Summary

This presentation details the dark web, its characteristics, and its history and evolution. It covers topics such as the surface web, the deep web, and anonymity. The presentation also covers the history of the dark web and explores the different technologies behind it.

Full Transcript

Dark Web Kashyap Joshi Surface Web The Surface Web, also known as the Visible Web, is the portion of the internet that is indexed by standard search engines like Google, Bing, and Yahoo. It includes any web page that can be accessed through a typical web browser without any specia...

Dark Web Kashyap Joshi Surface Web The Surface Web, also known as the Visible Web, is the portion of the internet that is indexed by standard search engines like Google, Bing, and Yahoo. It includes any web page that can be accessed through a typical web browser without any special configuration or login. Characteristics Publicly accessible. Indexed by search engines. Represents a small fraction of the total internet content. Examples: News websites, social media platforms, public blogs, company websites. Deep Web The Deep Web consists of all the web pages and data that are not indexed by standard search engines. This includes anything behind paywalls, login forms, or requiring specific permissions to access. Characteristics Not indexed by search engines. Requires specific permissions or credentials to access. Significantly larger than the Surface Web. Examples: Online banking pages, subscription-based content, private databases, academic journals. Dark Web The Dark Web is a small portion of the Deep Web that has been intentionally hidden and is accessible only through special browsers, such as Tor (The Onion Router). It is often associated with anonymity and privacy. Characteristics Not indexed by standard search engines. Requires special software like Tor to access. Anonymity-focused, often used for both legal and illegal activities. Examples: Anonymous marketplaces, forums for privacy- focused discussions, sites for whistleblowing. Differentiation Accessibility: Surface Web: Easily accessible by anyone using a standard web browser. Deep Web: Requires specific permissions, logins, or credentials. Dark Web: Requires a special browser like ‘Tor’ for access and is designed to be anonymous. Continue… Indexing: Surface Web: Indexed by search engines. Deep Web: Not indexed by search engines. Dark Web: Not indexed and intentionally hidden. Continue… Content Type: Surface Web: Public information and websites. Deep Web: Private, academic, and proprietary information. Dark Web: Anonymity-based, can include illegal activities. Continue… Size: Surface Web: Smallest portion of the internet. Deep Web: Much larger than the Surface Web. Dark Web: Small part of the Deep Web. Continue… Usage: Surface Web: General browsing and accessing public information. Deep Web: Accessing private data, subscription services, and secure communication. Dark Web: Anonymity-focused activities, both legal and illegal. History and evolution of the Dark Web Early Beginnings (Pre-1990s) 1980s: The concept of the Dark Web can be traced back to the early days of the internet when the idea of anonymous and private communication networks started to emerge. This period saw the development of basic anonymizing technologies, such as the creation of remailer services that allowed users to send anonymous emails. The Rise of Onion Routing (1990s) Mid-1990s: The concept of onion routing was developed by the U.S. Naval Research Laboratory, aiming to protect U.S. intelligence communications online. Onion routing involves encapsulating data in multiple layers of encryption, which are peeled away like layers of an onion as the data passes through successive network nodes. 1995: The first prototype of onion routing was implemented, laying the foundation for future anonymous communication networks. Emergence of Tor (2000s) 2002: The development of Tor (The Onion Router) began, with the goal of enabling anonymous communication on the internet. Tor was released as a free software project, allowing anyone to browse the internet anonymously. 2003: The Tor network was launched to the public, providing users with the ability to access websites and communicate without revealing their identity or location. 2004: The Tor Project was founded as a nonprofit organization to maintain and further develop the Tor software and network. Growth and Popularization (Late 2000s to Early 2010s) Late 2000s: The Tor network gained popularity among privacy advocates, journalists, and individuals in countries with heavy internet censorship. It became a critical tool for circumventing censorship and protecting online privacy. 2008: The launch of Bitcoin, a decentralized cryptocurrency, provided a means for anonymous transactions, fueling the growth of anonymous marketplaces on the Dark Web. 2011: Silk Road, one of the most famous Dark Web marketplaces, was launched. It became known for facilitating the sale of illegal drugs and other illicit goods and services, using Bitcoin for transactions. LEA Crackdowns and Technological Advancements (2010s) 2013: Silk Road was shut down by the FBI, and its founder, Ross Ulbricht, was arrested. This event highlighted the challenges law enforcement faced in tackling illegal activities on the Dark Web. Mid-2010s: Despite crackdowns, new Dark Web marketplaces continued to emerge. Law enforcement agencies around the world began to collaborate more effectively to combat illegal activities on the Dark Web. 2014: The Tor network received significant funding from various sources, including government grants and private donations, ensuring its continued development and maintenance. Modern Era (Late 2010s to Present) Late 2010s: The Dark Web continued to evolve, with advancements in encryption technologies and the development of alternative anonymity networks, such as I2P (Invisible Internet Project) and Freenet. 