Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

DARKNET

tor - the onion router


U.S. Navy
Communications
Data Transmission
Security through layers
of encrypted
communication between
nodes.

Access Through Tor


The onion router
Similar to a Firefox browser
Simple, anyone can get it
Host machine is untraceable
Can stay anonymous
Can access Darknet
Can see .onion extensions

Alternative Access with


I2P
The Invisible Internet Project
Messages encrypted
Outbound and Inbound tunnels
Data exchange
1st query must be made to I2P networks
database
Acts like a distributed hash table

Access to The Silk


Road and Knowledge
Access to Darknet = Access to Information
Onions
Government Secrets
Conspiracy Theories
The Silk Road (Market)
Weapons and drugs sold
60,000 visits per day
$1.9 million in sales every month
Image source: http://cdn.howtogeek.com/wpcontent/uploads/2013/01/00_lead_image_encrypted_email.png

Darknet Usage
Child pornography
Drugs
Counterfeit goods
Hacking information
Politics
Hardware/Software
information
Art
Other/Unknown

telegraph.co.uk, 22 April 2014

Anonymity?
Tor designed to hide identity
Surface internet browsing
Doesnt protect against vulnerabilities
o

Server

Anonymous

Showboating?
Users computers

Compromise = exposure

Traps?

Impossible to be completely anonymous online!

Alternatives

Lots of reasons not to use


Darknet
Lavabit

Silent Circle

Court order
Silent Mail
Image source: http://www.toptenreviews.com/i/rev/site/cms/category_headers/968-h_main-w.png

Takeaways
Created by the US govt

Secure communications
Fraction of the Deep Web

Use the Onion

Tor/I2P
Illegal marketplace

Never anonymous

Restoring purpose

Bibliography
Bartlett, Jamie. "Pretty Soon, We Could All Be Using the Dark Net Telegraph Blogs." Technology Pretty Soon We Could All Be
Using the Dark Net Comments. The Telegraph, 22 Apr. 2013. Web. 27 Apr. 2014.
Chacos, Brad. "Meet Darknet, the Hidden, Anonymous Underbelly of the Searchable Web | PCWorld." PCWorld. PCWorld, 12 Aug. 2013.
Web. 27 Apr. 2014.
Clayton, Nick. "Anonymous Hacktivists Target Child Pornography Sites." Tech Europe. The Wall Street Journal, 24 Oct. 2011. Web.
27 Apr. 2014.
"The Darknet: Surfing on the Brink." Forum Alpbach Medientage The Darknet Surfing on the Brink Comments. N.p., 2013. Web. 27
Apr. 2014.
Greenwald, Glenn. "Email Service Used by Snowden Shuts Itself Down, Warns against Using US-based Companies." Theguardian.com.
Guardian News and Media, 09 Aug. 2013. Web. 27 Apr. 2014.
"Intro." I2P. Invisible Internet Project, n.d. Web. 27 Apr. 2014.
Kolomi, Rogi. "Dark Net 101." Ask the Computer Guy RSS. N.p., 13 June 2013. Web. 27 Apr. 2014.
Mesner, Doug. "Darknet." Darknet. N.p., 2013. Web. 27 Apr. 2014.
Syverson, Paul. "Onion Routing." Onion Routing. Historic Mirror of 2005 Onion-router Project, 2005. Web. 27 Apr. 2014.
"Tor: Overview." Project: Overview. The Tor Project, n.d. Web. 27 Apr. 2014.
Walsh, Dean. "A Beginner's Guide to Exploring the Darknet." Electronician. HubPages, 24 Apr. 2014. Web. 27 Apr. 2014.
"The World's Most Secure Solution in Mobile Privacy." Silent Circle. N.p., 2014. Web. 27 Apr. 2014.

You might also like