SlideShare a Scribd company logo
1 of 32
Download to read offline
Deep Web
[Seminar Presentation]
Presented by
Md. Abul Hossain Student ID: 130918
Niloy Sikder Student ID: 120906
Md. Nazmul Hashib Student ID: 130925
Year: 4th, Term: II
ECE Discipline
Khulna University, Khulna
Presented to
Dr. Md. Shamim Ahsan
Professor
ECE Discipline
Khulna University, Khulna
&
Rafia Nishat Toma
Assistant Professor
ECE Discipline
Khulna University, Khulna
October 11, 2017 ECE Discipline, KU 2
Outline of The Presentation
 Introduction
 What is Deep Web?
 Deep Web or Darknet?
 Origin of Deep Web
 Why Do Search Engines Fail to Find Them?
 Darknet
 What is Bitcoin?
 Should You Switch to TOR?
 Who is Controlling the Darknet?
 What Can You Find in Darknet Markets?
 Who and Why Are People Using It?
 What are the Risks of Using It?
 Challenges and Future of Deep Web
 Conclusion
Introduction
What is Deep Web?
Part of the World Wide Web whose content is not indexed by standard search
engines and requires direct approach or special search engines to access.
 Thousand times larger than the surface web
 Requires some knowledge to remain anonymous and do business.
 Easy to browse and interact with the internet anonymously
 Uses different techniques to avoid getting detected by search engines
 Legal to surf the Deep Web and conduct business, if you are not doing
anything which illegal in surface web or real world.
October 11, 2017 ECE Discipline, KU 4
Deep Web or Darknet
 Deep Web indicates the contents that are not enlisted and hence can not be
found directly form the results of a traditional search engine
 Deep web can be accessed through website oriented search engines
 Daknet points to the content that are hidden intentionally
 Dark net is the hidden part of Deep Web
 Darknet can only be accessed through specialized brower
October 11, 2017 ECE Discipline, KU 5
Fig. 1: Metaphorical illustration of Surface Web, Deep Web and Darknet
October 11, 2017 ECE Discipline, KU 6
Origin of Deep Web
1997 – The first Onion Router was developed from the funding of DARPA
 1995 – Paul Syverson, David Goldschlag and Michael Reed started
working on “Onion routing” at the Naval Research Laboratory
 2004 – U.S. Navy released the source code to the public
 5 December , 1969 – the day internet was activated along with deep web
1999 – MIT students started working with Naval Research Laboratory
mathematicians on the “Free Haven Project” that resulted an onion search
engine and a browser
 We all know what happened next but don’t really know how and when
October 11, 2017 ECE Discipline, KU 8
Why Do Search Engines Fail to
Find Deep Web Contents?
Because Deep Web Contents are...
 Contextual Web
October 11, 2017 ECE Discipline, KU 10
 Dynamic content
 Limited access
content:
 Non-HTML/text content
 Private Web
 Scripted content
 Web archives
 Unlinked content
 Software
Darknet
Why Darknet?
To avoid the pry eyes on the surface web.....
October 11, 2017 ECE Discipline, KU 12
How to Access Darknet
Demonstration
 Download TOR
 Done...
 Set up TOR network (automatic)
 Install TOR
October 11, 2017 ECE Discipline, KU 13
What is Bitcoin?
October 11, 2017 ECE Discipline, KU 15
A virtual cryptocurrency unit used for transactions in the darknet
 Was invented in 2009
 Inventor unknown
 1 BTC = 4852.02 USD
Fig. 4: Bitcoin illustration (imaginary)
Should You Switch to TOR?
Entirely depends on you, your needs and expectations
 Never use the same E-mail address and password twice
 Prefer a different PC and a public connection/ Wi-fi
 Encrypt any form of personal information/ password in your PC
 Get a paid VPN service
 Never give true information/ credit card details to any website
 Get a drill/ gas burner to destroy hard drives, modems & NIC cards
October 11, 2017 ECE Discipline, KU 17
Who is Controlling the Darknet?
Nobody
 Darknet markets are controlled by anonymous website admin(s)
 An anonymous group control the TOR network and it’s database
 No central server, so no centralized control
 Each and Every website is maintained by it’s owner
 Another group provides regular TOR updates so that the previous one
can’s pry on you
October 11, 2017 ECE Discipline, KU 18
What Can You Find in
Darknet Markets?
Everything you can find in the surface Web
+
Everything you can’t (legally)
 Websites are very organized and provide accurate product description
 Products are actually cheaper than the local market
 Customers’ reviews also ensure products’ purity
 Sellers are very customer friendly as they depend on customers’ reviews
 They have detailed T&Cs and they maintain them seriously
 Provide special offers like – discounts, buy 1 get 1 free, free delivery, bonus
 Even refunds money if you’re not satisfied with the product/ service
October 11, 2017 ECE Discipline, KU 21
Deep web & Darknet
Deep web & Darknet
Who and Why Are People Using
Darknet?
Whoever seeks privacy and knows about it
 Pirates
 Businessmen
 Journalists
 Hackers
 Criminals
 Politicians
 Terrorists
 The Army
 Secret Services
 Students
 Researchers
October 11, 2017 ECE Discipline, KU 25
Risks of Using Darknet
 Someone can blow your cover
 You can raise unnecessary suspicions
 Your system can get infected with viruses
 You can lose a lot of money
 You and only you are accountable for your actions
 You can easily be a pray of watchers (could be the Government)
October 11, 2017 ECE Discipline, KU 27
Challenges and Future of Deep Web
 Has faced a lot of challenges and solved them through various manners
 Illegal market handlers and pirates will be arrested and charged
 A website can be shut down anytime, if they track down the servers
 Can end the dominance of information-hungry organizations
 About 2 million people are using Darknet at this moment
 Currently facing continuous threats from conservative governments
 Will be mainstream within the next decade according to the web analysts
 Recently a singer released his music album in the darknet
October 11, 2017 ECE Discipline, KU 29
Conclusion
Knowledge is power
Know more about the internet and choose your actions wisely
October 11, 2017 ECE Discipline, KU 31
THANK YOU
ANY QUESTIONS?

