SlideShare a Scribd company logo
1 of 45
Husband, father, blogger, marketer
Nearly 20 years in online marketing
Marketing Technologist (Capgemini)
Master of Science in IT (CMU)
Lobbied against Child Pornography
Paul Wilson
(Charlotte, NC)
Follow me on Twitter
@PaulWilson
Visit me at
http://mymarketer.net
THE FORCE vs THE DARK SIDE
The Deep Dark Web
The Landscape
The Force
The Dark Side
A Deeper Look
Understanding the Landscape of the Dark Web
The REAL Web
Timing Attack
Entry Monitoring
Intersection Attack
Ddos Attack
Predecessor Attack (Replay)
Exit node Sniffing
TOR: The Force or The Dark Side?
Home Users: protect themselves when online
Activists: anonymously report abuses from danger
zones
Whistleblowers: safely report on corruption
Journalists: protect their research and sources online
Military and law enforcement: protect
communications, investigations, and intelligence
Drug Dealers: Controlled substance marketplaces
Arm Dealer: selling all kinds of weapons
Pedifiler: Child pornography
Traitor: Unauthorized leaks of sensitive information
Thief: Money laundering and Credit Card Fraud
Plagiarist: Copyright infringement
Exploring the Dark Web
Comments
The Extras…
TOR Node
Encrypted
Alice
Bob
Jane
Unencrypted
•Each OR maintains a connection
to every other OR
•Users run an onion proxy (OP) to
fetch directories, establish circuits
across the network
•Each OR maintains a long & short
term onion identity key (10 mins)
Port 9001
Port 9090
Port 443
TOR Node
Encrypted
Alice
Dave
Bob
Jane
Unencrypted
Step 1: Alice’s TOR Client
obtains a list of TOR
Clients from a directory
server
Port 9001
Port 9030
TOR Node
Encrypted
Alice
Dave
Bob
Jane
Unencrypted
Step 2: Alice’s TOR
Client picks a random
path to a destination
server. Green links are
encrypted, red links are
in the clear
Port 443
Port 80
TOR Node
Encrypted
Alice
Dave
Bob
Jane
Unencrypted
Step 3: If at a later time
Alice connects to a
different resource then a
different, random route
is selected. Again Green
links are encrypted, red
links are in the clear
Port 80
Port 443
TOR Node
Encrypted
Unencrypted
Security Agencies TOR is
a key technology in the
fight against organized
crime on the internet
Illegal Site
Agency IP Address Hidden from Site owner
TOR Node
Encrypted
Bob
Unencrypted
Criminal posts
anonymous content
out to Compromised
Server Compromised
Node
Police
Law Enforcement
Monitor suspects
client machine
(Entry Point)
TOR Node
Encrypted
Target
Unencrypted
Criminal posts
anonymous content
onto Server
Compromised
Node
Infected with malicious code
Police
Law Enforcement
Monitors Target client
machine (Exit Point)
• An exit node has complete
access to the content being
transmitted from the sender
to the recipient
• If the message is encrypted
by SSL, the exit node cannot
read the information, just as
any encrypted link over the
regular internet
TOR Node
Encrypted
Bob
Unencrypted
Criminal posts
anonymous content
out to Compromised
Server
Compromised
Node
Police
Network Analysis
Nodes periodically fail of
the network; any chain
that remains functioning
cannot have been
routed through either
the nodes that left or
the nodes that recently
joined the network,
increasing the chances
of a successful traffic
analysis
Offline Node
Tor is vulnerable to DoS attacks because users can
consume more network resources than allowed or
render the network unusable for other users.
Tor deals with these attacks with
Puzzle solving: At beginning of TLS handshake or
accepting create cells, this limits the attack multiplier.
Limiting rates: Limits rates of accepting of create cell
and TLS connections so the computational work of
processing them doesn’t disrupt the symmetric
cryptography operations that allow cells to flow.

