SlideShare uma empresa Scribd logo
1 de 10
What is Dark Web ?
• Basically 3 parts of WWW :
1. Surface Web
2. Deep Web
3. Dark Web
• Surface Web :
 Publicly Available & Accessible
• Deep Web :
 Invisible Web , inaccessible by Web Crawlers.
 Not indexed by Standard Search Engines.
 500 times > Surface Web
• Dark Web :
 Tiny Part of Deep Web
 Accessible by specialized Software such as Tor
Browser
 Used for anonymous communication and
illegal activities.
Who Uses Dark Web ?
• Anonymous Nature
• Instrumental Role in illegal activities :
 Child Pornography
 Sale of Drugs
 Fraud Services
 Phishing and Scams
 Terrorism
 Hoaxes and Unverified Content
• Case Study : Silk Road
 First online Black Market
 Platform for selling Illegal Drugs
 Operated as Tor’s Hidden Service
 Transaction carried By Bitcoins (BTC)
 Shutdown By F.B.I
• Journalists and activists also use the dark web
to avoid being traced by autocratic
governments
How to access Dark Web ?
• Tools : Tor Browser
• Access websites whose address
ends with .onion extension
• Anonymizes Browser Traffic
• Establishes secure communications
• Slower than Normal Browsers
• Protects from Eavesdropping and
Surveillance
• Has Social Contracts with users
• Tor network is growing quickly
What is Onion Routing ?
• Onion routing is a technique
for anonymous communication over
a computer network.
• In an onion network, messages are
encapsulated in layers of encryption,
analogous to layers of an onion.
• The encrypted data is transmitted through a
series of network nodes called onion
routers, each of which "peels" away a single
layer, uncovering the data's next destination.
• When the final layer is decrypted, the
message arrives at its destination.
• The sender remains anonymous because
each intermediary knows only the location
of the immediately preceding and following
nodes.
• There are methods to break the anonymity
of this technique, e.g. timing analysis.
Illegal Marketing Statistics
Introduction To Dark Web
Introduction To Dark Web

Mais conteúdo relacionado

Mais procurados

Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
James Bollen
 

Mais procurados (20)

PPT dark web
PPT dark webPPT dark web
PPT dark web
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
The dark web
The dark webThe dark web
The dark web
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Dark Web
Dark WebDark Web
Dark Web
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Dark wed
Dark wedDark wed
Dark wed
 
Deep web
Deep webDeep web
Deep web
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
Dark net
Dark netDark net
Dark net
 

Semelhante a Introduction To Dark Web

Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint file
raevenroxas
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Auto Parts Wholesale Online
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Geetha982072
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
Fabio Pietrosanti
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Auto Parts Wholesale Online
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Auto Parts Wholesale Online
 

Semelhante a Introduction To Dark Web (20)

Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint file
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
 
.Onion
.Onion.Onion
.Onion
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdf
 
Darknet
DarknetDarknet
Darknet
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
 
Deep Web
Deep WebDeep Web
Deep Web
 
Anonymous traffic network
Anonymous traffic networkAnonymous traffic network
Anonymous traffic network
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
 
Tor browser
Tor browserTor browser
Tor browser
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Onion protocol
Onion protocolOnion protocol
Onion protocol
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Introduction To Dark Web

  • 1.
  • 2. What is Dark Web ? • Basically 3 parts of WWW : 1. Surface Web 2. Deep Web 3. Dark Web • Surface Web :  Publicly Available & Accessible • Deep Web :  Invisible Web , inaccessible by Web Crawlers.  Not indexed by Standard Search Engines.  500 times > Surface Web • Dark Web :  Tiny Part of Deep Web  Accessible by specialized Software such as Tor Browser  Used for anonymous communication and illegal activities.
  • 3. Who Uses Dark Web ? • Anonymous Nature • Instrumental Role in illegal activities :  Child Pornography  Sale of Drugs  Fraud Services  Phishing and Scams  Terrorism  Hoaxes and Unverified Content • Case Study : Silk Road  First online Black Market  Platform for selling Illegal Drugs  Operated as Tor’s Hidden Service  Transaction carried By Bitcoins (BTC)  Shutdown By F.B.I • Journalists and activists also use the dark web to avoid being traced by autocratic governments
  • 4.
  • 5. How to access Dark Web ? • Tools : Tor Browser • Access websites whose address ends with .onion extension • Anonymizes Browser Traffic • Establishes secure communications • Slower than Normal Browsers • Protects from Eavesdropping and Surveillance • Has Social Contracts with users • Tor network is growing quickly
  • 6.
  • 7. What is Onion Routing ? • Onion routing is a technique for anonymous communication over a computer network. • In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion. • The encrypted data is transmitted through a series of network nodes called onion routers, each of which "peels" away a single layer, uncovering the data's next destination. • When the final layer is decrypted, the message arrives at its destination. • The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes. • There are methods to break the anonymity of this technique, e.g. timing analysis.