More Related Content

What's hot (20)

The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Deep web
Deep webDeep web
Deep web
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Deep web
Deep webDeep web
Deep web
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknet
 
The dark web
The dark webThe dark web
The dark web
 
Deep Web
Deep WebDeep Web
Deep Web
 
Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
Deep web
Deep webDeep web
Deep web
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Dark wed
Dark wedDark wed
Dark wed
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 

Similar to Deep web & Darknet

Protocols Of Encryption And Encryption
Protocols Of Encryption And EncryptionProtocols Of Encryption And Encryption
Protocols Of Encryption And EncryptionJill Bell
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebNicholas Davis
 
Understanding The Basis Of The Dark Web
Understanding The Basis Of The Dark WebUnderstanding The Basis Of The Dark Web
Understanding The Basis Of The Dark WebCarolina Fox
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The DarknetAhmed Mater
 
Future of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep LearningFuture of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep LearningMelanie Swan
 
A Practical Introduction to Blockchain
A Practical Introduction to Blockchain A Practical Introduction to Blockchain
A Practical Introduction to Blockchain WHU Incubator
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet ReportAhmed Mater
 
Hhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethicsHhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethicsShoaib Sheikh
 
English Essay About Discipline In School
English Essay About Discipline In SchoolEnglish Essay About Discipline In School
English Essay About Discipline In SchoolRick Vogel
 
Presentation internet programming report
Presentation internet programming reportPresentation internet programming report
Presentation internet programming reportBilal Maqbool ツ
 
Copyright and it’s simplicity take 3
Copyright and it’s simplicity take 3Copyright and it’s simplicity take 3
Copyright and it’s simplicity take 3karlriley
 
Domain Name System Or Dns Is A Mechanism For Resolving...
Domain Name System Or Dns Is A Mechanism For Resolving...Domain Name System Or Dns Is A Mechanism For Resolving...
Domain Name System Or Dns Is A Mechanism For Resolving...Barb Tillich
 
Smart Crawler, For Efficient Harvesting Deep Web...
Smart Crawler, For Efficient Harvesting Deep Web...Smart Crawler, For Efficient Harvesting Deep Web...
Smart Crawler, For Efficient Harvesting Deep Web...Jessica Rinehart
 
Blockchain Economic Theory
Blockchain Economic TheoryBlockchain Economic Theory
Blockchain Economic TheoryMelanie Swan
 
