SlideShare a Scribd company logo
1 of 38
The Deep Web
PRESENTED BY ABHIMANYU SINGH
1308210005; MIT MORADABAD
1
Contents
Introduction
Contents of Deep Web
Accessing Deep Web
Advisement
Deep Web vs. Surface Web
Importance of Anonymity and Privacy
Conclusion
2
Introduction
WHAT IS DEEP WEB?
3
Surface Web
Surface Web is that portion of the World Wide Web that is
indexable by standard search engines.
It is also called the Clear Net, Visible Web or Indexable Web.
Under constant surveillance by the Government and ISPs.
4
Deep Web
Deep Web is the content that cannot be indexed by
standard search engines.
It is also called the Deep Net, Invisible Web or Hidden
Web.
Estimated 400-550 times more data than the Surface Web.
Used by all sorts of people to stay anonymous, including
Journalists, Whistle Blowers, Politicians, etc.
5
Visualisation
The Surface Web
Deep Web
6
Visualisation 2 7
Internet; Deep Web; Dark
Web
Internet
Accessible, Indexed
Dark Web
Restricted, Non-indexed
Deep Web
Accessible, Non-indexed
8
Contents of the
Deep Web
WHAT’S INSIDE THE HIDDEN PART OF THE WEB?
9
Contents [1] 10
• Dynamic pages which are returned in response to a submitted
query or accessed only through a form.
Dynamic Content
• Pages which are not linked to by other pages
• These pages are referred to as pages without backlinks.
Unlinked Content
• Sites that require registration and login
• All password protected resources.
Private Web
Contents [2] 11
• Pages with content varying for different access contexts.
Contextual Web
• Sites that limit access to their pages in a technical way using Robots
Exclusion Standard.
• Example: Websites secured by Captcha codes.
Limited Access Content
• Pages that are only accessible through links produced by JavaScript
• Content dynamically downloaded from Web Servers via Flash or Ajax
Scripted Content
Inside the Deep Web: Content
which is explicitly hidden
12
Presence of hidden networks such as TOR, I2P, Free net.
The Deep Web may be a Shadow Land of untapped
potential.
The bad stuff, as always, gets most of the headlines.
You can find illegal goods and activities of all kinds
through Dark Web
Silk Road 13
Bitcoin e-Wallet Service 14
Hitman Network 15
The Hidden Wiki 16
You won’t find this
information in a Google
search!
These kinds of Websites require you to use a special software,
such as The Onion Router, more commonly known as the TOR
Browser.
17
Accessing the
Deep Web
TECHNIQUES TO HAVE ANONYMITY AND ACCESS TO
THE HIDDEN WEB
18
The Onion Router (TOR) 19
TOR Browser Bundle installs into your Web browser and sets it
up to access Dark Websites.
Technically, it is a free software for enabling online Anonymity
and Censorship Resistance.
All websites on the TOR hidden network have a .onion address.
TOR Installation 20
How TOR works? 21
• Data passes through a circuit of at least three different routers.
• The data that passes through the network is encrypted. But at
the end nodes there is no encryption.
User
R1
R2
R3
R4
R5
R6
Server
1
Server
2
TOR Network Circuit 22
• “This browser” is the entry node.
• The system connected in France is the exit node.
Onion-Routing 23
An example Onion
24
• ’Source’ negotiates an AES key with each router.
• Messages are divided into equal sized cells.
• Each router knows only its predecessor and successor .
• Only the Exit router can see the message,
however it does not know where the message is from.
Format of a cell 25
CircID Relay StreamID Digest Len DATA
2 1 2 6 2 498
• TOR implements Perfect Forward Secrecy (PFC) by using AES encryption.
• In AES (Advanced Encryption Standard), a private key is generated and
shared between the two users, and from this key, session keys are
generated.
• Original key-pairs are only used for signatures (i.e. to verify the authenticity of
messages).
Advisement
THINGS TO REMEMBER WHILE SURFING DEEP WEB/
USING TOR
26
27
• Disable JavaScript and Flash content in the browser
while surfing in the Dark Web.
• Never log in with any of your real digital accounts
using TOR, it’ll be against the Anonymity.
• Prevent yourself from getting carried away into illicit
activities.
Vulnerabilities
 While the inter-relay communications might be secure,
the entry and exit nodes are vulnerable to packet
sniffing.
 The exit node decrypts the packet it received from its
sibling on the chain of nodes and receives your full
plaintext request. This can be easily seen by the
operator of the exit node.
28
29
Deep Web vs.
Surface Web
WHY ARE WE CONSIDERING THE DEEP WEB?
30
The Internet is facing 3 main
threats.
• Every activity online is under constant surveillance by Government and the ISPS.
• Xkeyscore program! It sees everything.
NSA Revelations
• If you think something is free, it inevitably isn’t. “If you’re not paying, YOU are the
product”
• Our online activities get tracked and harvested for money.
Rampant Commercialisation
• You can easily purchase a service which can track and cause harm to you digitally; to a
great extent.
• All your information is out there vulnerable to Cyber Crime.
Criminals and Stalkers.
31
32
Edward Snowden
“I DON’T WANT TO LIVE IN
A WORLD WHERE
EVERYTHING THAT I SAY,
EVERYTHING I DO,
EVERYONE I TALK TO ,
EVERY EXPRESSION OF
CREATIVITY OR LOVE OR
FRIENDSHIP IS BEING
RECORDED”
• The man who is responsible for the NSA revelations.
• He showed the world how everything digital is been
surveillance and recorded by the Governments.
Even Microsoft Windows! 33
Privacy Policy of Windows 10 Operating System
We can learn and choose to
be ANONYMOUS.
34
• In an age where NSA-type surveillance is
omnipresent and privacy seems like a thing
of the past, the Dark Web offers some relief
to people who prioritize their anonymity.
• By masking our activities, we can prevent
people from monitoring us, following us or
doing us harm.
DuckDuckGo Search Engine 35
Conclusion 36
We’re looking at the end of the internet, as we know it.
It’s growing into a two tier-internet. One being a toll highway
and another being a slow freeway.
But we can do something about it. We can all go Deep Web.
It’s not a place. It’s a state of mind, a way of being; being
Anonymous and safe.
References
 http://en.wikipedia.org/wiki/Deep_Web
 https://en.wikipedia.org/wiki/Tor_(anonymity_network)
 https://www.torproject.org/
 Adrian Lamo’s answer to “What is Deep Web” on Quora.
 Alen Pearce TEDx Talks
https://www.youtube.com/watch?v=Va07q3HFEZQ
 Kyle Terry TEDx Talks
https://www.youtube.com/watch?v=HfuZJVpNWR4
 Alex Winter TEDx Talks
https://www.youtube.com/watch?v=luvthTjC0OI
 http://computer.howstuffworks.com/internet/basics/how-the-
deep-web- works5.htm
 Citizenfour Documentary
37
Any Questions?
THANK YOU
38

