SlideShare ist ein Scribd-Unternehmen logo
1 von 14
DARK NETDARK NET
1
Preparad by: Jangezkhan Arif khamu
Group ‘B’
3th
Stage
University of Duhok
College of science
Computer Department
PRESENTATION
Contents Of Deep webContents Of Deep web
2
• Introduction .
• How can open or go inside the tor ?
• History .
• what is inside the Dark Net ?
• Ones who visited Dark net , what is their purpose ?
• How work results perform ?
• What Should suffix of the websites inside dark net ?
• Bitcoin .
• Conclusion .
Dark net ... Is a place to kill and material of
Anesthetic, and hacking..... etc.
The Internet is not only Google, Facebook, Yahoo Instagram,
YouTube, Amazon, and others, so when writing this report a
number of sites reached more than one billion and one hundred and
forty-four million.
All sites only 4% deals with online business made of, now the
question here is, what about 96% of the site and the latest work in
where?
3
Introduction
4
In the world on a wide range of Internet you from that only 4%
of the work you see and fall dramatically, but somewhere else
there, although they say the Web drop out of this dark network
(deep web, web-dim), here this side of the second work and 96%
of the Internet.
Introduction
How can open or go inside the tor?How can open or go inside the tor?
• Of course, you can not go deep inside the Internet using
Google Chrome, Firefox, Opera, Safari, etc. but you need to
use the Tor project, this Tor project is not private, everyone
can use it.
5
Now let know what is (TOR) project?
•Tor is free software for enabling anonymous communication. The name is derived from an
acronym for the original software project name "The Onion Router". Tor directs Internet
traffic through a free, worldwide, volunteer overlay network consisting of more than seven
thousand relays to conceal a user's location and usage from anyone conducting network
surveillance or traffic analysis.
• The core principle of Tor, "onion routing", was developed
in the mid-1990s by the United States Naval Research
Laboratory employees, mathematician Paul Syverson,
and computer scientists Michael G. Reed and David
Goldschlag, with the purpose of protecting U.S.
intelligence communications online. Onion routing was
further developed by DARPA in 1997.
6
History
what is inside the Dark Net?what is inside the Dark Net?
1.Used for Hack.
2.sell all kind of weapon.
3.Business with human, especially the child.
4.buy video and erotic graphics.
5.Buy of document in secret .
6.buy and sell of program computer and mobile with
cheaper price.
7
Ones who visited Dark net , what is their purpose?Ones who visited Dark net , what is their purpose?
According to after statistical of official of tor project,
rate as such :
1.The rate of 15. 4% is private to buy any of the material of Anesthetic.
2.The rate of 9% buy and of program.
3.The rate of 5. 6% for hack peoples (you pay money and personal you are
applicant to hack hem).
4.The rate of 4. 24 % for host and domain.
5.The rate of 3. 70% for engine .
It stay is private deal with human and kill peoples and
erotic aggression.. Etc.
8
How work results perform?How work results perform?
9
All people inside Dark net,
unknown person,
It mean no one knows their
identity,
No murder request and no the
murderer know each other,
but first aspect request to kill or
buy material.
What Should suffix of the websites inside dark net?What Should suffix of the websites inside dark net?
• Of course that normal suffix or domain is org, info, net, edu,.
Etc,
• but on dark net all of them should be end with (onion).
• Most of the code of project net written by (python) language.
10
BitcoinBitcoin
What is bitcoin?
•Money is online and There is no Relationship with any country
and any bank, by Unknown named (Satoshi Nakamoto) and in
13`October 2008 outed.
11
The value of bitcoin is:
•Earlier each bitcoin value 150$,
•But now each bitcoin value more than 7000$.
How is this money get ?
•Become coin based on several equation of mathematics of institution, so that
money with hand blame on, it is necessary to get this money, you need to solve
the equation in a minimum period.
• The end talks my all side knows what
happening inside the internet, and
understand that internet not just
Facebook and chat, but there is world
else and we not know.
12
Conclusion
13
Question ?
Any
14
FORFOR
ATTENTIOATTENTIO

Weitere ähnliche Inhalte

Was ist angesagt?

