Sie sind auf Seite 1von 14

The Dark Side of the Web

Pereteatcu Adelina
Northen University of Baia Mare
Faculty of Engineering
Computer Science II
2017-2018
Contents:

1. Short history
2. Onion Routing
3. Darknet
4. TOR
5. Dark Web
6. How the Dark Web is used
7. Conclusion
1. Short history

The internet Around the


The biggest
growing in the millennium-shift-
change-instant
mid-to-late 1990s over 350 million
communication
connected people
In the mid 1990s -The United States federal government concern about their
privacy

developed
2. Onion Routing

OVERLAY NETWORK

Destination NETWORK Source


(surface web)
3. DARKNET The United States government can't simply
run an anonymity system for everybody and
then use it themselves only because when
every time a connection came from it people
A network using onion would say "Oh, it's another CIA agent looking
routing technology at my website!" if those are the only people
using the network. So you need to have other
people using the network so that they blend
together.

DARKNET
Roger Dingledine
Co-founder & director
of the TOR project
4. TOR

The NRL was forced to release their onion routing technology


to the public. The technology was eventually released under
an open source license and became TOR. TOR stands for The
Onion Router and is the software you need to download to be
able to access this network of onion routers.
5. The Dark Web

Destination NETWORK Source


(surface web)
CAN BE INDEXED BY
SEARCH ENGINES

CANNOT BE INDEXED
BY SEARCH ENGINES

• Online banking
• Netflix
• Web mail
• Databases
• Everything that’s
password- or Requires specific
paywall- protected SOFTWARE and/or
AUTHORIZATION

CANNOT BE INDEXED
BY SEARCH ENGINES
6. What do we find on the Dark Web?
Licit purposes
• browsing the web
• checking the email
• posting on forums
• instant messaging
• watching YouTube videos
Illicit purposes

• Hidden service-a website that can only be accessed via TOR and its
address will always end in .onion.
• various forms of torture and killing of animals
• money laundering
• cyberterrorism
• contract killers, trading of firearms and weapons
Only 3-6% of all TOR users actually use these hidden services. So only 3-6% use the
dark web. The vast majority exclusively use TOR to protect their privacy and to browse
the surface web anonymously and have never visited a .onion website.
A: The answer is simple, you don't. You can't
restrict something that is, by its very nature,
7. Conclusion meant to be unrestrictive.
Even if law enforcement agencies had the
ability to shut the entire network down
Q: How do you prevent completely, they wouldn't, because the US
criminals from using these government need TOR as much as anybody
services while still allowing else. A government agent working undercover
lawful citizens to protect their is as much in need of online anonymity as a
privacy? terrorist, pedophile, or whistleblower.
And that's the unfortunate truth.
Bibliography
• https://quod.lib.umich.edu/j/jep/3336451.0007.104?view=text;rgn=
main
• https://metrics.torproject.org/userstats-relay-
country.html?start=2013-01-01&end=2013-12-31
• https://trac.torproject.org/projects/tor/wiki/doc/HowBigIsTheDarkW
eb
• https://www.lemmi.no/post/the-dark-side-of-the-web
• https://en.wikipedia.org/wiki/Dark_web
• https://www.youtube.com/watch?v=mUP0tx7Ib2w

Das könnte Ihnen auch gefallen