SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Introduction
Table of contents
01
02
03
04
05
06
07
08
Introduction
Parts of the internet
Dark web anonymity
systems
Dark Web / Darknet
Timeline of the Deep Web
Risks of going on the dark
web
Precaution of visiting
the dark web
Illegality of dark web
What are the different parts
of the internet?
02
03
DARK WEB ANONYMITY
SYSTEMS
TOR
TOR browser logo
SOFTWARE USED TO PROTECT USERS BY
MAKING COMMUNICATIONS HARD TO
TRACE.
BOUNCES COMMUNICATIONS TO DIFFERENT
NODES LOCATED ALL AROUND THE WORLD
USES ENCRYPTION IN THE APPLICATION
LAYER.
HIDES LOCATION THROUGH MANY
NETWORK RELAYS.
HIDDEN WEBSITES USE THE ".ONION" SUFFIX
FREENET
FREENET
browser logo
MIX BETWEEN PEER TO PEER AND
CLIENTSEVER
DE-CENTRALIZED SERVERS & DATA
USES PEERS TO HOST NODES WHICH
STORE OTHER USER'S ENCRYPTED DATA
NO WAY TO TELL IF DATA IS LEGAL OR
ILLEGAL
DE-CENTRALIZED DATA MAKES IT HARDER
TO HACK INTO
Silk Road RELODED
I2P browser logo
The original "Silk Road" website was located on Tor
Servers. Some think Tor has been compromised
A new website "Silk Road Reloaded“ appeared on a
different dark web network called I2P
I2P uses a peer-to-peer approach where "Essentially all
peers participate in routing for others“
Supports various online currencies other than Bitcoin
such as Anoncoin, Darkcoin, Dogecoin and can convert
currencies for users for a small fee
04
Dark Web / Darknet
The homepage of
Agora, a popular
dark market.
*http://www.coindesk.com/dark-markets-grow-bigger-bolder-year-since-silk-road-bust/
More Dark Web Market
Listing Examples:
*http://www.businessinsider.com/dark-web-whats-for-sale-2015-4
05
Timeline of the Deep Web
Timeline of the Deep Web
Silk Road Market launches
“Satoshi Nakamoto” started
Bitcoin digital currency
The I2P peer-to-peer network
developed
Tor Network developed by US Naval
Research Laboratory
2002
2003
2009
2011
06
Is the Dark Web Dangerous?
07
SECURITY PRECAUTIONS WHEN
VISITING THE DARK WEB
SECURITY PRECAUTIONS WHEN VISITING THE
DARK WEB
• DON'T TRUST ANYONE
• COVER YOUR WEBCAM WITH TAPE
• DON'T DOWNLOAD ANYTHING
• CHECK THAT YOUR VIRTUAL PRIVATE
NETWORK
(VPN) IS WORKING
• USE PROXIES
• ANONYMOUS OPERATING SYSTEMS
• TAILS
• WHONIX
• JONDO
• INTERNET CAFE
08
Is the Dark Web Illegal?
Q & A
QUESTION 1
WHAT IS THE DIFFERENCE BETWEEN THE DEEP WEB AND THE DARK WEB?
ANSWER:
THE DARK WEB IS A SUBCOMPONENT OF THE DEEP WEB AND CAN ONLY
BE ACCESSED BY A SPECIAL BROWSER OR UTILITY
QUESTION 2
ANSWER:
WHAT SAFETY PRECAUTIONS SHOULD YOU TAKE IF YOU WERE TO VISIT THE
DARK WEB?
DON'T TRUST ANYONE, COVER YOUR WEBCAM, DON'T DOWNLOAD ANYTHING,
CHECK THAT YOUR VPN IS WORKING
QUESTION 3
ANSWER:
THROUGH WHAT METHODS DOES THE TOR BROWSER ATTEMPT TO ENSURE
ANONYMITY OF ITS USERS IDENTITY AND INTERNET USAGE?
THE TOR BROWSER ENCRYPTS COMMUNICATION DATA AND THEN SENDS THE
INFORMATION THROUGH MULTIPLE RANDOM TOR RELAYS (NODES) SCATTERED
ACROSS THE GLOBE BEFORE REACHING ITS DESTINATION
Conclusion
REFERENCES
• https://www.sans.org/reading-room/whitepapers/covert/ocean-internet-
deep-web-37012
• https://media.scmagazine.com/documents/224/deeplight_(1)_55856.pdf
• https://www.trendmicro.com/cloud-content/us/pdfs/security-
intelligence/whitepapers/wp_below_the_surface.pdf
• http://www.batblue.com/the-darknet/
• http://celarc.ca/cppc/247/247804.pdf
• http://www.cs.princeton.edu/courses/archive/spr09/cos423/Lectures/mtf.pdf
• https://www.quora.com/Why-cant-the-police-stop-the-deep-web
• https://www.deepdotweb.com/2014/12/22/ethics-deep-web/
• http://fieldguide.gizmodo.com/how-to-search-the-deep-web-safely-
1770828854
• http://www.guidingtech.com/50281/dos-donts-deep-web-surfing
1
Thank you

