Privacy on the Web: Understanding the Deep and Dark Web

undefined
 
Privacy, the Internet
and the Dark Web
 
COMP3220/6218
Web Infrastructure/Architecture
 
Heather S. Packer hp3@ecs.soton.ac.uk
7/12/18
 
Should we care about privacy on the
Internet?
 
Should we care about privacy on the
Internet?
 
-
Sharing your personal data
-
Sharing fitbit data
-
Sharing your home plan (Roomba)
 
Internet vs World Wide Web
 
4
 
The Internet is a global system
Collection of interconnected computer networks
Using Internet protocols to link devices
Provides the backbone for services
World Wide Web
Email
File sharing
Darknets
Social Networking (messaging)
 
Internet vs World Wide Web
 
5
 
The Internet is a global system
Collection of interconnected computer networks
Using Internet protocols to link devices
Provides the backbone for services
World Wide Web (Surface and Deep Web)
Email
File sharing
Darknets (Dark Web)
Social Networking (messaging)
 
What is the Deep Web?
 
6
 
WWW content which is not indexed by standard search
engines
Content of the deep web is hidden behind HTML forms
 
The Deep Web
 
7
 
Early estimates suggest it is 400-550
times larger than the surface web.
2001 - speculated it was 7.5
petabytes.
2004 - around 300,000 websites
2006 - 14,000 deep websites in the
Russian WWW
Estimated that 99% of web content
is hidden
 
 
 
What is the Dark Web?
 
8
 
WWW content existing on darknets, overlay networks which
use the Internet
They require specific software, configurations and
authorisation to access
 
Tor
 
9
 
The onion router
TOR browser
TOR network
Browse the web anonymously
Developed 1990s by US Naval
Research Lab
Protect US intelligence online
 
 
Web Browsers
 
10
 
TOR Network
 
11
 
TOR Network
 
12
 
TOR Network
 
13
 
TOR Network
 
14
 
TOR Hidden Services
 
15
 
Can be used to create private websites and other apps
Can only be found using the TOR browser
Content remains within the TOR network 
 does not use exit
nodes
 
TOR Hidden Services
 
Who would want to use TOR?
 
Should we all go dark*?
*(everyone using TOR and/or private networks)
 
Current Laws
 
19
 
Current laws are vaguely applicable to the dark web
Hacking is regulated by the Computer Misuse Act (UK) and Computer
Fraud and Abuse Act (US), etc
Bans trespassing, unauthorised accessing and damaging computers
The DarkWeb enables hackers (Purchase malware, Collection of
ransom from ransomware attacks)
Bars trafficking, unauthorised computer access and computer
espionage
 
Silk Road Charges
 
Money Laundering
Computer hacking
Conspiracy to traffic narcotics
Attempting to kill people
Running a criminal enterprise
Orchestrating a conspiracy to sell fake IDs
Conspiracy to sell hacking tools
 
What role should the government play in the
Dark Web?
 
What role should the government play in the
Dark Web?
 
-
Should anonymity on the web be banned?
-
How should we handle coordinating regulations internationally?
-
Some content all agree is illegal, some is not
 
What are the appropriate tactics for
government intervention on the Dark Web?
 
What are the appropriate tactics for
government intervention on the Dark Web?
 
-
What can we do to deter people from starting
nefarious hidden services
-
Should we make users accountable for their actions?
 
If the tracked services is one privacy extreme
and Dark Web is another, is there a middle
ground?
Slide Note
Embed
Share

Delve into the intricate world of internet privacy, from the surface web to the hidden realms of the deep and dark web. Discover the importance of safeguarding personal data online, the significance of the Deep Web's unindexed content, and the intricacies of the Dark Web accessible via specific software and authorization protocols.

  • Privacy
  • Internet
  • Deep Web
  • Dark Web
  • Online Security

Uploaded on Oct 09, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Privacy, the Internet and the Dark Web COMP3220/6218 Web Infrastructure/Architecture Heather S. Packer hp3@ecs.soton.ac.uk 7/12/18

  2. Should we care about privacy on the Internet?

  3. Should we care about privacy on the Internet? - Sharing your personal data - Sharing fitbit data - Sharing your home plan (Roomba)

  4. Internet vs World Wide Web The Internet is a global system Collection of interconnected computer networks Using Internet protocols to link devices Provides the backbone for services World Wide Web Email File sharing Darknets Social Networking (messaging) 4

  5. Internet vs World Wide Web The Internet is a global system Collection of interconnected computer networks Using Internet protocols to link devices Provides the backbone for services World Wide Web (Surface and Deep Web) Email File sharing Darknets (Dark Web) Social Networking (messaging) 5

  6. What is the Deep Web? WWW content which is not indexed by standard search engines Content of the deep web is hidden behind HTML forms 6

  7. The Deep Web Early estimates suggest it is 400-550 times larger than the surface web. 2001 - speculated it was 7.5 petabytes. 2004 - around 300,000 websites 2006 - 14,000 deep websites in the Russian WWW Estimated that 99% of web content is hidden 7

  8. What is the Dark Web? WWW content existing on darknets, overlay networks which use the Internet They require specific software, configurations and authorisation to access 8

  9. Tor The onion router TOR browser TOR network Browse the web anonymously Developed 1990s by US Naval Research Lab Protect US intelligence online 9

  10. Web Browsers 10

  11. TOR Network 11

  12. TOR Network 12

  13. TOR Network 13

  14. TOR Network 14

  15. TOR Hidden Services Can be used to create private websites and other apps Can only be found using the TOR browser Content remains within the TOR network does not use exit nodes 15

  16. TOR Hidden Services

  17. Who would want to use TOR?

  18. Should we all go dark*? *(everyone using TOR and/or private networks)

  19. Current Laws Current laws are vaguely applicable to the dark web Hacking is regulated by the Computer Misuse Act (UK) and Computer Fraud and Abuse Act (US), etc Bans trespassing, unauthorised accessing and damaging computers The DarkWeb enables hackers (Purchase malware, Collection of ransom from ransomware attacks) Bars trafficking, unauthorised computer access and computer espionage 19

  20. Silk Road Charges Money Laundering Computer hacking Conspiracy to traffic narcotics Attempting to kill people Running a criminal enterprise Orchestrating a conspiracy to sell fake IDs Conspiracy to sell hacking tools

  21. What role should the government play in the Dark Web?

  22. What role should the government play in the Dark Web? - Should anonymity on the web be banned? - How should we handle coordinating regulations internationally? - Some content all agree is illegal, some is not

  23. What are the appropriate tactics for government intervention on the Dark Web?

  24. What are the appropriate tactics for government intervention on the Dark Web? - What can we do to deter people from starting nefarious hidden services - Should we make users accountable for their actions?

  25. If the tracked services is one privacy extreme and Dark Web is another, is there a middle ground?

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#