More Related Content

What's hot

What's hot (20)

Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developments
 
dark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfdark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdf
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Dark wed
Dark wedDark wed
Dark wed
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
ABOUT DARK WEB
ABOUT DARK WEB ABOUT DARK WEB
ABOUT DARK WEB
 
Social engineering
Social engineering Social engineering
Social engineering
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Dark web
Dark webDark web
Dark web
 
Dark web (1)
Dark web (1)Dark web (1)
Dark web (1)
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 

Viewers also liked

2 11 contrato a tiempo parcial
2 11 contrato a tiempo parcial2 11 contrato a tiempo parcial
2 11 contrato a tiempo parcial
supervegallevis
 
Violación convención Colectiva ETB
Violación convención Colectiva ETBViolación convención Colectiva ETB
Violación convención Colectiva ETB
TribunaObrera
 
Presentation XML-Holland 2006 - Dynamic Publishing
Presentation XML-Holland 2006 - Dynamic PublishingPresentation XML-Holland 2006 - Dynamic Publishing
Presentation XML-Holland 2006 - Dynamic Publishing
Roger Dols
 
Presentación de la asignatura informática
Presentación de la asignatura informáticaPresentación de la asignatura informática
Presentación de la asignatura informática
tecnojulio
 
Presentation on one rank one pension
Presentation on one rank one pensionPresentation on one rank one pension
Presentation on one rank one pension
Ravi Ramchandani
 

Viewers also liked (18)

Dlaczego warto prowadzić blog firmowy concept4u
Dlaczego warto prowadzić blog firmowy concept4uDlaczego warto prowadzić blog firmowy concept4u
Dlaczego warto prowadzić blog firmowy concept4u
 
PaMeraki
PaMerakiPaMeraki
PaMeraki
 
Disney Consumer Product
Disney Consumer ProductDisney Consumer Product
Disney Consumer Product
 
2 11 contrato a tiempo parcial
2 11 contrato a tiempo parcial2 11 contrato a tiempo parcial
2 11 contrato a tiempo parcial
 
Violación convención Colectiva ETB
Violación convención Colectiva ETBViolación convención Colectiva ETB
Violación convención Colectiva ETB
 
Presentation XML-Holland 2006 - Dynamic Publishing
Presentation XML-Holland 2006 - Dynamic PublishingPresentation XML-Holland 2006 - Dynamic Publishing
Presentation XML-Holland 2006 - Dynamic Publishing
 
Dharma Rao Dronadula CompEx Cert 2016
Dharma Rao Dronadula CompEx Cert 2016Dharma Rao Dronadula CompEx Cert 2016
Dharma Rao Dronadula CompEx Cert 2016
 
Student Immunization Campaign Proposal - PU520 Epidemiology
Student Immunization Campaign Proposal - PU520 EpidemiologyStudent Immunization Campaign Proposal - PU520 Epidemiology
Student Immunization Campaign Proposal - PU520 Epidemiology
 
Nietypowe święta - Luty
Nietypowe święta - LutyNietypowe święta - Luty
Nietypowe święta - Luty
 
Contrato
ContratoContrato
Contrato
 
Presentación de la asignatura informática
Presentación de la asignatura informáticaPresentación de la asignatura informática
Presentación de la asignatura informática
 
Twitter 101 for execs
Twitter 101 for execsTwitter 101 for execs
Twitter 101 for execs
 
System CAM inventorcam dla Autodesk inventor
System CAM inventorcam dla Autodesk inventorSystem CAM inventorcam dla Autodesk inventor
System CAM inventorcam dla Autodesk inventor
 
#ebnews - Alina Kubowicz, 29.06.2016 Kraków
#ebnews - Alina Kubowicz, 29.06.2016 Kraków#ebnews - Alina Kubowicz, 29.06.2016 Kraków
#ebnews - Alina Kubowicz, 29.06.2016 Kraków
 
osobyzasobyPL - #ebnews - 03112015
osobyzasobyPL - #ebnews - 03112015osobyzasobyPL - #ebnews - 03112015
osobyzasobyPL - #ebnews - 03112015
 
Presentation on one rank one pension
Presentation on one rank one pensionPresentation on one rank one pension
Presentation on one rank one pension
 
Prepaid energy meter using gprs gsm technology
Prepaid energy meter using gprs gsm technologyPrepaid energy meter using gprs gsm technology
Prepaid energy meter using gprs gsm technology
 
Cómo registrase en Savia Digital...
Cómo registrase en  Savia Digital...Cómo registrase en  Savia Digital...
Cómo registrase en Savia Digital...
 

