SlideShare a Scribd company logo
1 of 13
1
2
• SURFACE WEB
• WEBPAGES THAT ARE INDEXED BY A SEARCH
ENGINE
• DEEP WEB
• WEBPAGES THAT ARE NOT INDEXED BY A
SEARCH ENGINE
• DARK WEB
• A SUBSET OF THE DEEP WEB (NON-INDEXABLE)
THAT
NEEDS EXTRA SOFTWARE TO ACCESS ITS CONTENTS
2
SURFACE WEB
• WEBSITES DISPLAYED BY
SEARCH
ENGINES
• FACEBOOK
• YOUTUBE
• INSTAGRAM
• WIKIPEDIA
• CAN BE ACCESSED BY GOOGLE’S
WEB CRAWLER
• CAN BE FOUND THROUGH THE
DOMAIN NAME SYSTEM (DNS)
3
DEEP
WEB
• NON-INDEXABLE WEBSITES
• FORUMS WHERE CONTENT IS
BLOCKED BY A LOGIN
SCREEN
• CONTAINS A ROBOT.TXT FILE
THAT STOPS SEARCH ENGINES
FROM CRAWLING IT
• ALGORITHM THAT STOPS
INCOMING REQUESTS AFTER
A CERTAIN AMOUNT OF
VISITS
4
DARK
WEB
• A SUBSET OF THE DEEP WEB
• ONLY ACCESSIBLE BY SOFTWARE SUCH AS TOR
• CONTAINS LEGAL AND ILLEGAL MATERIAL
• LEGAL (32%)
• FORUMS
• IRC SERVERS
• RADIO SERVICES
• ILLEGAL (68%)
• BLACK MARKET
• SELLING DRUGS, CHILD PORNOGRAPHY,
ASSASSINATION SERVICES
• MALWARE SERVERS
• WEAPONS
5
DARK WEB ANONYMITY
SYSTEMS
• TOR BROWSER (ANONYMITY NETWORK)
• CLIENT-SERVER
• ORBOT
• HORNET (HIGH SPEED ONION ROUTING)
• I2P (INVISIBLE INTERNET PROTOCOL)
• PEER TO PEER
• ACTS LIKE A NETWORK LAYER
• BUILDS ADDITIONAL LAYER WITHIN
TCP/IP
• FREENET
• MIX BETWEEN TOR AND I2P 6
• SOFTWARE USED TO PROTECT
USERS BY MAKING
COMMUNICATIONS HARD TO TRACE
• BOUNCES COMMUNICATIONS TO
DIFFERENT NODES LOCATED ALL AROUND
THE WORLD
• USES ENCRYPTION IN THE
APPLICATION LAYER
• HIDES LOCATION THROUGH MANY
NETWORK RELAYS
• HIDDEN WEBSITES USE THE ".ONION"
SUFFIX
7
FREEN
ET
• MIX BETWEEN PEER TO PEER AND
CLIENT- SEVER
• DE-CENTRALIZED SERVERS & DATA
• USES PEERS TO HOST NODES WHICH
STORE OTHER USER'S ENCRYPTED
DATA
• NO WAY TO TELL IF DATA IS LEGAL OR
ILLEGAL
• DE-CENTRALIZED DATA MAKES IT
HARDER TO HACK INTO
8
• The original "Silk Road" website was
located on Tor Servers
• Some think Tor has been
compromised
• A new website "Silk Road Reloaded"
appeared on a different dark web
network called I2P
• I2P uses a peer-to-peer approach where
"Essentially all peers participate in
routing for others"
• Supports various online currencies other
than Bitcoin such as Anoncoin,
Darkcoin, Dogecoin and can convert
currencies for users for a small fee
SOCIETAL IMPLICATIONS OF THE DARK
WEB
• THE DARK WEB CAN BE SEEN AS BOTH GOOD AND BAD.
• INFORMATION CAN BE EXCHANGED WITHOUT HAVING A GOVERNMENT REPRESENTATIVE
FINDING OUT.
• ALLOWS ACCESS TO REGION BLOCKED INFORMATION.
• HOWEVER, IT IS A PLATFORM FOR ILLEGAL ACTIVITY.
• ALLOWS THE PURCHASE OR SALE OF DRUGS, WEAPONS, AND HITMAN SERVICES.
10
SECURITY PRECAUTIONS WHEN
VISITING
THE DARK WEB
• DON'T TRUST ANYONE
• COVER YOUR WEBCAM WITH TAPE
• DON'T DOWNLOAD ANYTHING
• DISABLE JAVASCRIPT ON YOUR BROWSER
• CHECK THAT YOUR VIRTUAL PRIVATE
NETWORK
(VPN) IS WORKING
• USE PROXIES
• ANONYMOUS OPERATING SYSTEMS
• TAILS
• WHONIX
• JONDO
• INTERNET CAFE 11
DIFFICULTIES IN REMOVAL OF THE DARK
WEB
• IDENTITIES OF THE SITE OWNERS ARE PRESERVED WITH SOFTWARE.
• INVESTIGATING A SINGLE MARKET IS EXPENSIVE AND TIME
CONSUMING.
• TRACING PAYMENT IS DIFFICULT.
12
Thank
You