Weitere ähnliche Inhalte

Ähnlich wie Darkle Slideshow _ by Slidesgo.pptx

darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark webJisc
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterMohammed Bharmal
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep WebIRJET Journal
 
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxhelzerpatrina
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!TalhaMTZ
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebNicholas Davis
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchavinod kumar
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfAuto Parts Wholesale Online
 
seminar PowerPoint Presentation.pptx
seminar  PowerPoint Presentation.pptxseminar  PowerPoint Presentation.pptx
seminar PowerPoint Presentation.pptxSriHarshaThirumala
 
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceDEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceFelipe Prado
 

Ähnlich wie Darkle Slideshow _ by Slidesgo.pptx (20)

darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Illuminating the dark web
Illuminating the dark webIlluminating the dark web
Illuminating the dark web
 
Darknet
DarknetDarknet
Darknet
 
Tor Browser
Tor BrowserTor Browser
Tor Browser
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Dark Web.pdf
Dark Web.pdfDark Web.pdf
Dark Web.pdf
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
 
Introduction to Tor
Introduction to TorIntroduction to Tor
Introduction to Tor
 
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
Dark web
Dark webDark web
Dark web
 
How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!How using Tor Browser + VPN can save you $1000 and more!
How using Tor Browser + VPN can save you $1000 and more!
 
Spooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep WebSpooky Halloween IT Security Lecture -- The Deep Web
Spooky Halloween IT Security Lecture -- The Deep Web
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Dark web (1)
Dark web (1)Dark web (1)
Dark web (1)
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
 
seminar PowerPoint Presentation.pptx
seminar  PowerPoint Presentation.pptxseminar  PowerPoint Presentation.pptx
seminar PowerPoint Presentation.pptx
 
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms raceDEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
DEF CON 27 - ROGER DINGLEDINE -tor censorship arms race
 

Kürzlich hochgeladen

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Kürzlich hochgeladen (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Darkle Slideshow _ by Slidesgo.pptx

