Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 9

Dawood University of Engineering & Technology

IICT PRESENTATION
Department: - BS (AI)/A-2
Teacher: - Sir Rohail

Participants/Roll No. :-
Muhammad Qaseem/24
Owais Ahmed/28

Topic: Dark Web


What are the different parts of
the internet?

The internet is like an iceberg. The part you see, like websites
on Google or social media, is just the tip. That's called the
"surface web." But below the surface, there's a much bigger
chunk known as the "deep web." The deep web includes
things like private databases, emails, and other stuff that
search engines don't index. It's not secret or illegal—it's just
not easily searchable. Now, within the deep web, there's a
tiny, hidden area called the "dark web." This is where things
get a bit shady. It's intentionally hidden and often associated
with illegal activities. You need special tools, like Tor, to
access it. So, deep web: mostly innocent and useful but not
easily searchable. Dark web: a small, hidden, and sometimes
sketchy part of the deep web.

The Dark Web


The internet has changed in many ways since it first became
publicly accessible in the 1990s. One of the most
controversial developments is the growth of the so- called
dark web. This is the part of the World Wide Web that allows
users to remain anonymous. You may be concerned about
your child visiting the dark web, especially as press reports of
ten associate it with dangerous, or illegal, online activity.
However, it is not always used for illicit activity and the
problem does not come from the technology itself, but rather
from the ways in which people use it. Being aware of the
basic facts about these parts of the internet can help you to
have open and realistic conversations with your child,
especially if you are concerned about them using the dark
web.

Access to Dark Web


The dark web is generally accessed using dedicated software,
with the best known being TOR (The Onion Router).
Around 2.5 million people use TOR every day. It provides
anonymizing software which can be accessed via a Google
search and then downloaded free of charge.
TOR itself is not the dark web but is a way to browse both the
open and dark web, without anyone being able to identify the
user or track their activity.
A hidden service is one where not only the user, but also the
website itself, has their anonymity protected by TOR.

This means that the IP address of the site cannot be identified,


hiding information about its host, location or content.

Studies suggest that the majority of TOR hidden service


activity is illicit. For example, a study in 2014 found that
nearly 60% of hidden services contain illegal content such as
drugs, weapons and stolen goods.

You may see the logo of the TOR browser. TOR often uses
Mozilla Firefox as the basis of its browser.

Once you access the TOR with your browser then it looks
something like this;
How TOR links With Dark
Web
The word "onion" in Tor's name describes the various
encryption layers that are applied to protect data while it
travels through each server. To ensure a high degree of
anonymity, every server in the Tor network only knows the
nodes that come before and after it in the circuit.
The ".onion" domain extension is frequently seen on dark web
websites. These are unique domain names that are only
reachable via the Tor network. One such example is
http://example.onion.
Search engines and directories have been created especially
for the dark web. These are useful for locating .onion
websites. But use caution and pay attention to the content you
access.
Mis-Uses of Dark Web
ILLEGAL ACTIVITIES:
● millions of dollars of
transactions made each
year.
● can purchase weapons,
narcotics, credit-cards,
organs, hackers, hitmen,
etc.
● From February 6, 2011
to July 23, 2013 roughly
$1.2 billion in revenue and $79.8 million in commissions
were made through Silk Road alone.

SCAMS:
● credit card frauds
● fake passports and ID
●Stealing private and
personal info
HUMAN
TRAFFICKING &
ORGAN DEALING:
● Slaves can be bought
and sold over the dark
web
● Organs can also be
purchased
● People can
intentionally sell their
organs

TERRORIST
ACTIVITY:
● the Dark web has
always been considered a place of communication between
terrorist groups.

ASSASSINATION:
● Hitman services
●Widely regarded as a hoax

Uses Of Dark Web


Research and Security Testing:
The dark web is a useful tool for cybersecurity experts and
researchers to investigate new developments, vulnerabilities,
and threats. It can be a useful setting for learning about the
strategies used by bad actors and creating defenses against
them.
Privacy and anonymity advocacy:
Journalists, privacy advocates, and whistleblowers can
interact and exchange information without worrying about
censorship or surveillance thanks to the dark web. In areas
where there are repressive regimes, private and secure
communication channels can be extremely important.
Whistleblowing Platform:
On the dark web, whistleblowers can anonymously provide
information to media outlets and journalists via secure
platforms like SecureDrop. In order to expose corruption or
wrongdoing and preserve the whistleblower's identity, this can
be extremely important.

Conclusion
In conclusion, despite its reputation for housing illicit activity,
the dark web is a complex environment with advantages and
disadvantages. Users ought to exercise caution when
navigating the dark web, giving legal and moral behavior top
priority, and being mindful of the possible risks associated
with entering and using this environment.

Thank You!

You might also like