More Related Content

What's hot (20)

Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Deep Web
Deep WebDeep Web
Deep Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark web
Dark webDark web
Dark web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
Dark wed
Dark wedDark wed
Dark wed
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Deep web
Deep webDeep web
Deep web
 
Dark Web
Dark WebDark Web
Dark Web
 

Similar to Dark Web Presentation.pptx

Team4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark webTeam4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark webIkramUlhaq401878
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark WebTom Kranz
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) WebJeroen Baert
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR BrowserArjith K Raj
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetPriyanka Aash
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed webNitish Joshi
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous CommunicationFabio Pietrosanti
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
 
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive RegimesTor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive RegimesD. Hill
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion routerJapneet Singh
 

Similar to Dark Web Presentation.pptx (20)

Team4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark webTeam4_DeepDarkWeb the reality of dark web
Team4_DeepDarkWeb the reality of dark web
 
Deep Web
Deep WebDeep Web
Deep Web
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
 
Why We Need a Dark(er) Web
Why We Need a Dark(er) WebWhy We Need a Dark(er) Web
Why We Need a Dark(er) Web
 
Overview of Deep web
Overview of Deep webOverview of Deep web
Overview of Deep web
 
ToR - Deep Web
ToR -  Deep Web ToR -  Deep Web
ToR - Deep Web
 
Dark web (1)
Dark web (1)Dark web (1)
Dark web (1)
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internet
 
Darknet
DarknetDarknet
Darknet
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Dark net
Dark netDark net
Dark net
 
Darknet
DarknetDarknet
Darknet
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Deep web
Deep webDeep web
Deep web
 
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive RegimesTor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
Tor as an Attack Tool: Penetrating Firewalls in Repressive Regimes
 
Tor the onion router
Tor   the onion routerTor   the onion router
Tor the onion router
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Dark Web Presentation.pptx

