You are on page 1of 34

Dark Web

Albert
Bharath
Divya
Rachana
Shrika
Introduction
Web Strata
The Internet and the Web are not the same.

Internet WWW
● ●


● HTTP

● ●

protocols

WWW
Layers of the Internet
The Surface Web

● The Surface Web is made with a collection of


public Web pages on a server accessible by
any search engine.

● The Surface Web only consists about 4-10%


of the information that is on the internet.

● According to one source, as of June 14,


2015, Google's index of the surface web
contains about 14.5 billion pages
The Deep Web
● The deep web, invisible web, or hidden
webare parts of the World Wide Web whose
contents are not indexed by standard web
search-engines.

● The content of the deep web is hidden and


includes very common uses such as web mail,
online banking, private or otherwise restricted
access social-media pages and profiles, some
web forums that require registration for viewing
content, and services that users must pay for,
and which are protected by paywalls, such as
video on demand and some online magazines
and newspapers.
The Dark Web
● The dark web refers to encrypted online
content that is not indexed by conventional
search engines

● Specific browsers like Tor are required to


access dark web sites, which contain
anonymous message boards, online
marketplaces for drugs, exchanges for stolen
financial and private data, and other illegal
content.

● Transactions in this hidden economy are


often paid for with bitcoin, and physical
goods are routinely shipped in ways that
cloak both buyers and sellers from the
watchful eyes of law enforcement.
What is Dark Web mostly used for today ?
Application
Influence of Bitcoin
Things that make internet crime work
● Cryptocurrency Digital cash
● Bulletproof web-hosting services
● Cloud computing
● Crimeware

Things you can buy You can order


hitmen.
● Drugs
People can steal
● Forged papers
your identity.
● firearms ,Ammunition and explosive weapons
● Human organ You can purchase
false documents.
Technology
Used
Tor Browser

● Known as the Onion router.


● 1990s a need was felt for privacy on the
internet by the US navy seal
● In 2006 Tor Inc became a non profit
organisation with many volunteers FACT:
across
There’s a difference
between the Tor
network and browser
Advantages
● Anonymity
● Freedom of speech
● Political Activism
● Knowledge
● Amazing Individual
Disadvantages
● Hoaxes and verified content
● Phishing and scams
● Illegal and ethically disputed pornography
● Terrorism
Steps taken to
monit0r dark web
➔ Mapping the hidden services ➔ Semantic analysis
directory
➔ Market place profiling
➔ Customer data monitoring
➔ Social site monitoring
➔ Hidden service monitoring
Future scope
❖ The darknet will become even darker
❖ Other cryptocurrencies will compete with Bitcoin as the anonymous
payment system
❖ of choice
❖ Darknet customer base will grow exponentially
❖ The darknet marketplace will expand exponentially to meet customer
demand
❖ The darknet will invent its own justice system
Some dos and
don'ts.
Do’s
•Make sure Tor is kept up to date
•Create a new identity when necessary
•Use a VPN alongside Tor
•Consider running a Tor relay
•Use Tor for anonymous email
Don’ts
•Use Tor for torrenting
•Maximise the Tor window
•Search the web using Google
•Share your real email address
•Go overboard with browser add-ons
THANK YOU

You might also like