Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

The Deep Web, TOR Network and Internet Anonymity

2,941 views

Published on

Presentation Contents:
Introduction to Deep Web, Contents of the Deep Web, Accessing the Deep Web, Advisement, Deep Web vs. Surface Web, Importance of Anonymity and Privacy, and Conclusions.

Published in: Internet
  • Login to see the comments

The Deep Web, TOR Network and Internet Anonymity

  1. 1. The Deep Web PRESENTED BY ABHIMANYU SINGH 1308210005; MIT MORADABAD 1
  2. 2. Contents Introduction Contents of Deep Web Accessing Deep Web Advisement Deep Web vs. Surface Web Importance of Anonymity and Privacy Conclusion 2
  3. 3. Introduction WHAT IS DEEP WEB? 3
  4. 4. Surface Web Surface Web is that portion of the World Wide Web that is indexable by standard search engines. It is also called the Clear Net, Visible Web or Indexable Web. Under constant surveillance by the Government and ISPs. 4
  5. 5. Deep Web Deep Web is the content that cannot be indexed by standard search engines. It is also called the Deep Net, Invisible Web or Hidden Web. Estimated 400-550 times more data than the Surface Web. Used by all sorts of people to stay anonymous, including Journalists, Whistle Blowers, Politicians, etc. 5
  6. 6. Visualisation The Surface Web Deep Web 6
  7. 7. Visualisation 2 7
  8. 8. Internet; Deep Web; Dark Web Internet Accessible, Indexed Dark Web Restricted, Non-indexed Deep Web Accessible, Non-indexed 8
  9. 9. Contents of the Deep Web WHAT’S INSIDE THE HIDDEN PART OF THE WEB? 9
  10. 10. Contents [1] 10 • Dynamic pages which are returned in response to a submitted query or accessed only through a form. Dynamic Content • Pages which are not linked to by other pages • These pages are referred to as pages without backlinks. Unlinked Content • Sites that require registration and login • All password protected resources. Private Web
  11. 11. Contents [2] 11 • Pages with content varying for different access contexts. Contextual Web • Sites that limit access to their pages in a technical way using Robots Exclusion Standard. • Example: Websites secured by Captcha codes. Limited Access Content • Pages that are only accessible through links produced by JavaScript • Content dynamically downloaded from Web Servers via Flash or Ajax Scripted Content
  12. 12. Inside the Deep Web: Content which is explicitly hidden 12 Presence of hidden networks such as TOR, I2P, Free net. The Deep Web may be a Shadow Land of untapped potential. The bad stuff, as always, gets most of the headlines. You can find illegal goods and activities of all kinds through Dark Web
  13. 13. Silk Road 13
  14. 14. Bitcoin e-Wallet Service 14
  15. 15. Hitman Network 15
  16. 16. The Hidden Wiki 16
  17. 17. You won’t find this information in a Google search! These kinds of Websites require you to use a special software, such as The Onion Router, more commonly known as the TOR Browser. 17
  18. 18. Accessing the Deep Web TECHNIQUES TO HAVE ANONYMITY AND ACCESS TO THE HIDDEN WEB 18
  19. 19. The Onion Router (TOR) 19 TOR Browser Bundle installs into your Web browser and sets it up to access Dark Websites. Technically, it is a free software for enabling online Anonymity and Censorship Resistance. All websites on the TOR hidden network have a .onion address.
  20. 20. TOR Installation 20
  21. 21. How TOR works? 21 • Data passes through a circuit of at least three different routers. • The data that passes through the network is encrypted. But at the end nodes there is no encryption. User R1 R2 R3 R4 R5 R6 Server 1 Server 2
  22. 22. TOR Network Circuit 22 • “This browser” is the entry node. • The system connected in France is the exit node.
  23. 23. Onion-Routing 23 An example Onion
  24. 24. 24 • ’Source’ negotiates an AES key with each router. • Messages are divided into equal sized cells. • Each router knows only its predecessor and successor . • Only the Exit router can see the message, however it does not know where the message is from.
  25. 25. Format of a cell 25 CircID Relay StreamID Digest Len DATA 2 1 2 6 2 498 • TOR implements Perfect Forward Secrecy (PFC) by using AES encryption. • In AES (Advanced Encryption Standard), a private key is generated and shared between the two users, and from this key, session keys are generated. • Original key-pairs are only used for signatures (i.e. to verify the authenticity of messages).
  26. 26. Advisement THINGS TO REMEMBER WHILE SURFING DEEP WEB/ USING TOR 26
  27. 27. 27 • Disable JavaScript and Flash content in the browser while surfing in the Dark Web. • Never log in with any of your real digital accounts using TOR, it’ll be against the Anonymity. • Prevent yourself from getting carried away into illicit activities.
  28. 28. Vulnerabilities  While the inter-relay communications might be secure, the entry and exit nodes are vulnerable to packet sniffing.  The exit node decrypts the packet it received from its sibling on the chain of nodes and receives your full plaintext request. This can be easily seen by the operator of the exit node. 28
  29. 29. 29
  30. 30. Deep Web vs. Surface Web WHY ARE WE CONSIDERING THE DEEP WEB? 30
  31. 31. The Internet is facing 3 main threats. • Every activity online is under constant surveillance by Government and the ISPS. • Xkeyscore program! It sees everything. NSA Revelations • If you think something is free, it inevitably isn’t. “If you’re not paying, YOU are the product” • Our online activities get tracked and harvested for money. Rampant Commercialisation • You can easily purchase a service which can track and cause harm to you digitally; to a great extent. • All your information is out there vulnerable to Cyber Crime. Criminals and Stalkers. 31
  32. 32. 32 Edward Snowden “I DON’T WANT TO LIVE IN A WORLD WHERE EVERYTHING THAT I SAY, EVERYTHING I DO, EVERYONE I TALK TO , EVERY EXPRESSION OF CREATIVITY OR LOVE OR FRIENDSHIP IS BEING RECORDED” • The man who is responsible for the NSA revelations. • He showed the world how everything digital is been surveillance and recorded by the Governments.
  33. 33. Even Microsoft Windows! 33 Privacy Policy of Windows 10 Operating System
  34. 34. We can learn and choose to be ANONYMOUS. 34 • In an age where NSA-type surveillance is omnipresent and privacy seems like a thing of the past, the Dark Web offers some relief to people who prioritize their anonymity. • By masking our activities, we can prevent people from monitoring us, following us or doing us harm.
  35. 35. DuckDuckGo Search Engine 35
  36. 36. Conclusion 36 We’re looking at the end of the internet, as we know it. It’s growing into a two tier-internet. One being a toll highway and another being a slow freeway. But we can do something about it. We can all go Deep Web. It’s not a place. It’s a state of mind, a way of being; being Anonymous and safe.
  37. 37. References  http://en.wikipedia.org/wiki/Deep_Web  https://en.wikipedia.org/wiki/Tor_(anonymity_network)  https://www.torproject.org/  Adrian Lamo’s answer to “What is Deep Web” on Quora.  Alen Pearce TEDx Talks https://www.youtube.com/watch?v=Va07q3HFEZQ  Kyle Terry TEDx Talks https://www.youtube.com/watch?v=HfuZJVpNWR4  Alex Winter TEDx Talks https://www.youtube.com/watch?v=luvthTjC0OI  http://computer.howstuffworks.com/internet/basics/how-the- deep-web- works5.htm  Citizenfour Documentary 37
  38. 38. Any Questions? THANK YOU 38

×