More Related Content

What's hot

The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNetJames Bollen
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth YuKenny Yu
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep webKhaled Sany
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 

What's hot (20)

The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark web
Dark webDark web
Dark web
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Deep Web
Deep WebDeep Web
Deep Web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Dark wed
Dark wedDark wed
Dark wed
 
PPT dark web
PPT dark webPPT dark web
PPT dark web
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
 
Darknet
DarknetDarknet
Darknet
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 

Similar to The Deep Web, TOR Network and Internet Anonymity

Darkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxDarkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxJamalAmzil6
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark webJisc
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterMohammed Bharmal
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosisP-e-t-a-r
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyb coatesworth
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfAuto Parts Wholesale Online
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebNicholas Davis
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfTopLinkSeo
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Auto Parts Wholesale Online
 

Similar to The Deep Web, TOR Network and Internet Anonymity (20)

Deep web
Deep webDeep web
Deep web
 
Darkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptxDarkle Slideshow _ by Slidesgo.pptx
Darkle Slideshow _ by Slidesgo.pptx
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Darknet
DarknetDarknet
Darknet
 
Darkweb
DarkwebDarkweb
Darkweb
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Darknet
DarknetDarknet
Darknet
 
78751355 cryptomorphosis
78751355 cryptomorphosis78751355 cryptomorphosis
78751355 cryptomorphosis
 
Dw communication
Dw communicationDw communication
Dw communication
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep Web
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdf
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
 
Dark net
Dark netDark net
Dark net
 

Recently uploaded

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxMario
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxNIMMANAGANTI RAMAKRISHNA
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxmibuzondetrabajo
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxAndrieCagasanAkio
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 

Recently uploaded (11)

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Company Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptxCompany Snapshot Theme for Business by Slidesgo.pptx
Company Snapshot Theme for Business by Slidesgo.pptx
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
ETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptxETHICAL HACKING dddddddddddddddfnandni.pptx
ETHICAL HACKING dddddddddddddddfnandni.pptx
 
Unidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptxUnidad 4 – Redes de ordenadores (en inglés).pptx
Unidad 4 – Redes de ordenadores (en inglés).pptx
 
TRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptxTRENDS Enabling and inhibiting dimensions.pptx
TRENDS Enabling and inhibiting dimensions.pptx
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 

The Deep Web, TOR Network and Internet Anonymity

  • 1. The Deep Web PRESENTED BY ABHIMANYU SINGH 1308210005; MIT MORADABAD 1
  • 2. Contents Introduction Contents of Deep Web Accessing Deep Web Advisement Deep Web vs. Surface Web Importance of Anonymity and Privacy Conclusion 2
  • 4. Surface Web Surface Web is that portion of the World Wide Web that is indexable by standard search engines. It is also called the Clear Net, Visible Web or Indexable Web. Under constant surveillance by the Government and ISPs. 4
  • 5. Deep Web Deep Web is the content that cannot be indexed by standard search engines. It is also called the Deep Net, Invisible Web or Hidden Web. Estimated 400-550 times more data than the Surface Web. Used by all sorts of people to stay anonymous, including Journalists, Whistle Blowers, Politicians, etc. 5
  • 8. Internet; Deep Web; Dark Web Internet Accessible, Indexed Dark Web Restricted, Non-indexed Deep Web Accessible, Non-indexed 8
  • 9. Contents of the Deep Web WHAT’S INSIDE THE HIDDEN PART OF THE WEB? 9
  • 10. Contents [1] 10 • Dynamic pages which are returned in response to a submitted query or accessed only through a form. Dynamic Content • Pages which are not linked to by other pages • These pages are referred to as pages without backlinks. Unlinked Content • Sites that require registration and login • All password protected resources. Private Web
  • 11. Contents [2] 11 • Pages with content varying for different access contexts. Contextual Web • Sites that limit access to their pages in a technical way using Robots Exclusion Standard. • Example: Websites secured by Captcha codes. Limited Access Content • Pages that are only accessible through links produced by JavaScript • Content dynamically downloaded from Web Servers via Flash or Ajax Scripted Content
  • 12. Inside the Deep Web: Content which is explicitly hidden 12 Presence of hidden networks such as TOR, I2P, Free net. The Deep Web may be a Shadow Land of untapped potential. The bad stuff, as always, gets most of the headlines. You can find illegal goods and activities of all kinds through Dark Web
  • 17. You won’t find this information in a Google search! These kinds of Websites require you to use a special software, such as The Onion Router, more commonly known as the TOR Browser. 17
  • 18. Accessing the Deep Web TECHNIQUES TO HAVE ANONYMITY AND ACCESS TO THE HIDDEN WEB 18
  • 19. The Onion Router (TOR) 19 TOR Browser Bundle installs into your Web browser and sets it up to access Dark Websites. Technically, it is a free software for enabling online Anonymity and Censorship Resistance. All websites on the TOR hidden network have a .onion address.
  • 21. How TOR works? 21 • Data passes through a circuit of at least three different routers. • The data that passes through the network is encrypted. But at the end nodes there is no encryption. User R1 R2 R3 R4 R5 R6 Server 1 Server 2
  • 22. TOR Network Circuit 22 • “This browser” is the entry node. • The system connected in France is the exit node.
  • 24. 24 • ’Source’ negotiates an AES key with each router. • Messages are divided into equal sized cells. • Each router knows only its predecessor and successor . • Only the Exit router can see the message, however it does not know where the message is from.
  • 25. Format of a cell 25 CircID Relay StreamID Digest Len DATA 2 1 2 6 2 498 • TOR implements Perfect Forward Secrecy (PFC) by using AES encryption. • In AES (Advanced Encryption Standard), a private key is generated and shared between the two users, and from this key, session keys are generated. • Original key-pairs are only used for signatures (i.e. to verify the authenticity of messages).
  • 26. Advisement THINGS TO REMEMBER WHILE SURFING DEEP WEB/ USING TOR 26
  • 27. 27 • Disable JavaScript and Flash content in the browser while surfing in the Dark Web. • Never log in with any of your real digital accounts using TOR, it’ll be against the Anonymity. • Prevent yourself from getting carried away into illicit activities.
  • 28. Vulnerabilities  While the inter-relay communications might be secure, the entry and exit nodes are vulnerable to packet sniffing.  The exit node decrypts the packet it received from its sibling on the chain of nodes and receives your full plaintext request. This can be easily seen by the operator of the exit node. 28
  • 29. 29
  • 30. Deep Web vs. Surface Web WHY ARE WE CONSIDERING THE DEEP WEB? 30
  • 31. The Internet is facing 3 main threats. • Every activity online is under constant surveillance by Government and the ISPS. • Xkeyscore program! It sees everything. NSA Revelations • If you think something is free, it inevitably isn’t. “If you’re not paying, YOU are the product” • Our online activities get tracked and harvested for money. Rampant Commercialisation • You can easily purchase a service which can track and cause harm to you digitally; to a great extent. • All your information is out there vulnerable to Cyber Crime. Criminals and Stalkers. 31
  • 32. 32 Edward Snowden “I DON’T WANT TO LIVE IN A WORLD WHERE EVERYTHING THAT I SAY, EVERYTHING I DO, EVERYONE I TALK TO , EVERY EXPRESSION OF CREATIVITY OR LOVE OR FRIENDSHIP IS BEING RECORDED” • The man who is responsible for the NSA revelations. • He showed the world how everything digital is been surveillance and recorded by the Governments.
  • 33. Even Microsoft Windows! 33 Privacy Policy of Windows 10 Operating System
  • 34. We can learn and choose to be ANONYMOUS. 34 • In an age where NSA-type surveillance is omnipresent and privacy seems like a thing of the past, the Dark Web offers some relief to people who prioritize their anonymity. • By masking our activities, we can prevent people from monitoring us, following us or doing us harm.
  • 36. Conclusion 36 We’re looking at the end of the internet, as we know it. It’s growing into a two tier-internet. One being a toll highway and another being a slow freeway. But we can do something about it. We can all go Deep Web. It’s not a place. It’s a state of mind, a way of being; being Anonymous and safe.
  • 37. References  http://en.wikipedia.org/wiki/Deep_Web  https://en.wikipedia.org/wiki/Tor_(anonymity_network)  https://www.torproject.org/  Adrian Lamo’s answer to “What is Deep Web” on Quora.  Alen Pearce TEDx Talks https://www.youtube.com/watch?v=Va07q3HFEZQ  Kyle Terry TEDx Talks https://www.youtube.com/watch?v=HfuZJVpNWR4  Alex Winter TEDx Talks https://www.youtube.com/watch?v=luvthTjC0OI  http://computer.howstuffworks.com/internet/basics/how-the- deep-web- works5.htm  Citizenfour Documentary 37

