8. Trend (2015)  Government agencies will crack down on many illegal activities done in the invisible web  The invisible web will begin to see its downfall as many governments will see the potential risk of allowing the invisible web to continue  Special government agencies will find more ways to regulate the invisible web  The rapid development of technology will allow government agencies to track users of the invisible web

Notas do Editor

  1. https://www.torproject.org/about/overview.html.enMany illegal activities have been exposed in the invisible web. An example of this would be silkroad and other child pornography sites caught by the FBI. These are some of the risks connected to an unregulated database.
  2. Other individuals do not have a choice but to release information in the invisible web because of fear of prosecution from states. This is helpful to the global community in order for us to realize the different political/social issues around the world