2. Here what we are going to talk
about
â
Darknet
â
History
â
Onion Router
â
Freenet
â
Tails
â
Why use darknet
â
Finding Hidden Services
3. What is Darknet?
â
an overlay network
â
for accessing
â
Authentication
â
Configurations
â
uses specific software(tor, freenet, etc)
â
often using non-standard communications protocols and ports
â
types
â
friend-to-friend like freenet(for file sharing like in peer-to-peer)
â
anonymity networks like TOR via an anonymized series of connections
4. â
1970 term âdarknetâ introduced
â
1995 development began on âOnion Routingâ
â
2002 US Naval Research Lab releases ONR v2 (aka TOR)
â
2002 Freenode is released
â
2004 Hidden Services introduced: Hidden wiki setup
â
2013 freenode project center shutdown, however freenode
continues to operate
â
2014 Sponsors include US dept. of State, Radio free Asia, The
Four Foundation, Google, EFF, 4300individuals.
History of Darknet
9. Why Onions?
â
The client encrypts the original data in
such a way that only the exit relay can
decrypt it.
â
This encrypted data is then encrypted
again in such a way that only the middle
relay can decrypt it.
â
Finally, this encrypted data is
encrypted once more in such a way that
only the guard relay can decrypt it.
11. Freenet
â
Friend-to-friend platform for censorship-resistant communication.
â
Decentralized distributed data store.
â
Goal to provide freedom of speech on the Internet with anonymity
protection.
â
Store and retrieve data by an associated key.
â
No central servers.
â
Encryption makes it difficult to know who store the data and who is
retrieving it.
â
Each note allocated some amount of space.
12. Why use darknet?
Darknet in general may be used for various reasons, such as:
â
To better protect the privacy rights of citizens form targeted
and mass surveillance.
â
Protecting dissidents from political reprisal.
â
Whistleblowing and news leaks.
â
Computer crime(Hacking, file corruption etc)
â
Sale of restricted goods on darknet markets.
â
File sharing (pornography, confidential file, illegal or counterfeit
software etc)
13.
14. TAILS
â
Linux Live distro (Debian) dedicated to staying anonymous.
â
Forces all traffic through TOR.
â
Will not touch the hard disk (without a fight).
â
Ability to disguise UI as Windows XP so it doesnât raise suspicions in public areas.
â
Comes with preinstalled software
â
HTTPS Everywhere plugin
â
OpenPGP
â
Pidgin OTR
â
Truecrypt
â
KeePassX
15.
16. TOR HIDDEN SERVICES
â
Services that live only in the Tor Network
â
Turns Tor into a Darknet
â
Services use .onion
â
Can not open .onion site without tor.
18. Arab Spring
â
The recent revolution in Egypt that ended the
autocratic presidency of Hosni Mubarak.
â
Activist used social media.
â
prosecuted many activists and censored a
number of websites.
â
The anonymity software Tor was a tool used
by some bloggers, journalists and online
activists to protect their identity and to
practice free speech.
19. Wikileaks
â To upload a document anonymously using Tor:
â
http://suw74isz7wqzpmgu.onion/
(this link will only work once you have installed and
configured Tor.)
â Wikileaks Tor uses fully encrypted end-to-end
anonymous connections.
â Without tor if you use https://wikileaks.org/ all your data
is encrypted, but internet spies maybe able note how
long your computer spent talking to Wikileaks servers.
21. Silkroad
â
Buy and sell drugs,
hitman, weapons, fake id,
Digital goods, illegal
services, pornography,
etc.
â
Every transaction take
place in Bitcoin.
22. Finding Hidden Services
â
Hidden Wiki
â
http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page
â
Torfind
â
http://kbhpodhnfxl3clb4.onion/
â
TorSearch
â
http://kbhpodhnfxl3clb4.onion
â
Grams â Google like search of the TOR darkne
â
http://grams7enufi7jmdl.onion/
â
Deep Wed Links NOT IN TORâ
â
http://deepweblinks.org/
â
DuckDuckGo
â
https://3g2upl4pq6kufc4m.onion/