  • 1. 1
  • 2. 2 • SURFACE WEB • WEBPAGES THAT ARE INDEXED BY A SEARCH ENGINE • DEEP WEB • WEBPAGES THAT ARE NOT INDEXED BY A SEARCH ENGINE • DARK WEB • A SUBSET OF THE DEEP WEB (NON-INDEXABLE) THAT NEEDS EXTRA SOFTWARE TO ACCESS ITS CONTENTS 2
  • 3. SURFACE WEB • WEBSITES DISPLAYED BY SEARCH ENGINES • FACEBOOK • YOUTUBE • INSTAGRAM • WIKIPEDIA • CAN BE ACCESSED BY GOOGLE’S WEB CRAWLER • CAN BE FOUND THROUGH THE DOMAIN NAME SYSTEM (DNS) 3
  • 4. DEEP WEB • NON-INDEXABLE WEBSITES • FORUMS WHERE CONTENT IS BLOCKED BY A LOGIN SCREEN • CONTAINS A ROBOT.TXT FILE THAT STOPS SEARCH ENGINES FROM CRAWLING IT • ALGORITHM THAT STOPS INCOMING REQUESTS AFTER A CERTAIN AMOUNT OF VISITS 4
  • 5. DARK WEB • A SUBSET OF THE DEEP WEB • ONLY ACCESSIBLE BY SOFTWARE SUCH AS TOR • CONTAINS LEGAL AND ILLEGAL MATERIAL • LEGAL (32%) • FORUMS • IRC SERVERS • RADIO SERVICES • ILLEGAL (68%) • BLACK MARKET • SELLING DRUGS, CHILD PORNOGRAPHY, ASSASSINATION SERVICES • MALWARE SERVERS • WEAPONS 5
  • 6. DARK WEB ANONYMITY SYSTEMS • TOR BROWSER (ANONYMITY NETWORK) • CLIENT-SERVER • ORBOT • HORNET (HIGH SPEED ONION ROUTING) • I2P (INVISIBLE INTERNET PROTOCOL) • PEER TO PEER • ACTS LIKE A NETWORK LAYER • BUILDS ADDITIONAL LAYER WITHIN TCP/IP • FREENET • MIX BETWEEN TOR AND I2P 6
  • 7. • SOFTWARE USED TO PROTECT USERS BY MAKING COMMUNICATIONS HARD TO TRACE • BOUNCES COMMUNICATIONS TO DIFFERENT NODES LOCATED ALL AROUND THE WORLD • USES ENCRYPTION IN THE APPLICATION LAYER • HIDES LOCATION THROUGH MANY NETWORK RELAYS • HIDDEN WEBSITES USE THE ".ONION" SUFFIX 7
  • 8. FREEN ET • MIX BETWEEN PEER TO PEER AND CLIENT- SEVER • DE-CENTRALIZED SERVERS & DATA • USES PEERS TO HOST NODES WHICH STORE OTHER USER'S ENCRYPTED DATA • NO WAY TO TELL IF DATA IS LEGAL OR ILLEGAL • DE-CENTRALIZED DATA MAKES IT HARDER TO HACK INTO 8
  • 9. • The original "Silk Road" website was located on Tor Servers • Some think Tor has been compromised • A new website "Silk Road Reloaded" appeared on a different dark web network called I2P • I2P uses a peer-to-peer approach where "Essentially all peers participate in routing for others" • Supports various online currencies other than Bitcoin such as Anoncoin, Darkcoin, Dogecoin and can convert currencies for users for a small fee
  • 10. SOCIETAL IMPLICATIONS OF THE DARK WEB • THE DARK WEB CAN BE SEEN AS BOTH GOOD AND BAD. • INFORMATION CAN BE EXCHANGED WITHOUT HAVING A GOVERNMENT REPRESENTATIVE FINDING OUT. • ALLOWS ACCESS TO REGION BLOCKED INFORMATION. • HOWEVER, IT IS A PLATFORM FOR ILLEGAL ACTIVITY. • ALLOWS THE PURCHASE OR SALE OF DRUGS, WEAPONS, AND HITMAN SERVICES. 10
  • 11. SECURITY PRECAUTIONS WHEN VISITING THE DARK WEB • DON'T TRUST ANYONE • COVER YOUR WEBCAM WITH TAPE • DON'T DOWNLOAD ANYTHING • DISABLE JAVASCRIPT ON YOUR BROWSER • CHECK THAT YOUR VIRTUAL PRIVATE NETWORK (VPN) IS WORKING • USE PROXIES • ANONYMOUS OPERATING SYSTEMS • TAILS • WHONIX • JONDO • INTERNET CAFE 11
  • 12. DIFFICULTIES IN REMOVAL OF THE DARK WEB • IDENTITIES OF THE SITE OWNERS ARE PRESERVED WITH SOFTWARE. • INVESTIGATING A SINGLE MARKET IS EXPENSIVE AND TIME CONSUMING. • TRACING PAYMENT IS DIFFICULT. 12