SlideShare uma empresa Scribd logo
1 de 26
Introduction
Table of contents
01
02
03
04
05
06
07
08
Introduction
Parts of the internet
Dark web anonymity
systems
Dark Web / Darknet
Timeline of the Deep Web
Risks of going on the dark
web
Precaution of visiting
the dark web
Illegality of dark web
What are the different parts
of the internet?
02
03
DARK WEB ANONYMITY
SYSTEMS
TOR
TOR browser logo
SOFTWARE USED TO PROTECT USERS BY
MAKING COMMUNICATIONS HARD TO
TRACE.
BOUNCES COMMUNICATIONS TO DIFFERENT
NODES LOCATED ALL AROUND THE WORLD
USES ENCRYPTION IN THE APPLICATION
LAYER.
HIDES LOCATION THROUGH MANY
NETWORK RELAYS.
HIDDEN WEBSITES USE THE ".ONION" SUFFIX
FREENET
FREENET
browser logo
MIX BETWEEN PEER TO PEER AND
CLIENTSEVER
DE-CENTRALIZED SERVERS & DATA
USES PEERS TO HOST NODES WHICH
STORE OTHER USER'S ENCRYPTED DATA
NO WAY TO TELL IF DATA IS LEGAL OR
ILLEGAL
DE-CENTRALIZED DATA MAKES IT HARDER
TO HACK INTO
Silk Road RELODED
I2P browser logo
The original "Silk Road" website was located on Tor
Servers. Some think Tor has been compromised
A new website "Silk Road Reloaded“ appeared on a
different dark web network called I2P
I2P uses a peer-to-peer approach where "Essentially all
peers participate in routing for others“
Supports various online currencies other than Bitcoin
such as Anoncoin, Darkcoin, Dogecoin and can convert
currencies for users for a small fee
04
Dark Web / Darknet
The homepage of
Agora, a popular
dark market.
*http://www.coindesk.com/dark-markets-grow-bigger-bolder-year-since-silk-road-bust/
More Dark Web Market
Listing Examples:
*http://www.businessinsider.com/dark-web-whats-for-sale-2015-4
05
Timeline of the Deep Web
Timeline of the Deep Web
Silk Road Market launches
“Satoshi Nakamoto” started
Bitcoin digital currency
The I2P peer-to-peer network
developed
Tor Network developed by US Naval
Research Laboratory
2002
2003
2009
2011
06
Is the Dark Web Dangerous?
07
SECURITY PRECAUTIONS WHEN
VISITING THE DARK WEB
SECURITY PRECAUTIONS WHEN VISITING THE
DARK WEB
• DON'T TRUST ANYONE
• COVER YOUR WEBCAM WITH TAPE
• DON'T DOWNLOAD ANYTHING
• CHECK THAT YOUR VIRTUAL PRIVATE
NETWORK
(VPN) IS WORKING
• USE PROXIES
• ANONYMOUS OPERATING SYSTEMS
• TAILS
• WHONIX
• JONDO
• INTERNET CAFE
08
Is the Dark Web Illegal?
Q & A
QUESTION 1
WHAT IS THE DIFFERENCE BETWEEN THE DEEP WEB AND THE DARK WEB?
ANSWER:
THE DARK WEB IS A SUBCOMPONENT OF THE DEEP WEB AND CAN ONLY
BE ACCESSED BY A SPECIAL BROWSER OR UTILITY
QUESTION 2
ANSWER:
WHAT SAFETY PRECAUTIONS SHOULD YOU TAKE IF YOU WERE TO VISIT THE
DARK WEB?
DON'T TRUST ANYONE, COVER YOUR WEBCAM, DON'T DOWNLOAD ANYTHING,
CHECK THAT YOUR VPN IS WORKING
QUESTION 3
ANSWER:
THROUGH WHAT METHODS DOES THE TOR BROWSER ATTEMPT TO ENSURE
ANONYMITY OF ITS USERS IDENTITY AND INTERNET USAGE?
THE TOR BROWSER ENCRYPTS COMMUNICATION DATA AND THEN SENDS THE
INFORMATION THROUGH MULTIPLE RANDOM TOR RELAYS (NODES) SCATTERED
ACROSS THE GLOBE BEFORE REACHING ITS DESTINATION
Conclusion
REFERENCES
• https://www.sans.org/reading-room/whitepapers/covert/ocean-internet-
deep-web-37012
• https://media.scmagazine.com/documents/224/deeplight_(1)_55856.pdf
• https://www.trendmicro.com/cloud-content/us/pdfs/security-
intelligence/whitepapers/wp_below_the_surface.pdf
• http://www.batblue.com/the-darknet/
• http://celarc.ca/cppc/247/247804.pdf
• http://www.cs.princeton.edu/courses/archive/spr09/cos423/Lectures/mtf.pdf
• https://www.quora.com/Why-cant-the-police-stop-the-deep-web
• https://www.deepdotweb.com/2014/12/22/ethics-deep-web/
• http://fieldguide.gizmodo.com/how-to-search-the-deep-web-safely-
1770828854
• http://www.guidingtech.com/50281/dos-donts-deep-web-surfing
1
Thank you

Mais conteúdo relacionado

Semelhante a Darkle Slideshow _ by Slidesgo.pptx

darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark webJisc
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterMohammed Bharmal
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep WebIRJET Journal
 
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxhelzerpatrina
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!TalhaMTZ
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebNicholas Davis
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfAuto Parts Wholesale Online
 
seminar PowerPoint Presentation.pptx
seminar  PowerPoint Presentation.pptxseminar  PowerPoint Presentation.pptx
seminar PowerPoint Presentation.pptxSriHarshaThirumala
 
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceDEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceFelipe Prado
 

