Professional Documents
Culture Documents
BEXPresentationss
BEXPresentationss
Darknet Usage
Child pornography
Drugs
Counterfeit goods
Hacking information
Politics
Hardware/Software
information
Art
Other/Unknown
Anonymity?
Tor designed to hide identity
Surface internet browsing
Doesnt protect against vulnerabilities
o
Server
Anonymous
Showboating?
Users computers
Compromise = exposure
Traps?
Alternatives
Silent Circle
Court order
Silent Mail
Image source: http://www.toptenreviews.com/i/rev/site/cms/category_headers/968-h_main-w.png
Takeaways
Created by the US govt
Secure communications
Fraction of the Deep Web
Tor/I2P
Illegal marketplace
Never anonymous
Restoring purpose
Bibliography
Bartlett, Jamie. "Pretty Soon, We Could All Be Using the Dark Net Telegraph Blogs." Technology Pretty Soon We Could All Be
Using the Dark Net Comments. The Telegraph, 22 Apr. 2013. Web. 27 Apr. 2014.
Chacos, Brad. "Meet Darknet, the Hidden, Anonymous Underbelly of the Searchable Web | PCWorld." PCWorld. PCWorld, 12 Aug. 2013.
Web. 27 Apr. 2014.
Clayton, Nick. "Anonymous Hacktivists Target Child Pornography Sites." Tech Europe. The Wall Street Journal, 24 Oct. 2011. Web.
27 Apr. 2014.
"The Darknet: Surfing on the Brink." Forum Alpbach Medientage The Darknet Surfing on the Brink Comments. N.p., 2013. Web. 27
Apr. 2014.
Greenwald, Glenn. "Email Service Used by Snowden Shuts Itself Down, Warns against Using US-based Companies." Theguardian.com.
Guardian News and Media, 09 Aug. 2013. Web. 27 Apr. 2014.
"Intro." I2P. Invisible Internet Project, n.d. Web. 27 Apr. 2014.
Kolomi, Rogi. "Dark Net 101." Ask the Computer Guy RSS. N.p., 13 June 2013. Web. 27 Apr. 2014.
Mesner, Doug. "Darknet." Darknet. N.p., 2013. Web. 27 Apr. 2014.
Syverson, Paul. "Onion Routing." Onion Routing. Historic Mirror of 2005 Onion-router Project, 2005. Web. 27 Apr. 2014.
"Tor: Overview." Project: Overview. The Tor Project, n.d. Web. 27 Apr. 2014.
Walsh, Dean. "A Beginner's Guide to Exploring the Darknet." Electronician. HubPages, 24 Apr. 2014. Web. 27 Apr. 2014.
"The World's Most Secure Solution in Mobile Privacy." Silent Circle. N.p., 2014. Web. 27 Apr. 2014.