2017: AlphaBay, another major Dark Web marketplace, was shut down by law enforcement agencies. This operation was part of a coordinated effort to disrupt illegal activities on the Dark Web. 2020s: The Dark Web remains a dynamic and evolving part of the internet. While it is still associated with illegal activities, it also serves as a crucial platform for whistleblowers, activists, and individuals seeking to protect their privacy in an increasingly monitored digital world. Key Technological and Social Developments Cryptocurrencies: The rise of cryptocurrencies like Bitcoin has been integral to the growth of the Dark Web, providing a means for anonymous financial transactions. Anonymizing Technologies: Continuous improvements in anonymizing technologies, including Tor, I2P, and Freenet, have enhanced the privacy and security of users on the Dark Web. Legislation and Regulation: Governments around the world have enacted laws and policies to combat illegal activities on the Dark Web, leading to significant law enforcement actions and international cooperation. Future Trends Privacy and Anonymity: The demand for privacy and anonymity online is expected to grow, driving further development of Dark Web technologies and networks. Law Enforcement: Law enforcement agencies will continue to adapt and develop new methods to combat illegal activities on the Dark Web. Decentralization: The trend towards decentralization, exemplified by blockchain technology and distributed networks, may shape the future of the Dark Web, making it even more resilient and difficult to regulate. Operating Systems (OS) for Dark Web Tails (The Amnesic Incognito Live System) Tails is a live operating system that you can start on almost any computer from a USB stick or a DVD. It aims to preserve your privacy and anonymity. Tor Integration: Tails routes all internet traffic through the Tor network to anonymize the user's online activities. Amnesic by Design: Tails does not leave any traces on the computer you use unless you explicitly ask it to. It operates entirely in RAM and does not use the hard disk. Cryptographic Tools: Includes tools like VeraCrypt for disk encryption, GnuPG for email encryption, and KeePassX for password management. Built-in Applications: Comes with a suite of privacy-oriented applications, including the Tor Browser, Thunderbird with Enigmail for encrypted emails, and the Electrum Bitcoin Wallet. Whonix Whonix is an open-source operating system focused on anonymity, privacy, and security. It is based on Debian GNU/Linux and utilizes the Tor network to achieve these goals. Isolation: Whonix is designed to be run inside virtual machines, which helps to isolate different parts of the system to prevent IP address leaks. Two-Part System: Consists of two virtual machines – the Whonix- Gateway, which routes all traffic through Tor, and the Whonix- Workstation, which operates on a completely isolated network. Compatibility: Compatible with popular virtualization software like VirtualBox and KVM. Qubes OS Qubes OS is a security-oriented operating system that leverages Xen-based virtualization to compartmentalize various activities into isolated virtual machines (VMs). Compartmentalization: Qubes OS isolates different tasks and applications into separate VMs, enhancing security and preventing a single point of failure. Tor Integration: Can be used in conjunction with Whonix to create an even more secure environment for accessing the Dark Web. Secure Networking: Provides robust networking isolation to minimize the risk of network attacks. Kodachi Linux Kodachi is a Debian-based OS designed for anonymity, privacy, and security. It comes pre-configured with tools to protect against a variety of threats. Anonymity: Routes all internet traffic through VPNs and the Tor network. Security Tools: Includes a wide range of security and privacy tools, such as VeraCrypt for disk encryption and a secure messenger for encrypted communications. Ease of Use: Designed to be user-friendly while maintaining a high level of security. Subgraph OS Subgraph OS is a security-focused Linux distribution that is designed to be resistant to surveillance and sophisticated malware attacks. Application Isolation: Uses containerization to isolate applications and reduce the attack surface. Tor Integration: Routes all internet traffic through the Tor network. Secure Messaging: Includes the Ricochet secure instant messaging client. The Dark Web Network Protocols Tor (The Onion Router) - Onion Routing I2P (Invisible Internet Project) - Garlic Routing Freenet - Distributed Data Store ZeroNet – BitTorrent GNUnet - Peer-to-Peer Networking Yggdrasil – IPv6 Mesh Networking

Use Quizgecko on...
Browser
Browser