Similar to My darkweb-presentation

Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hacking
jignesh khunt
 

Similar to My darkweb-presentation (20)

Dw communication
Dw communicationDw communication
Dw communication
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
What Is Dark Web.docx
What Is Dark Web.docxWhat Is Dark Web.docx
What Is Dark Web.docx
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
 
Godfather 2.0
Godfather 2.0Godfather 2.0
Godfather 2.0
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
Dark Web and Threat Intelligence
Dark Web and Threat IntelligenceDark Web and Threat Intelligence
Dark Web and Threat Intelligence
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknet
 
Unit-2 ICS.ppt
Unit-2 ICS.pptUnit-2 ICS.ppt
Unit-2 ICS.ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hacking
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Web forensics
Web forensicsWeb forensics
Web forensics
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 

More from Paul Wilson

More from Paul Wilson (8)

What It Means To Have A Slideshare Style Presentation
What It Means To Have A Slideshare Style PresentationWhat It Means To Have A Slideshare Style Presentation
What It Means To Have A Slideshare Style Presentation
 
SOLVING HAWAII PROPERTY CRIME
SOLVING HAWAII PROPERTY CRIMESOLVING HAWAII PROPERTY CRIME
SOLVING HAWAII PROPERTY CRIME
 
Online Missionary Work (LDS)
Online Missionary Work (LDS)Online Missionary Work (LDS)
Online Missionary Work (LDS)
 
How To Make Money Right Now As A Student
How To Make Money Right Now As A StudentHow To Make Money Right Now As A Student
How To Make Money Right Now As A Student
 
Improving Your Wordpress Blog (For BYU-H ENTR 383 Students)
Improving Your Wordpress Blog (For BYU-H ENTR 383 Students)Improving Your Wordpress Blog (For BYU-H ENTR 383 Students)
Improving Your Wordpress Blog (For BYU-H ENTR 383 Students)
 
How To Build An Infographic Using Microsoft Powerpoint
How To Build An Infographic Using Microsoft PowerpointHow To Build An Infographic Using Microsoft Powerpoint
How To Build An Infographic Using Microsoft Powerpoint
 
Homelessness in Hawaii
Homelessness in HawaiiHomelessness in Hawaii
Homelessness in Hawaii
 
Considering Solutions To Decrease Property Crime in Hawaii
Considering Solutions To Decrease Property Crime in HawaiiConsidering Solutions To Decrease Property Crime in Hawaii
Considering Solutions To Decrease Property Crime in Hawaii
 

Recently uploaded

FULL NIGHT — 9999894380 Call Girls In Mahipalpur | Delhi
FULL NIGHT — 9999894380 Call Girls In Mahipalpur | DelhiFULL NIGHT — 9999894380 Call Girls In Mahipalpur | Delhi
FULL NIGHT — 9999894380 Call Girls In Mahipalpur | Delhi
SaketCallGirlsCallUs
 
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | DelhiFULL NIGHT — 9999894380 Call Girls In Ashok Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | Delhi
SaketCallGirlsCallUs
 
Dubai Call Girls Service # +971588046679 # Call Girls Service In Dubai # (UAE)
Dubai Call Girls Service # +971588046679 # Call Girls Service In Dubai # (UAE)Dubai Call Girls Service # +971588046679 # Call Girls Service In Dubai # (UAE)
Dubai Call Girls Service # +971588046679 # Call Girls Service In Dubai # (UAE)
Business Bay Call Girls || 0529877582 || Call Girls Service in Business Bay Dubai
 
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhi
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| DelhiDELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhi
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhi
delhimunirka444
 
Van Gogh Powerpoint for art lesson today
Van Gogh Powerpoint for art lesson todayVan Gogh Powerpoint for art lesson today
Van Gogh Powerpoint for art lesson today
lucygibson17
 
Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)
Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)
Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)
Business Bay Call Girls || 0529877582 || Call Girls Service in Business Bay Dubai
 
FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | Delhi
FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | DelhiFULL NIGHT — 9999894380 Call Girls In Delhi Cantt | Delhi
FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | Delhi
SaketCallGirlsCallUs
 