WordPress op de Blockchain in 2030, WordCamp Rotterdam 2019
WordPress op de Blockchain in 2030, WordCamp Rotterdam 2019WordPress op de Blockchain in 2030, WordCamp Rotterdam 2019
WordPress op de Blockchain in 2030, WordCamp Rotterdam 2019Bas van der Lans
 
Rafael Popper TAFI workshop
Rafael Popper TAFI workshopRafael Popper TAFI workshop
Rafael Popper TAFI workshopblogzilla
 

Similar to Deep web & Darknet (20)

Protocols Of Encryption And Encryption
Protocols Of Encryption And EncryptionProtocols Of Encryption And Encryption
Protocols Of Encryption And Encryption
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep Web
 
Understanding The Basis Of The Dark Web
Understanding The Basis Of The Dark WebUnderstanding The Basis Of The Dark Web
Understanding The Basis Of The Dark Web
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Future of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep LearningFuture of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep Learning
 
A Practical Introduction to Blockchain
A Practical Introduction to Blockchain A Practical Introduction to Blockchain
A Practical Introduction to Blockchain
 
Deep web
Deep webDeep web
Deep web
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
Hhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethicsHhs en12 legalities_and_ethics
Hhs en12 legalities_and_ethics
 
The First Telegraph
The First TelegraphThe First Telegraph
The First Telegraph
 
English Essay About Discipline In School
English Essay About Discipline In SchoolEnglish Essay About Discipline In School
English Essay About Discipline In School
 
Presentation internet programming report
Presentation internet programming reportPresentation internet programming report
Presentation internet programming report
 
Copyright and it’s simplicity take 3
Copyright and it’s simplicity take 3Copyright and it’s simplicity take 3
Copyright and it’s simplicity take 3
 
Domain Name System Or Dns Is A Mechanism For Resolving...
Domain Name System Or Dns Is A Mechanism For Resolving...Domain Name System Or Dns Is A Mechanism For Resolving...
Domain Name System Or Dns Is A Mechanism For Resolving...
 
Dw communication
Dw communicationDw communication
Dw communication
 
Smart Crawler, For Efficient Harvesting Deep Web...
Smart Crawler, For Efficient Harvesting Deep Web...Smart Crawler, For Efficient Harvesting Deep Web...
Smart Crawler, For Efficient Harvesting Deep Web...
 
Blockchain Economic Theory
Blockchain Economic TheoryBlockchain Economic Theory
Blockchain Economic Theory
 
WordPress op de Blockchain in 2030, WordCamp Rotterdam 2019
WordPress op de Blockchain in 2030, WordCamp Rotterdam 2019WordPress op de Blockchain in 2030, WordCamp Rotterdam 2019
WordPress op de Blockchain in 2030, WordCamp Rotterdam 2019
 
Internet Predators
Internet PredatorsInternet Predators
Internet Predators
 
Rafael Popper TAFI workshop
Rafael Popper TAFI workshopRafael Popper TAFI workshop
Rafael Popper TAFI workshop
 

More from Niloy Sikder

A presentation on the Convolutional Neural Network (CNN)
A presentation on the Convolutional Neural Network (CNN)A presentation on the Convolutional Neural Network (CNN)
A presentation on the Convolutional Neural Network (CNN)Niloy Sikder
 
A presentation on "Heterogeneous Hand Guise Classification Based on Surface E...
A presentation on "Heterogeneous Hand Guise Classification Based on Surface E...A presentation on "Heterogeneous Hand Guise Classification Based on Surface E...
A presentation on "Heterogeneous Hand Guise Classification Based on Surface E...Niloy Sikder
 
A presentation on "Early Blindness Detection Based on Retinal Images Using En...
A presentation on "Early Blindness Detection Based on Retinal Images Using En...A presentation on "Early Blindness Detection Based on Retinal Images Using En...
A presentation on "Early Blindness Detection Based on Retinal Images Using En...Niloy Sikder
 
A presentation on "Human Activity Recognition Using Multichannel Convolutiona...
A presentation on "Human Activity Recognition Using Multichannel Convolutiona...A presentation on "Human Activity Recognition Using Multichannel Convolutiona...
A presentation on "Human Activity Recognition Using Multichannel Convolutiona...Niloy Sikder
 
