Dark Web

Dark Web

Part of a series on The Internet. [View Related Entries]
[View Related Sub-entries]

Updated Jan 18, 2023 at 05:28PM EST by Don.

Added Jan 03, 2013 at 03:29PM EST by ­­­Alex Mercer.

PROTIP: Press 'i' to view the image gallery, 'v' to view the video gallery, or 'r' to view a random entry.


www.brandpowder.com © THE CLOUD SERVERS AMAZON Google WIKIPEDIA PORNC HACKERS CONTINENTAL 5 WIKILEAKS CONTENTS UNDETECTED ILLEGAL P---

About

Dark Web, also known as the Deep Web or Deepnet, the "Invisible Web," the "Undernet" or the "hidden Web," are parts of the Internet that are not considered part of the "surface web," or the portion of the World Wide Web that is indexed by conventional search engines. Many deep web sites are not indexed because they use dynamic databases that are devoid of hyperlinks and can only be found by performing an internal search query. Additionally, they can typically only be accessed using specialized software, such as the Tor Browser.

Origin

According to The New York Times,[1] computer scientist Mike Bergman is credited with coining the term "deep web" in a paper titled "The Deep Web: Surfacing Hidden Value" published in The Journal of Electronic Publishing[2] in August of 2001. In the paper, Bergman mentions that Internet business author Dr. Jill Ellsworth coined the phrase "invisible Web" in 1994 when referring to websites that were not indexed by common search engines. The paper also estimated that at the time of publication, information on the deep Web was “400 to 550 times larger than the commonly defined World Wide Web,” or approximately 7,500 terabytes of data.

Spread

On May 29th, 2001, librarian Robert Lackie launched the website Those Dark Hiding Places[7] as a directory for sites that assist in navigating the deep Web. On January 16th, 2002, the website for Deep Web Technologies was launched, which provides the proprietary “Explorit” client for deep web searching. On March 25th, 2003, the tech news blog Campus Technology[8] published an article with links to resources for finding information on the deep Web. On March 9th, 2004, Salon[9] published an article which argued that deep Web search engines have the potential to “give the electorate a powerful lens into the public record.” On June 16th, 2005, Wired[10] reported that Yahoo’s “Search Subscription” service would allow users to search some subscription sites in the deep Web. On December 18th, 2006, the Online Education Database[11]published an “Ultimate Guide to the Invisible Web,” providing background information and tips for navigating deep Web content. On September 25th, 2008, the DeepPeep[4] search engine was started as a project at the University of Utah, which aimed to crawl and index every database on the Internet, including the deep Web. As of January, 2012, the search engine is not available. On February 22nd, 2009, The New York Times[1] published an article about the challenges facing the Google search engine in crawling deep Web content.

Operation Darknet

In October 2011, a group of Anonymous hacktivists launched Operation Darknet (also known as #OpDarknet), which launched a series of distributed denial-of-service (DDoS) attacks against Lolita City, a deep Web child pornography website that is only accessible via the TOR anonymous web browser.


OPERATION DARKNET

Freedom Hosting Network

On August 1st, 2013, the Federal Bureau of Investigations (FBI) arrested Eric Eoin Marques, a 28-year-old Irishman who owns and operates Freedom Hosting on Tor network, on charges of distributing and promoting child abuse material online. On the following day, approximately half of Freedom Hosting's hidden services reportedly suffered from malware attacks and taken offline, many of which were suspected to host illegal activities, including the criminal hacking site HackBB, money laundering services and a vast portion of online child pornography.

[researching]

TOR

The Onion Router (TOR) is an anonymous browsing client, which allows its users to browse the Internet anonymously by separating identification and routing, thus concealing network activity from surveillance. Some websites on the deep Web can only be accessed via the TOR client.


How Tor Works: 1 Tor node ·.. unencrypted link → encrypted link Alice Step 1: Alice's Tor client obtains a list of Tor nodes from a directory server. Jane Dave Bob

Silk Road

The Silk Road is an online black market which can only be accessed via the TOR browsing client. Many sellers on the site specialize in trading illegal drugs for Bitcoins, a peer-to-peer digital currency.


Silk Road anonymous marketplace Shop by category: Cannabis (162) Ecstasy(33) Psychedelics( 119) Opioids (33) Stimulants(56) Dissociatives(6) Other(199) | 忝负 1 hit of LSD (blotter) 1/8 oz high quality cannabis B3.17 1.13

Hidden Wiki

The Hidden Wiki[14] is a wiki database that can only be accessed via the TOR browsing client and contains articles and links to other deep Web sites, the Silk Road, assassin markets and child pornography sites.



Bitcoins

A type of currency often used in deep Web black markets is the Bitcoin, a peer-to-peer digital currency that regulates itself according to network software, with no more than 21 million Bitcoins issued in total by 2140. Bitcoins can be purchased and current exchange rates can be viewed on the MT Gox[15] Bitcoin exchange.


Hash Each new hash value contains value*information about all previous How a Bitcoin transaction works The mining computers calculate new hash values based on a combination of the previous hash value, the new transaction block, and a nonce Bitcoin transactions. Nonce Bob, an online merchant, decides to begin accepting bitcoins as payment. Alice, a buyer, has bitcoins and wants to purchase merchandise from Bob value Nonce Bob and Alice both have Bitcoin "wallets" Wallets are files that provide access to multiple Bit WALLETS AND ADDRESSES hash value Nonce Cryptographic Hashes Cryptographic hash functions transform a collection of data into an alphanumeric string with a fixed length called a hash value. Even tiny changes in the original data drastically change the resulting hash value. And it's essentially impossible to predict which initial data set will create a specific hash value. An address String of all evil ??7 letters and numbers, Bob creates a new Bitcoin address for Alice to send her payment to. Each address: has its own balance of bitcoins. 1HULMwZEP kjEPeCh 43BeKJLlyb LCWrfDpN. Creating hashes is computationally trivial, but the Bitcoin system requires that the new hash value have a particular form-specifically, it must start with a certain number of zeros. ADDRESS The root 6d0a 1899 086a... (56 more characters) The miners have no way to predict which nonce will produce a hash of all euil 486c 6be4 6dde... It's tempting to think of addresses as bank accounts, but they work a bit differently. Bitcoin users can create as many addresses as they wish and in fact are encouraged to create a new one for every new transaction to increase privacy So long as no one knows which addresses are Alice's, her anonymity is protected. b8db 7ee9 8392. Private key Public SUBMITTING A PAYMENT Nonces To create different hash values from the same data, Bitcoin uses "nonces." A nonce is just a random number that Public Key Cryptography 101 or to hashing. Changing the nonce resu tographic key pair," composed o equi ing Gary, Garth to ey, and the spondin e to ey y that a message signed wit ress ated in Gary's wallet wit VERIFYING computers are se urchase TRANSACTION of th TRANSACTION ke As time goes on, Alic more recent tra would have to redo the work that Gary did-because any changes ce's wallet holds the private key for each Anyone on the network can now use a comp differ transaction request with the pri request is actually coming from the legitimate account owner ey ubsequent miners. Such a feat is nearly impos s from.

Search Interest

External References

Recent Videos 4 total

Recent Images 18 total


Top Comments


+ Add a Comment

Comments (100)


Display Comments

Add a Comment


Yo Yo! You must login or signup first!