Editor's Notes

  1. >>In 1994 Jill Ellsworth used the term invisible web to refer to the websites that were not registered with any search engines. >>In 2000 Computer Scientist Mike Bergman used the term “Deep Web” in a NewYorkTimes article.
  2. >>Private Web: All content that requires authentication.
  3. >>Contextual Web Content: Location based result by client IP; or; result by previous navigation sequence. >> Limited Access Content: these sites prevents the search engines from creating cached copies. An Internet bot, also known as web robot, WWW robot or simply bot, is a software application that runs automated tasks (scripts) over theInternet.
  4. >>Bad stuff on dark web: illicit drugs, stolen credit card numbers, human trafficking, weapons, copyrighted media and anything else you can think of.
  5. Point is not to let you know about the illegal stuff, but to emphasise on a very crucial
  6. All sorts of people use them for anonymity. Journalists, Politicians, whistle-blowers, dissidents. whistleblower is a person who exposes any kind of information or activity that is deemed illegal, unethical, or not correct Dissident a person who opposes official policy.
  7. TOR- Node based, decentralized anonymity network. US NAVAL Research; 80% of their budget still comes from US Government. Websites have a .onion address
  8. R[i] are network relays. Relay is a Fixed stationor a mobile station that receives signals and rebroadcasts them at the same or a different frequency Your system could be a relay unknowingly.
  9. AES: Advanced Encryption Standard
  10. CircID: ID of the complete circuit Relay: RelayID of a particular Relay Node StreamID: ID of the data stream. Digest: SHA-1 produces a 160-bit (20-byte) hash value known as a message digest. (for integrity checking at the edges of the stream).
  11. Don’t use TOR alone, use some VPN service as well. Preferrably try not to use it on windows.
  12. Rampant Commercialization: Rampant means something unwelcomed, flourishing or spreading unchecked. NSA Revelations: Why are the surveillancing? Because they can.Every govt wants to know what it’s people are saying or thinking. “Information is power”
  13. Snowden: Former CIA employee. Worked on contract bases for “Classified” surveillance programs of NSA.
  14. You’re made to agree to this policy in the end-user agreement, at the tie of installation.
  15. We can change our digital practices such as Email, Search Engines, etc. DuckDuckGo is a search engine that doesn’t keep track of your searches. Similarly you can use different services.
  16. Doesn’t track your online searches. Good alternate to Google, something you can rely on,