A Presentation on "Human Action Recognition Based on a Sequential Deep Learni...
A Presentation on "Human Action Recognition Based on a Sequential Deep Learni...A Presentation on "Human Action Recognition Based on a Sequential Deep Learni...
A Presentation on "Human Action Recognition Based on a Sequential Deep Learni...Niloy Sikder
 
Induction Motor Bearing Health Condition Classification Using Machine Learnin...
Induction Motor Bearing Health Condition Classification Using Machine Learnin...Induction Motor Bearing Health Condition Classification Using Machine Learnin...
Induction Motor Bearing Health Condition Classification Using Machine Learnin...Niloy Sikder
 
Data Mining Primitives, Languages & Systems
Data Mining Primitives, Languages & SystemsData Mining Primitives, Languages & Systems
Data Mining Primitives, Languages & SystemsNiloy Sikder
 
Design and Analysis of 1 Gbps Multi-host Li-Fi Model Using Wavelength Divisio...
Design and Analysis of 1 Gbps Multi-host Li-Fi Model Using Wavelength Divisio...Design and Analysis of 1 Gbps Multi-host Li-Fi Model Using Wavelength Divisio...
Design and Analysis of 1 Gbps Multi-host Li-Fi Model Using Wavelength Divisio...Niloy Sikder
 
Fault Diagnosis of Induction Motor Bearing Using Cepstrum-based Preprocessing...
Fault Diagnosis of Induction Motor Bearing Using Cepstrum-based Preprocessing...Fault Diagnosis of Induction Motor Bearing Using Cepstrum-based Preprocessing...
Fault Diagnosis of Induction Motor Bearing Using Cepstrum-based Preprocessing...Niloy Sikder
 
Fault Diagnosis of Motor Bearing Using Ensemble Learning Algorithm with FFT-b...
Fault Diagnosis of Motor Bearing Using Ensemble Learning Algorithm with FFT-b...Fault Diagnosis of Motor Bearing Using Ensemble Learning Algorithm with FFT-b...
Fault Diagnosis of Motor Bearing Using Ensemble Learning Algorithm with FFT-b...Niloy Sikder
 
An Introduction to Data Mining
An Introduction to Data MiningAn Introduction to Data Mining
An Introduction to Data MiningNiloy Sikder
 

More from Niloy Sikder (12)

A presentation on the Convolutional Neural Network (CNN)
A presentation on the Convolutional Neural Network (CNN)A presentation on the Convolutional Neural Network (CNN)
A presentation on the Convolutional Neural Network (CNN)
 
A presentation on "Heterogeneous Hand Guise Classification Based on Surface E...
A presentation on "Heterogeneous Hand Guise Classification Based on Surface E...A presentation on "Heterogeneous Hand Guise Classification Based on Surface E...
A presentation on "Heterogeneous Hand Guise Classification Based on Surface E...
 
A presentation on "Early Blindness Detection Based on Retinal Images Using En...
A presentation on "Early Blindness Detection Based on Retinal Images Using En...A presentation on "Early Blindness Detection Based on Retinal Images Using En...
A presentation on "Early Blindness Detection Based on Retinal Images Using En...
 
A presentation on "Human Activity Recognition Using Multichannel Convolutiona...
A presentation on "Human Activity Recognition Using Multichannel Convolutiona...A presentation on "Human Activity Recognition Using Multichannel Convolutiona...
A presentation on "Human Activity Recognition Using Multichannel Convolutiona...
 
A Presentation on "Human Action Recognition Based on a Sequential Deep Learni...
A Presentation on "Human Action Recognition Based on a Sequential Deep Learni...A Presentation on "Human Action Recognition Based on a Sequential Deep Learni...
A Presentation on "Human Action Recognition Based on a Sequential Deep Learni...
 
Induction Motor Bearing Health Condition Classification Using Machine Learnin...
Induction Motor Bearing Health Condition Classification Using Machine Learnin...Induction Motor Bearing Health Condition Classification Using Machine Learnin...
Induction Motor Bearing Health Condition Classification Using Machine Learnin...
 
