SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
The Deep & Dark
Web
Jyotsna Gorle
ThoughtWorks Inc.
What is the Deep Web
The Surface Web
The Deep Web
What is the DARK Web
• The covert and illegal
activities make the major part
of it.
It's not the same
How it Works ?
• Anonymous Browser
• Secret Search Engines
• Hidden Wikis
• Hidden Chatrooms
Deep Web Harvest
Search Engines
●
Crawling
●
Indexing
●
Page ranking
●
Meta Tags
– <meta name="robots" content="noindex">
●
Robot.txt
Where do they come
formsource repository: a Library of 85,000 (and growing) Deep
Web sources
Cyber Anonymity
The New Yorker’s Strongbox,
which allows whistleblowers
to securely and anonymously
communicate with the
magazine - is a Tor Hidden
Service.
Anonymous Browser -
TOR
• TOR - The Onion Router
• runs through the
computer servers of
thousands of volunteers
(over 4,500 at time of
publishing) spread
throughout the world.
Anonymous Browser -
TOR
• Your data is bundled into
an encrypted packet
• Tor strips away part of the
packet's header, which is
a part of the addressing
information - used to
learn things about the
sender e.g. operating
system from which the
message was sent.
www.somethingsecret.onion
The Good Stuff
●
Light in the Darkness
●
The Right Tools for the
Job
●
Anonymity
The Hidden Wiki Leaks
Story behind the Rise of Wiki Leaks
 4 October 2006
Wikileaks.org
● Denial of Service attack
● Removed from the DNS
Julian Asange
Bradley Manning
● Has been charged against
– violating Espionage ACT,
stealing government
property.
● Penalized – 35 years in jail
Edward Snowden
● Secret court orders allow NSA to
sweep up Americans' phone records
● PRISM
● Britain's NSA – Taps into Fiber Optic
cables around the world
● NSA spies on world leaders and
foreign countries
The Silk Road Case
●
Silk Road was the internet's wild west
: 2011 -2013
●
$1.2bn in sales in its existence
●
nearly one million anonymous
customers
Ross Ulbricht
How that worked out
- BITCOINS
●
Bitcoin is a form of digital
currency, created and held
electronically.
●
No one controls it.
●
Bitcoins aren't printed, like dollars
or euros.
●
produced by people, and
increasingly businesses,
running computers all around
the world, using software that
solves mathematical problems.
Government
Databases
• Used by journalists
• A few examples of legal research
websites that you’ll find in the deep
web include:
• Law school court opinion search
engines
• Law library case databases
• Non-profit legal organization
search tools for legal cases
Reem Al Assil
Syrian Human Rights
Background Check
Any in-depth background check that you conduct online is likely going to cost a
modest fee.
SSN + Adhar
Why should you care about the Deep
Web?
Dark nets grant everyone the power to speak freely
without fear of censorship or persecution.
Use it wisely
“Freedom is a state of being capable of making
decisions without external control.”
QUESTIONS ??

Contenu connexe

Tendances (20)

Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
The dark web
The dark webThe dark web
The dark web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
PPT dark web
PPT dark webPPT dark web
PPT dark web
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
Deep Web
Deep WebDeep Web
Deep Web
 
Dark web
Dark webDark web
Dark web
 
Dark Web
Dark WebDark Web
Dark Web
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
Deep web
Deep webDeep web
Deep web
 
Dark web
Dark webDark web
Dark web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 

En vedette

State of Robotics 2015
State of Robotics 2015State of Robotics 2015
State of Robotics 2015HAX
 
HOME AUTOMATION USING MOBILE PHONES GIRISH HARMUKH AND NEERAJ YADAV
HOME AUTOMATION USING MOBILE PHONES GIRISH HARMUKH AND NEERAJ YADAVHOME AUTOMATION USING MOBILE PHONES GIRISH HARMUKH AND NEERAJ YADAV
HOME AUTOMATION USING MOBILE PHONES GIRISH HARMUKH AND NEERAJ YADAVGIRISH HARMUKH
 
Deep Web
Deep WebDeep Web
Deep WebSt John
 
Facebook Analysis and Study
Facebook Analysis and StudyFacebook Analysis and Study
Facebook Analysis and StudyOuriel Ohayon
 
The Deep Web - How the Deep Web Works
The Deep Web - How the Deep Web WorksThe Deep Web - How the Deep Web Works
The Deep Web - How the Deep Web WorksOmar Samy
 
Dos and Don'ts of an Engineering Statement of Purpose
Dos and Don'ts of an Engineering Statement of PurposeDos and Don'ts of an Engineering Statement of Purpose
Dos and Don'ts of an Engineering Statement of PurposeSOP Writing
 