Semelhante a Darkle Slideshow _ by Slidesgo.pptx (20)

darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
Darknet
DarknetDarknet
Darknet
 
Tor Browser
Tor BrowserTor Browser
Tor Browser
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Dark Web.pdf
Dark Web.pdfDark Web.pdf
Dark Web.pdf
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Dark web
Dark webDark web
Dark web
 
How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep Web
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Dark web (1)
Dark web (1)Dark web (1)
Dark web (1)
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
 
seminar PowerPoint Presentation.pptx
seminar  PowerPoint Presentation.pptxseminar  PowerPoint Presentation.pptx
seminar PowerPoint Presentation.pptx
 
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceDEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
 

Último

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 

Último (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 

Darkle Slideshow _ by Slidesgo.pptx

  • 1.
  • 3.
  • 4. Table of contents 01 02 03 04 05 06 07 08 Introduction Parts of the internet Dark web anonymity systems Dark Web / Darknet Timeline of the Deep Web Risks of going on the dark web Precaution of visiting the dark web Illegality of dark web
  • 5. What are the different parts of the internet? 02
  • 6.
  • 8. TOR TOR browser logo SOFTWARE USED TO PROTECT USERS BY MAKING COMMUNICATIONS HARD TO TRACE. BOUNCES COMMUNICATIONS TO DIFFERENT NODES LOCATED ALL AROUND THE WORLD USES ENCRYPTION IN THE APPLICATION LAYER. HIDES LOCATION THROUGH MANY NETWORK RELAYS. HIDDEN WEBSITES USE THE ".ONION" SUFFIX
  • 9. FREENET FREENET browser logo MIX BETWEEN PEER TO PEER AND CLIENTSEVER DE-CENTRALIZED SERVERS & DATA USES PEERS TO HOST NODES WHICH STORE OTHER USER'S ENCRYPTED DATA NO WAY TO TELL IF DATA IS LEGAL OR ILLEGAL DE-CENTRALIZED DATA MAKES IT HARDER TO HACK INTO
  • 10. Silk Road RELODED I2P browser logo The original "Silk Road" website was located on Tor Servers. Some think Tor has been compromised A new website "Silk Road Reloaded“ appeared on a different dark web network called I2P I2P uses a peer-to-peer approach where "Essentially all peers participate in routing for others“ Supports various online currencies other than Bitcoin such as Anoncoin, Darkcoin, Dogecoin and can convert currencies for users for a small fee
  • 11. 04 Dark Web / Darknet
  • 12. The homepage of Agora, a popular dark market. *http://www.coindesk.com/dark-markets-grow-bigger-bolder-year-since-silk-road-bust/
  • 13. More Dark Web Market Listing Examples: *http://www.businessinsider.com/dark-web-whats-for-sale-2015-4
  • 14. 05 Timeline of the Deep Web
  • 15. Timeline of the Deep Web Silk Road Market launches “Satoshi Nakamoto” started Bitcoin digital currency The I2P peer-to-peer network developed Tor Network developed by US Naval Research Laboratory 2002 2003 2009 2011
  • 16. 06 Is the Dark Web Dangerous?
  • 18. SECURITY PRECAUTIONS WHEN VISITING THE DARK WEB • DON'T TRUST ANYONE • COVER YOUR WEBCAM WITH TAPE • DON'T DOWNLOAD ANYTHING • CHECK THAT YOUR VIRTUAL PRIVATE NETWORK (VPN) IS WORKING • USE PROXIES • ANONYMOUS OPERATING SYSTEMS • TAILS • WHONIX • JONDO • INTERNET CAFE
  • 19. 08 Is the Dark Web Illegal?
  • 20. Q & A
  • 21. QUESTION 1 WHAT IS THE DIFFERENCE BETWEEN THE DEEP WEB AND THE DARK WEB? ANSWER: THE DARK WEB IS A SUBCOMPONENT OF THE DEEP WEB AND CAN ONLY BE ACCESSED BY A SPECIAL BROWSER OR UTILITY
  • 22. QUESTION 2 ANSWER: WHAT SAFETY PRECAUTIONS SHOULD YOU TAKE IF YOU WERE TO VISIT THE DARK WEB? DON'T TRUST ANYONE, COVER YOUR WEBCAM, DON'T DOWNLOAD ANYTHING, CHECK THAT YOUR VPN IS WORKING
  • 23. QUESTION 3 ANSWER: THROUGH WHAT METHODS DOES THE TOR BROWSER ATTEMPT TO ENSURE ANONYMITY OF ITS USERS IDENTITY AND INTERNET USAGE? THE TOR BROWSER ENCRYPTS COMMUNICATION DATA AND THEN SENDS THE INFORMATION THROUGH MULTIPLE RANDOM TOR RELAYS (NODES) SCATTERED ACROSS THE GLOBE BEFORE REACHING ITS DESTINATION
  • 25. REFERENCES • https://www.sans.org/reading-room/whitepapers/covert/ocean-internet- deep-web-37012 • https://media.scmagazine.com/documents/224/deeplight_(1)_55856.pdf • https://www.trendmicro.com/cloud-content/us/pdfs/security- intelligence/whitepapers/wp_below_the_surface.pdf • http://www.batblue.com/the-darknet/ • http://celarc.ca/cppc/247/247804.pdf • http://www.cs.princeton.edu/courses/archive/spr09/cos423/Lectures/mtf.pdf • https://www.quora.com/Why-cant-the-police-stop-the-deep-web • https://www.deepdotweb.com/2014/12/22/ethics-deep-web/ • http://fieldguide.gizmodo.com/how-to-search-the-deep-web-safely- 1770828854 • http://www.guidingtech.com/50281/dos-donts-deep-web-surfing 1