Data Mining Primitives, Languages & Systems
Data Mining Primitives, Languages & SystemsData Mining Primitives, Languages & Systems
Data Mining Primitives, Languages & Systems
 
Design and Analysis of 1 Gbps Multi-host Li-Fi Model Using Wavelength Divisio...
Design and Analysis of 1 Gbps Multi-host Li-Fi Model Using Wavelength Divisio...Design and Analysis of 1 Gbps Multi-host Li-Fi Model Using Wavelength Divisio...
Design and Analysis of 1 Gbps Multi-host Li-Fi Model Using Wavelength Divisio...
 
Fault Diagnosis of Induction Motor Bearing Using Cepstrum-based Preprocessing...
Fault Diagnosis of Induction Motor Bearing Using Cepstrum-based Preprocessing...Fault Diagnosis of Induction Motor Bearing Using Cepstrum-based Preprocessing...
Fault Diagnosis of Induction Motor Bearing Using Cepstrum-based Preprocessing...
 
Fault Diagnosis of Motor Bearing Using Ensemble Learning Algorithm with FFT-b...
Fault Diagnosis of Motor Bearing Using Ensemble Learning Algorithm with FFT-b...Fault Diagnosis of Motor Bearing Using Ensemble Learning Algorithm with FFT-b...
Fault Diagnosis of Motor Bearing Using Ensemble Learning Algorithm with FFT-b...
 
An Introduction to Data Mining
An Introduction to Data MiningAn Introduction to Data Mining
An Introduction to Data Mining
 
Autonomous cars
Autonomous carsAutonomous cars
Autonomous cars
 

Recently uploaded

Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteMavein
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilitiesalihassaah1994
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxnaveenithkrishnan
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Shubham Pant
 
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptxA_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptxjayshuklatrainer
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024Jan Löffler
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpressssuser166378
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfmchristianalwyn
 
Niche Domination Prodigy Review Plus Bonus
Niche Domination Prodigy Review Plus BonusNiche Domination Prodigy Review Plus Bonus
Niche Domination Prodigy Review Plus BonusSkylark Nobin
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
world Tuberculosis day ppt 25-3-2024.pptx
world Tuberculosis day ppt 25-3-2024.pptxworld Tuberculosis day ppt 25-3-2024.pptx
world Tuberculosis day ppt 25-3-2024.pptxnaveenithkrishnan
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsRoxana Stingu
 

Recently uploaded (15)

Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a Website
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilities
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptx
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024
 
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptxA_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpress
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
 
Niche Domination Prodigy Review Plus Bonus
Niche Domination Prodigy Review Plus BonusNiche Domination Prodigy Review Plus Bonus
Niche Domination Prodigy Review Plus Bonus
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
world Tuberculosis day ppt 25-3-2024.pptx
world Tuberculosis day ppt 25-3-2024.pptxworld Tuberculosis day ppt 25-3-2024.pptx
world Tuberculosis day ppt 25-3-2024.pptx
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
 