Data made out of functions
Data made out of functionsData made out of functions
Data made out of functionskenbot
 
Presentation on Medicated Chewing Gums
Presentation on Medicated Chewing GumsPresentation on Medicated Chewing Gums
Presentation on Medicated Chewing GumsManoj Kumar Tekuri
 
Nobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
Nobel Peace Prize 2014: Malala Yousafzai and Kailash SatyarthiNobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
Nobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthimaditabalnco
 
Impossible Is Nothing
Impossible Is NothingImpossible Is Nothing
Impossible Is NothingRichard Dedor
 
Japan - An Emerging Civilization
Japan - An Emerging CivilizationJapan - An Emerging Civilization
Japan - An Emerging CivilizationEleven
 

En vedette (20)

Intro to Free Software | Swecha
Intro to Free Software | SwechaIntro to Free Software | Swecha
Intro to Free Software | Swecha
 
State of Robotics 2015
State of Robotics 2015State of Robotics 2015
State of Robotics 2015
 
HOME AUTOMATION USING MOBILE PHONES GIRISH HARMUKH AND NEERAJ YADAV
HOME AUTOMATION USING MOBILE PHONES GIRISH HARMUKH AND NEERAJ YADAVHOME AUTOMATION USING MOBILE PHONES GIRISH HARMUKH AND NEERAJ YADAV
HOME AUTOMATION USING MOBILE PHONES GIRISH HARMUKH AND NEERAJ YADAV
 
Deep Web
Deep WebDeep Web
Deep Web
 
Facebook Analysis and Study
Facebook Analysis and StudyFacebook Analysis and Study
Facebook Analysis and Study
 
10 facts about japan
10 facts about japan10 facts about japan
10 facts about japan
 
The Deep Web - How the Deep Web Works
The Deep Web - How the Deep Web WorksThe Deep Web - How the Deep Web Works
The Deep Web - How the Deep Web Works
 
Bubble gum
Bubble gumBubble gum
Bubble gum
 
Dos and Don'ts of an Engineering Statement of Purpose
Dos and Don'ts of an Engineering Statement of PurposeDos and Don'ts of an Engineering Statement of Purpose
Dos and Don'ts of an Engineering Statement of Purpose
 
Data made out of functions
Data made out of functionsData made out of functions
Data made out of functions
 
Impossible is Nothing?
Impossible is Nothing?Impossible is Nothing?
Impossible is Nothing?
 
Deep Web
Deep WebDeep Web
Deep Web
 
Presentation on Medicated Chewing Gums
Presentation on Medicated Chewing GumsPresentation on Medicated Chewing Gums
Presentation on Medicated Chewing Gums
 
Nobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
Nobel Peace Prize 2014: Malala Yousafzai and Kailash SatyarthiNobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
Nobel Peace Prize 2014: Malala Yousafzai and Kailash Satyarthi
 
Impossible Is Nothing
Impossible Is NothingImpossible Is Nothing
Impossible Is Nothing
 
Human Body
Human BodyHuman Body
Human Body
 
Nobel prize
Nobel prizeNobel prize
Nobel prize
 
Deep web
Deep webDeep web
Deep web
 
Japan - An Emerging Civilization
Japan - An Emerging CivilizationJapan - An Emerging Civilization
Japan - An Emerging Civilization
 
The Journey
The JourneyThe Journey
The Journey
 

Similaire à The Deep and Dark Web

The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)Ali Saif Mirza
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed webNitish Joshi
 
Pichman privacy, the dark web, &amp; hacker devices i school (1)
Pichman privacy, the dark web, &amp; hacker devices i school (1)Pichman privacy, the dark web, &amp; hacker devices i school (1)
Pichman privacy, the dark web, &amp; hacker devices i school (1)Stephen Abram
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR BrowserArjith K Raj
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network torKhaled Mosharraf
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterMohammed Bharmal
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) WebJeroen Baert
 

Similaire à The Deep and Dark Web (20)

Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
Darknet
DarknetDarknet
Darknet
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Pichman privacy, the dark web, &amp; hacker devices i school (1)
Pichman privacy, the dark web, &amp; hacker devices i school (1)Pichman privacy, the dark web, &amp; hacker devices i school (1)
Pichman privacy, the dark web, &amp; hacker devices i school (1)
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
 
Dark net (escalona)
Dark net (escalona)Dark net (escalona)
Dark net (escalona)
 
Introduction to anonymity network tor
Introduction to anonymity network torIntroduction to anonymity network tor
Introduction to anonymity network tor
 