FULL NIGHT — 9999894380 Call Girls In Uttam Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In Uttam Nagar | DelhiFULL NIGHT — 9999894380 Call Girls In Uttam Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In Uttam Nagar | Delhi
SaketCallGirlsCallUs
 
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
delhimunirka444
 
FULL NIGHT — 9999894380 Call Girls In Paschim Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In  Paschim Vihar | DelhiFULL NIGHT — 9999894380 Call Girls In  Paschim Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In Paschim Vihar | Delhi
SaketCallGirlsCallUs
 
Pakistani Bur Dubai Call Girls # +971528960100 # Pakistani Call Girls In Bur ...
Pakistani Bur Dubai Call Girls # +971528960100 # Pakistani Call Girls In Bur ...Pakistani Bur Dubai Call Girls # +971528960100 # Pakistani Call Girls In Bur ...
Pakistani Bur Dubai Call Girls # +971528960100 # Pakistani Call Girls In Bur ...
Business Bay Call Girls || 0529877582 || Call Girls Service in Business Bay Dubai
 

Recently uploaded (20)

(INDIRA) Call Girl Jammu Call Now 8617697112 Jammu Escorts 24x7
(INDIRA) Call Girl Jammu Call Now 8617697112 Jammu Escorts 24x7(INDIRA) Call Girl Jammu Call Now 8617697112 Jammu Escorts 24x7
(INDIRA) Call Girl Jammu Call Now 8617697112 Jammu Escorts 24x7
 
FULL NIGHT — 9999894380 Call Girls In Mahipalpur | Delhi
FULL NIGHT — 9999894380 Call Girls In Mahipalpur | DelhiFULL NIGHT — 9999894380 Call Girls In Mahipalpur | Delhi
FULL NIGHT — 9999894380 Call Girls In Mahipalpur | Delhi
 
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | DelhiFULL NIGHT — 9999894380 Call Girls In Ashok Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In Ashok Vihar | Delhi
 
GENUINE EscoRtS,Call Girls IN South Delhi Locanto TM''| +91-8377087607
GENUINE EscoRtS,Call Girls IN South Delhi Locanto TM''| +91-8377087607GENUINE EscoRtS,Call Girls IN South Delhi Locanto TM''| +91-8377087607
GENUINE EscoRtS,Call Girls IN South Delhi Locanto TM''| +91-8377087607
 
Dubai Call Girls Service # +971588046679 # Call Girls Service In Dubai # (UAE)
Dubai Call Girls Service # +971588046679 # Call Girls Service In Dubai # (UAE)Dubai Call Girls Service # +971588046679 # Call Girls Service In Dubai # (UAE)
Dubai Call Girls Service # +971588046679 # Call Girls Service In Dubai # (UAE)
 
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhi
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| DelhiDELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhi
DELHI NCR —@9711106444 Call Girls In Majnu Ka Tilla (MT)| Delhi
 
Van Gogh Powerpoint for art lesson today
Van Gogh Powerpoint for art lesson todayVan Gogh Powerpoint for art lesson today
Van Gogh Powerpoint for art lesson today
 
Moradabad Call Girls - 📞 8617697112 🔝 Top Class Call Girls Service Available
Moradabad Call Girls - 📞 8617697112 🔝 Top Class Call Girls Service AvailableMoradabad Call Girls - 📞 8617697112 🔝 Top Class Call Girls Service Available
Moradabad Call Girls - 📞 8617697112 🔝 Top Class Call Girls Service Available
 
Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)
Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)
Dubai Call Girl Number # 0522916705 # Call Girl Number In Dubai # (UAE)
 
FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | Delhi
FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | DelhiFULL NIGHT — 9999894380 Call Girls In Delhi Cantt | Delhi
FULL NIGHT — 9999894380 Call Girls In Delhi Cantt | Delhi
 
FULL NIGHT — 9999894380 Call Girls In Uttam Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In Uttam Nagar | DelhiFULL NIGHT — 9999894380 Call Girls In Uttam Nagar | Delhi
FULL NIGHT — 9999894380 Call Girls In Uttam Nagar | Delhi
 