  • 1.
  • 3.
  • 4. Table of contents 01 02 03 04 05 06 07 08 Introduction Parts of the internet Dark web anonymity systems Dark Web / Darknet Timeline of the Deep Web Risks of going on the dark web Precaution of visiting the dark web Illegality of dark web
  • 5. What are the different parts of the internet? 02
  • 6.
  • 8. TOR TOR browser logo SOFTWARE USED TO PROTECT USERS BY MAKING COMMUNICATIONS HARD TO TRACE. BOUNCES COMMUNICATIONS TO DIFFERENT NODES LOCATED ALL AROUND THE WORLD USES ENCRYPTION IN THE APPLICATION LAYER. HIDES LOCATION THROUGH MANY NETWORK RELAYS. HIDDEN WEBSITES USE THE ".ONION" SUFFIX
  • 9. FREENET FREENET browser logo MIX BETWEEN PEER TO PEER AND CLIENTSEVER DE-CENTRALIZED SERVERS & DATA USES PEERS TO HOST NODES WHICH STORE OTHER USER'S ENCRYPTED DATA NO WAY TO TELL IF DATA IS LEGAL OR ILLEGAL DE-CENTRALIZED DATA MAKES IT HARDER TO HACK INTO
  • 10. Silk Road RELODED I2P browser logo The original "Silk Road" website was located on Tor Servers. Some think Tor has been compromised A new website "Silk Road Reloaded“ appeared on a different dark web network called I2P I2P uses a peer-to-peer approach where "Essentially all peers participate in routing for others“ Supports various online currencies other than Bitcoin such as Anoncoin, Darkcoin, Dogecoin and can convert currencies for users for a small fee
  • 11. 04 Dark Web / Darknet
  • 12. The homepage of Agora, a popular dark market. *http://www.coindesk.com/dark-markets-grow-bigger-bolder-year-since-silk-road-bust/
  • 13. More Dark Web Market Listing Examples: *http://www.businessinsider.com/dark-web-whats-for-sale-2015-4
  • 14. 05 Timeline of the Deep Web
  • 15. Timeline of the Deep Web Silk Road Market launches “Satoshi Nakamoto” started Bitcoin digital currency The I2P peer-to-peer network developed Tor Network developed by US Naval Research Laboratory 2002 2003 2009 2011
  • 16. 06 Is the Dark Web Dangerous?
  • 18. SECURITY PRECAUTIONS WHEN VISITING THE DARK WEB • DON'T TRUST ANYONE • COVER YOUR WEBCAM WITH TAPE • DON'T DOWNLOAD ANYTHING • CHECK THAT YOUR VIRTUAL PRIVATE NETWORK (VPN) IS WORKING • USE PROXIES • ANONYMOUS OPERATING SYSTEMS • TAILS • WHONIX • JONDO • INTERNET CAFE
  • 19. 08 Is the Dark Web Illegal?
  • 20. Q & A
  • 21. QUESTION 1 WHAT IS THE DIFFERENCE BETWEEN THE DEEP WEB AND THE DARK WEB? ANSWER: THE DARK WEB IS A SUBCOMPONENT OF THE DEEP WEB AND CAN ONLY BE ACCESSED BY A SPECIAL BROWSER OR UTILITY
  • 22. QUESTION 2 ANSWER: WHAT SAFETY PRECAUTIONS SHOULD YOU TAKE IF YOU WERE TO VISIT THE DARK WEB? DON'T TRUST ANYONE, COVER YOUR WEBCAM, DON'T DOWNLOAD ANYTHING, CHECK THAT YOUR VPN IS WORKING
  • 23. QUESTION 3 ANSWER: THROUGH WHAT METHODS DOES THE TOR BROWSER ATTEMPT TO ENSURE ANONYMITY OF ITS USERS IDENTITY AND INTERNET USAGE? THE TOR BROWSER ENCRYPTS COMMUNICATION DATA AND THEN SENDS THE INFORMATION THROUGH MULTIPLE RANDOM TOR RELAYS (NODES) SCATTERED ACROSS THE GLOBE BEFORE REACHING ITS DESTINATION
  • 25. REFERENCES • https://www.sans.org/reading-room/whitepapers/covert/ocean-internet- deep-web-37012 • https://media.scmagazine.com/documents/224/deeplight_(1)_55856.pdf • https://www.trendmicro.com/cloud-content/us/pdfs/security- intelligence/whitepapers/wp_below_the_surface.pdf • http://www.batblue.com/the-darknet/ • http://celarc.ca/cppc/247/247804.pdf • http://www.cs.princeton.edu/courses/archive/spr09/cos423/Lectures/mtf.pdf • https://www.quora.com/Why-cant-the-police-stop-the-deep-web • https://www.deepdotweb.com/2014/12/22/ethics-deep-web/ • http://fieldguide.gizmodo.com/how-to-search-the-deep-web-safely- 1770828854 • http://www.guidingtech.com/50281/dos-donts-deep-web-surfing 1