Deep web & Darknet

  • 1. Deep Web [Seminar Presentation] Presented by Md. Abul Hossain Student ID: 130918 Niloy Sikder Student ID: 120906 Md. Nazmul Hashib Student ID: 130925 Year: 4th, Term: II ECE Discipline Khulna University, Khulna Presented to Dr. Md. Shamim Ahsan Professor ECE Discipline Khulna University, Khulna & Rafia Nishat Toma Assistant Professor ECE Discipline Khulna University, Khulna
  • 2. October 11, 2017 ECE Discipline, KU 2 Outline of The Presentation  Introduction  What is Deep Web?  Deep Web or Darknet?  Origin of Deep Web  Why Do Search Engines Fail to Find Them?  Darknet  What is Bitcoin?  Should You Switch to TOR?  Who is Controlling the Darknet?  What Can You Find in Darknet Markets?  Who and Why Are People Using It?  What are the Risks of Using It?  Challenges and Future of Deep Web  Conclusion
  • 4. What is Deep Web? Part of the World Wide Web whose content is not indexed by standard search engines and requires direct approach or special search engines to access.  Thousand times larger than the surface web  Requires some knowledge to remain anonymous and do business.  Easy to browse and interact with the internet anonymously  Uses different techniques to avoid getting detected by search engines  Legal to surf the Deep Web and conduct business, if you are not doing anything which illegal in surface web or real world. October 11, 2017 ECE Discipline, KU 4
  • 5. Deep Web or Darknet  Deep Web indicates the contents that are not enlisted and hence can not be found directly form the results of a traditional search engine  Deep web can be accessed through website oriented search engines  Daknet points to the content that are hidden intentionally  Dark net is the hidden part of Deep Web  Darknet can only be accessed through specialized brower October 11, 2017 ECE Discipline, KU 5
  • 6. Fig. 1: Metaphorical illustration of Surface Web, Deep Web and Darknet October 11, 2017 ECE Discipline, KU 6
  • 8. 1997 – The first Onion Router was developed from the funding of DARPA  1995 – Paul Syverson, David Goldschlag and Michael Reed started working on “Onion routing” at the Naval Research Laboratory  2004 – U.S. Navy released the source code to the public  5 December , 1969 – the day internet was activated along with deep web 1999 – MIT students started working with Naval Research Laboratory mathematicians on the “Free Haven Project” that resulted an onion search engine and a browser  We all know what happened next but don’t really know how and when October 11, 2017 ECE Discipline, KU 8
  • 9. Why Do Search Engines Fail to Find Deep Web Contents?
  • 10. Because Deep Web Contents are...  Contextual Web October 11, 2017 ECE Discipline, KU 10  Dynamic content  Limited access content:  Non-HTML/text content  Private Web  Scripted content  Web archives  Unlinked content  Software
  • 12. Why Darknet? To avoid the pry eyes on the surface web..... October 11, 2017 ECE Discipline, KU 12
  • 13. How to Access Darknet Demonstration  Download TOR  Done...  Set up TOR network (automatic)  Install TOR October 11, 2017 ECE Discipline, KU 13
  • 15. October 11, 2017 ECE Discipline, KU 15 A virtual cryptocurrency unit used for transactions in the darknet  Was invented in 2009  Inventor unknown  1 BTC = 4852.02 USD Fig. 4: Bitcoin illustration (imaginary)
  • 16. Should You Switch to TOR?
  • 17. Entirely depends on you, your needs and expectations  Never use the same E-mail address and password twice  Prefer a different PC and a public connection/ Wi-fi  Encrypt any form of personal information/ password in your PC  Get a paid VPN service  Never give true information/ credit card details to any website  Get a drill/ gas burner to destroy hard drives, modems & NIC cards October 11, 2017 ECE Discipline, KU 17
  • 18. Who is Controlling the Darknet?
  • 19. Nobody  Darknet markets are controlled by anonymous website admin(s)  An anonymous group control the TOR network and it’s database  No central server, so no centralized control  Each and Every website is maintained by it’s owner  Another group provides regular TOR updates so that the previous one can’s pry on you October 11, 2017 ECE Discipline, KU 18
  • 20. What Can You Find in Darknet Markets?
  • 21. Everything you can find in the surface Web + Everything you can’t (legally)  Websites are very organized and provide accurate product description  Products are actually cheaper than the local market  Customers’ reviews also ensure products’ purity  Sellers are very customer friendly as they depend on customers’ reviews  They have detailed T&Cs and they maintain them seriously  Provide special offers like – discounts, buy 1 get 1 free, free delivery, bonus  Even refunds money if you’re not satisfied with the product/ service October 11, 2017 ECE Discipline, KU 21
  • 24. Who and Why Are People Using Darknet?
  • 25. Whoever seeks privacy and knows about it  Pirates  Businessmen  Journalists  Hackers  Criminals  Politicians  Terrorists  The Army  Secret Services  Students  Researchers October 11, 2017 ECE Discipline, KU 25
  • 26. Risks of Using Darknet
  • 27.  Someone can blow your cover  You can raise unnecessary suspicions  Your system can get infected with viruses  You can lose a lot of money  You and only you are accountable for your actions  You can easily be a pray of watchers (could be the Government) October 11, 2017 ECE Discipline, KU 27
  • 28. Challenges and Future of Deep Web
  • 29.  Has faced a lot of challenges and solved them through various manners  Illegal market handlers and pirates will be arrested and charged  A website can be shut down anytime, if they track down the servers  Can end the dominance of information-hungry organizations  About 2 million people are using Darknet at this moment  Currently facing continuous threats from conservative governments  Will be mainstream within the next decade according to the web analysts  Recently a singer released his music album in the darknet October 11, 2017 ECE Discipline, KU 29
  • 31. Knowledge is power Know more about the internet and choose your actions wisely October 11, 2017 ECE Discipline, KU 31