You are on page 1of 14

overlay network

DARKNET
Plan:
1 What is the DarkNet?

2 DARKNET is ..

3 How the darknet works?

4 How the darknet works?

5 Why is the darknet dangerous?


What is the DarkNet?

To understand this, you need to understand the structure of the Internet. The global
network is conventionally divided into three layers:

• Superficial, or visible. This includes publicly available, open source web


resources. That is, any sites that can be visited using a standard link and found in search
engines.
• Deep. Includes content that does not hit search engines. The content of private cloud
storage, corporate networks and various closed databases - all this is the deep Internet.
Most often, access to such resources is protected by a username and password.
• Dark, darknet. This is the collective name for computer networks designed for the
anonymous transfer of information. There are also services for trade, communication
and content exchange, but they cannot be opened through a standard browser or found
in a regular search engine.
DARKNET
DarkNet is a hidden network, the connections of which
are established only between trusted peers, sometimes
referred to as "friends", using non-standard protocols
and ports. An anonymous network is a system of
unconnected virtual tunnels that provide encrypted data
transmission.
The DarkNet differs from other distributed peer-to-peer
networks in that the file sharing is anonymous (since the
IP address is not publicly available), and therefore users
can communicate without much fear and government
interference.
The hidden network architecture
impedes the monitoring of users and
control over the transmission of
information. Therefore, the darknet
can be both a weapon against
censorship and a screen for crime.

In Ukraine, as in most other countries,


the use of hidden networks is allowed.
But many activities on the darknet are
banned. With the advent of bitcoin,
which allows money to be sent
anonymously, the hidden internet has
become a virtual black market. In
addition to legal sites, the darknet is
flooded with sites selling child
pornography, stolen data, drugs,
weapons and other illegal goods.
How the darknet works?
• Hidden networks exist in parallel to each other • TOR is currently being developed by the TOR
and provide anonymity by various technical Project. The project has many sponsors among
ordinary users and various scientific, technological
means. For example, the largest of them is built and other institutions. Continuous development and
on the principles of TOR (The Onion Router), relative ease of use have made the technology
or onion routing. It is an encryption and data popular. Therefore, in popular culture, the darknet is
transmission technology created by the staff of primarily associated with this hidden network.
the US Navy Research Laboratory.
• Journalists often contact informants through TOR.
• It works like this. The message is wrapped in Facebook, The New York Times and the BBC are
several layers of encryption, which begs the using it to stay accessible in totalitarian countries
analogy with an onion. It is then passed through despite being blocked. For this, companies have
many network nodes - the so-called onion created TOR versions of their sites on
routers. Each of them peels off the protective • Another relatively well-known anonymous
layer to find out the next node in the chain. As a network is I2P (Invisible Internet Project).
result, no intermediary sees either the content or Enthusiasts from all over the world have been
the entire route of the message. Full decryption developing it since 2004. The technical basis of
occurs only on the recipient's side. the project provides a higher speed than TOR,
and theoretically even greater security.
• The project was created in the 1990s for
military purposes. But later, the authors made • However, I2P lacks the means to grow rapidly.
the TOR code publicly available so that the And in the current state, the tools for using this
technology would serve to protect the rights and network are not convenient and simple enough
freedoms of ordinary people. Now you can use for a wide audience. In terms of the number of
it to access the darknet. users, I2P is significantly inferior to TOR.the
darknet.
Tor
How to get on • Sites of this hidden network have special
the darknet? addresses in the .onion zone. If you do not
know where to start your acquaintance with
Connecting to a hidden network is easier the darknet, you can visit these safe resources
than you might think. To enter, TOR- through TOR:
browser is most often used. It can be
• The directory of links to popular dark web sites The
downloaded for free from the official Hidden Wiki:
website of the TOR Project. http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Pag
e.
Once launched, the program will display
• Facebook: https://facebookcorewwwi.onion.
prompts to help you configure it. As soon
as the browser menu opens, you can start • BBC International:
surfing. https://www.bbcnewsv2vjtpsuy.onion.
• Search engine:DuckDuckGo
Use only the official versions of the TOR- https://3g2upl4pq6kufc4m.onion.
browser and update it regularly to keep the
program as stable and secure as possible. Please
note: due to the peculiarities of iOS, there is no
official TOR application for this operating
system.
Why is the darknet There are enough people on the darknet who
not only offer illegal goods and services, but
dangerous? also try to steal or exploit other users. Of
course, such people are also present on the
regular Internet. But the anonymity of hidden
networks allows them to operate more
effectively.
Typical threats to face on the
darknet:

Cyber ​fraud. Don't be in a hurry


to buy anything. Having received
the money, the anonymous person
may not fulfill his obligations. In
addition, phishing is common on
hidden networks - theft of
accounts and cryptocurrencies
using fake websites.
Shock content. Psychological attacks.
Due to the lack of censorship on Manipulators and psychopaths can
the dark web, it is easier to stumble attack victims on the dark web
upon explicit or violent content, with impunity. The most
even if you are not looking for it on dangerous are capable of driving a
purpose. Therefore, impressionable person with an unstable psyche to
people should carefully choose suicide.
resources for surfing.
Hackers' actions.
You can simply be
hacked to steal money or
personal data. At the very
least, you shouldn't click on
unknown links and
download suspicious files.
Be careful with it
If you yourself intend to break
the law and think that the
darknet will provide you with
impunity, think again. Although
hidden networks are private,
through carelessness or due to
technical illiteracy, you can still
reveal your identity. For
example, it is enough to
accidentally download a Trojan
from the darknet or leave
contacts in an inappropriate
place.
Thanks for
attention

You might also like