Anonymity Network TOR
Anonymity Network TOR Anonymity Network TOR
Anonymity Network TOR
 
Dark net
Dark netDark net
Dark net
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 

Plus de Swecha | స్వేచ్ఛ (6)

Intro to OpenClipArt - by Swecha
Intro to OpenClipArt - by SwechaIntro to OpenClipArt - by Swecha
Intro to OpenClipArt - by Swecha
 
Inkscape - A brief
Inkscape - A briefInkscape - A brief
Inkscape - A brief
 
Android by Swecha
Android by SwechaAndroid by Swecha
Android by Swecha
 
Bala Swecha-Bridging the Digital Divide
Bala Swecha-Bridging the Digital DivideBala Swecha-Bridging the Digital Divide
Bala Swecha-Bridging the Digital Divide
 
Polymer Web Framework - Swecha Boot Camp
Polymer Web Framework - Swecha Boot CampPolymer Web Framework - Swecha Boot Camp
Polymer Web Framework - Swecha Boot Camp
 
Mongo db
Mongo dbMongo db
Mongo db
 

The Deep and Dark Web

  • 1. The Deep & Dark Web Jyotsna Gorle ThoughtWorks Inc.
  • 2. What is the Deep Web The Surface Web The Deep Web
  • 3. What is the DARK Web • The covert and illegal activities make the major part of it. It's not the same
  • 4. How it Works ? • Anonymous Browser • Secret Search Engines • Hidden Wikis • Hidden Chatrooms
  • 6. Search Engines ● Crawling ● Indexing ● Page ranking ● Meta Tags – <meta name="robots" content="noindex"> ● Robot.txt
  • 7. Where do they come formsource repository: a Library of 85,000 (and growing) Deep Web sources
  • 8. Cyber Anonymity The New Yorker’s Strongbox, which allows whistleblowers to securely and anonymously communicate with the magazine - is a Tor Hidden Service.
  • 9. Anonymous Browser - TOR • TOR - The Onion Router • runs through the computer servers of thousands of volunteers (over 4,500 at time of publishing) spread throughout the world.
  • 10. Anonymous Browser - TOR • Your data is bundled into an encrypted packet • Tor strips away part of the packet's header, which is a part of the addressing information - used to learn things about the sender e.g. operating system from which the message was sent. www.somethingsecret.onion
  • 11. The Good Stuff ● Light in the Darkness ● The Right Tools for the Job ● Anonymity
  • 13. Story behind the Rise of Wiki Leaks  4 October 2006 Wikileaks.org ● Denial of Service attack ● Removed from the DNS Julian Asange
  • 14. Bradley Manning ● Has been charged against – violating Espionage ACT, stealing government property. ● Penalized – 35 years in jail
  • 15. Edward Snowden ● Secret court orders allow NSA to sweep up Americans' phone records ● PRISM ● Britain's NSA – Taps into Fiber Optic cables around the world ● NSA spies on world leaders and foreign countries
  • 16. The Silk Road Case ● Silk Road was the internet's wild west : 2011 -2013 ● $1.2bn in sales in its existence ● nearly one million anonymous customers Ross Ulbricht
  • 17.
  • 18. How that worked out - BITCOINS ● Bitcoin is a form of digital currency, created and held electronically. ● No one controls it. ● Bitcoins aren't printed, like dollars or euros. ● produced by people, and increasingly businesses, running computers all around the world, using software that solves mathematical problems.
  • 19. Government Databases • Used by journalists • A few examples of legal research websites that you’ll find in the deep web include: • Law school court opinion search engines • Law library case databases • Non-profit legal organization search tools for legal cases Reem Al Assil Syrian Human Rights
  • 20. Background Check Any in-depth background check that you conduct online is likely going to cost a modest fee. SSN + Adhar
  • 21. Why should you care about the Deep Web? Dark nets grant everyone the power to speak freely without fear of censorship or persecution.
  • 22. Use it wisely “Freedom is a state of being capable of making decisions without external control.” QUESTIONS ??

Notes de l'éditeur

  1. Forging passports and government documents, Drug related crimes, online identity theft etc. Gruesome black market for Human Organs as well and many more.
  2. Anonymously browse and host websites
  3. The Hidden Wiki is a censorship-resistant wiki operating as a Tor hidden service that anyone can anonymously edit. The main page serves as a directory of links to other .onion sites.
  4. Worlds biggest online market place
  5. However, what many people don’t realize is that there are legitimate ways to look up background information about people at no cost on the web. You can’t get all of the details, but you can pull up information like family members, email addresses, phone numbers and even a criminal record.