Storyboard short: Ferrarius Tries to Sing
Storyboard short: Ferrarius Tries to SingStoryboard short: Ferrarius Tries to Sing
Storyboard short: Ferrarius Tries to Sing
 
(NEHA) Call Girls Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(NEHA) Call Girls Mumbai Call Now 8250077686 Mumbai Escorts 24x7(NEHA) Call Girls Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(NEHA) Call Girls Mumbai Call Now 8250077686 Mumbai Escorts 24x7
 
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
VIP Ramnagar Call Girls, Ramnagar escorts Girls 📞 8617697112
 
AaliyahBell_themist_v01.pdf .
AaliyahBell_themist_v01.pdf             .AaliyahBell_themist_v01.pdf             .
AaliyahBell_themist_v01.pdf .
 
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
(9711106444 )🫦#Sexy Desi Call Girls Noida Sector 4 Escorts Service Delhi 🫶
 
Sirmaur Call Girls Book Now 8617697112 Top Class Pondicherry Escort Service A...
Sirmaur Call Girls Book Now 8617697112 Top Class Pondicherry Escort Service A...Sirmaur Call Girls Book Now 8617697112 Top Class Pondicherry Escort Service A...
Sirmaur Call Girls Book Now 8617697112 Top Class Pondicherry Escort Service A...
 
FULL NIGHT — 9999894380 Call Girls In Paschim Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In  Paschim Vihar | DelhiFULL NIGHT — 9999894380 Call Girls In  Paschim Vihar | Delhi
FULL NIGHT — 9999894380 Call Girls In Paschim Vihar | Delhi
 
Pakistani Bur Dubai Call Girls # +971528960100 # Pakistani Call Girls In Bur ...
Pakistani Bur Dubai Call Girls # +971528960100 # Pakistani Call Girls In Bur ...Pakistani Bur Dubai Call Girls # +971528960100 # Pakistani Call Girls In Bur ...
Pakistani Bur Dubai Call Girls # +971528960100 # Pakistani Call Girls In Bur ...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 

My darkweb-presentation

  • 1. Husband, father, blogger, marketer Nearly 20 years in online marketing Marketing Technologist (Capgemini) Master of Science in IT (CMU) Lobbied against Child Pornography Paul Wilson (Charlotte, NC) Follow me on Twitter @PaulWilson Visit me at http://mymarketer.net
  • 2. THE FORCE vs THE DARK SIDE The Deep Dark Web
  • 3. The Landscape The Force The Dark Side A Deeper Look
  • 4. Understanding the Landscape of the Dark Web
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Timing Attack Entry Monitoring Intersection Attack Ddos Attack Predecessor Attack (Replay) Exit node Sniffing
  • 11. TOR: The Force or The Dark Side?
  • 12.
  • 13.
  • 14.
  • 15. Home Users: protect themselves when online Activists: anonymously report abuses from danger zones Whistleblowers: safely report on corruption Journalists: protect their research and sources online Military and law enforcement: protect communications, investigations, and intelligence
  • 16.
  • 17.
  • 18.
  • 19. Drug Dealers: Controlled substance marketplaces Arm Dealer: selling all kinds of weapons Pedifiler: Child pornography Traitor: Unauthorized leaks of sensitive information Thief: Money laundering and Credit Card Fraud Plagiarist: Copyright infringement
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 28.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. TOR Node Encrypted Alice Bob Jane Unencrypted •Each OR maintains a connection to every other OR •Users run an onion proxy (OP) to fetch directories, establish circuits across the network •Each OR maintains a long & short term onion identity key (10 mins) Port 9001 Port 9090 Port 443
  • 36. TOR Node Encrypted Alice Dave Bob Jane Unencrypted Step 1: Alice’s TOR Client obtains a list of TOR Clients from a directory server Port 9001 Port 9030
  • 37. TOR Node Encrypted Alice Dave Bob Jane Unencrypted Step 2: Alice’s TOR Client picks a random path to a destination server. Green links are encrypted, red links are in the clear Port 443 Port 80
  • 38. TOR Node Encrypted Alice Dave Bob Jane Unencrypted Step 3: If at a later time Alice connects to a different resource then a different, random route is selected. Again Green links are encrypted, red links are in the clear Port 80 Port 443
  • 39. TOR Node Encrypted Unencrypted Security Agencies TOR is a key technology in the fight against organized crime on the internet Illegal Site Agency IP Address Hidden from Site owner
  • 40.
  • 41. TOR Node Encrypted Bob Unencrypted Criminal posts anonymous content out to Compromised Server Compromised Node Police Law Enforcement Monitor suspects client machine (Entry Point)
  • 42. TOR Node Encrypted Target Unencrypted Criminal posts anonymous content onto Server Compromised Node Infected with malicious code Police Law Enforcement Monitors Target client machine (Exit Point) • An exit node has complete access to the content being transmitted from the sender to the recipient • If the message is encrypted by SSL, the exit node cannot read the information, just as any encrypted link over the regular internet
  • 43. TOR Node Encrypted Bob Unencrypted Criminal posts anonymous content out to Compromised Server Compromised Node Police Network Analysis Nodes periodically fail of the network; any chain that remains functioning cannot have been routed through either the nodes that left or the nodes that recently joined the network, increasing the chances of a successful traffic analysis Offline Node
  • 44.
  • 45. Tor is vulnerable to DoS attacks because users can consume more network resources than allowed or render the network unusable for other users. Tor deals with these attacks with Puzzle solving: At beginning of TLS handshake or accepting create cells, this limits the attack multiplier. Limiting rates: Limits rates of accepting of create cell and TLS connections so the computational work of processing them doesn’t disrupt the symmetric cryptography operations that allow cells to flow.

Editor's Notes

  1. Tor (anonymity network) Garlic Routing Anonymous P2P The Amnesic Incognito Live System Degree of anonymity Chaum mixes Bitblinder Java Anonymous Proxy
  2. In 2009 A technical paper was posted on the internet by Satoshi Nakamoto titled Bitcoin: A Peer-to-Peer Electronic Cash System It described a system of cryptocurrency that was not backed by any government or any form of existing currency. Interestingly, there is no such person. It’s a pseudonym. Bitcoins are intended to be digital currency. Buyers and sellers will use them and eliminate all the middlemen such as credit cards, ATM machines, etc. Bitcoins are safer than carrying a plastic card. Bitcoins are an international currency with no exchange transaction fees. Bitcoins have no rules, regulations ,or oversight. To Buy Bitcoins on an Exchange: Create an account at an exchange like Coinbase.com Wire them some money (no credit cards allowed) Funds will show up in your account Purchase or sell Bitcoins whenever you wish from your account. You can have all or some sent to your Bitcoin wallet on your computer Currently there are 60,000 to 70,000 Bitcoin transactions each day The level hasn’t changed significantly in the last year. Log into Blockchain.info to see the transaction activity. Wall Street just opened the “Bitcoin Investment Trust” to speculate in Bitcoin prices without owning the currency. Minimum investment is $25,000. Currently has $70 Million in assets. Expect Wall Street to develop leveraging instruments such as calls, shorts, straddles, etc. Bitcoin transactions are untraceable. Seller doesn’t tell the IRS. Buyer can be anonymous U.S. Treasury and IRS wants it stopped. First big user of Bitcoin was Silk Road It’s very hard to stop Bitcoin – it’s an international scheme.
  3. Edward Joseph Snowden (born June 21, 1983) is an American computer professional, former CIA employee, and former contractor for the federal government who copied and leaked classified information from the NSA in 2013 without prior authorization. His disclosures revealed numerous global surveillance programs, many run by the NSA and Five Eyes with the cooperation of telecommunication companies and European governments. Julian Paul Assange (born 3 July 1971) is an Australian computer programmer, publisher and journalist. He is editor-in-chief of the organization WikiLeaks, which he founded in 2006. Since November 2010, Assange has been subject to extradition to Sweden, where he is wanted for questioning concerning an allegation of rape. Assange denies the allegation and has expressed concern that he will be extradited from Sweden to the United States of America due to his perceived role in publishing secret American documents. After exhausting his legal options in the United Kingdom, Assange failed to surrender for extradition. Instead, he sought and was granted asylum by Ecuador in August 2012. Assange has since remained in Ecuador's London Embassy, unable to leave without being arrested for breaching his bail conditions.