The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
Darwin de Leon
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
James Bollen
 

Was ist angesagt? (20)

Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)
 
I2P and the Dark Web
I2P and the Dark WebI2P and the Dark Web
I2P and the Dark Web
 
Deep web
Deep webDeep web
Deep web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
 
The dark web
The dark webThe dark web
The dark web
 
Deep web
Deep webDeep web
Deep web
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
Darknet
DarknetDarknet
Darknet
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Deep web
Deep webDeep web
Deep web
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
The Darknet Emerges
The Darknet EmergesThe Darknet Emerges
The Darknet Emerges
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 

Ähnlich wie Dark Net

darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Geetha982072
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
Fabio Pietrosanti
 

Ähnlich wie Dark Net (20)

Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
An Analysis Of The Deep Web
An Analysis Of The Deep WebAn Analysis Of The Deep Web
An Analysis Of The Deep Web
 
Dark Web
Dark WebDark Web
Dark Web
 
Dark net
Dark netDark net
Dark net
 
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction &  Deanonymization of Tor Users By Hitesh BhatiaDarknets - Introduction &  Deanonymization of Tor Users By Hitesh Bhatia
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Demystifying Secure Channel
Demystifying Secure ChannelDemystifying Secure Channel
Demystifying Secure Channel
 
Dark web
Dark webDark web
Dark web
 
Deep Web and TOR Browser
Deep Web and TOR BrowserDeep Web and TOR Browser
Deep Web and TOR Browser
 
Darknet
DarknetDarknet
Darknet
 
2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication2006: Hack.lu Luxembourg 2006: Anonymous Communication
2006: Hack.lu Luxembourg 2006: Anonymous Communication
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01Infosecurity2013nl 131103184054-phpapp01
Infosecurity2013nl 131103184054-phpapp01
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Mehr von jangezkhan

Process concept
Process conceptProcess concept
Process concept
jangezkhan
 
Internet of Vehicles (IoV)
Internet of Vehicles (IoV)Internet of Vehicles (IoV)
Internet of Vehicles (IoV)
jangezkhan
 

Mehr von jangezkhan (8)

Google
GoogleGoogle
Google
 
Process concept
Process conceptProcess concept
Process concept
 
Internet of Vehicles (IoV)
Internet of Vehicles (IoV)Internet of Vehicles (IoV)
Internet of Vehicles (IoV)
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Using Serious Games to Train Evacuation Behavior
Using Serious Games to Train Evacuation BehaviorUsing Serious Games to Train Evacuation Behavior
Using Serious Games to Train Evacuation Behavior
 
HTTP
HTTPHTTP
HTTP
 
Kinect
KinectKinect
Kinect
 
Chemistry
ChemistryChemistry
Chemistry
 

Kürzlich hochgeladen

Top profile Call Girls In Sonipat [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Sonipat [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In Sonipat [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Sonipat [ 7014168258 ] Call Me For Genuine Models W...
nirzagarg
 
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
eeanqy
 
一比一定(购)卡尔顿大学毕业证(CU毕业证)成绩单学位证
一比一定(购)卡尔顿大学毕业证(CU毕业证)成绩单学位证一比一定(购)卡尔顿大学毕业证(CU毕业证)成绩单学位证
一比一定(购)卡尔顿大学毕业证(CU毕业证)成绩单学位证
wpkuukw
 
Q4-Trends-Networks-Module-3.pdfqquater days sheets123456789
Q4-Trends-Networks-Module-3.pdfqquater days sheets123456789Q4-Trends-Networks-Module-3.pdfqquater days sheets123456789
Q4-Trends-Networks-Module-3.pdfqquater days sheets123456789
CristineGraceAcuyan
 
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman MuscatAbortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion pills in Kuwait Cytotec pills in Kuwait
 
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
yhavx
 
Top profile Call Girls In Mysore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Mysore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Mysore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Mysore [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
Top profile Call Girls In Mau [ 7014168258 ] Call Me For Genuine Models We ar...
Top profile Call Girls In Mau [ 7014168258 ] Call Me For Genuine Models We ar...Top profile Call Girls In Mau [ 7014168258 ] Call Me For Genuine Models We ar...
Top profile Call Girls In Mau [ 7014168258 ] Call Me For Genuine Models We ar...
nirzagarg
 
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样
awasv46j
 
Top profile Call Girls In Meerut [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Meerut [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Meerut [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Meerut [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
怎样办理伦敦国王学院毕业证(KCL毕业证书)成绩单留信认证
怎样办理伦敦国王学院毕业证(KCL毕业证书)成绩单留信认证怎样办理伦敦国王学院毕业证(KCL毕业证书)成绩单留信认证
怎样办理伦敦国王学院毕业证(KCL毕业证书)成绩单留信认证
eeanqy
 
Abortion pills in Kuwait 🚚+966505195917 but home delivery available in Kuwait...
Abortion pills in Kuwait 🚚+966505195917 but home delivery available in Kuwait...Abortion pills in Kuwait 🚚+966505195917 but home delivery available in Kuwait...
Abortion pills in Kuwait 🚚+966505195917 but home delivery available in Kuwait...
drmarathore
 

Kürzlich hochgeladen (20)

Top profile Call Girls In Sonipat [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Sonipat [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In Sonipat [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Sonipat [ 7014168258 ] Call Me For Genuine Models W...
 
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
怎样办理伯明翰大学学院毕业证(Birmingham毕业证书)成绩单留信认证
 
一比一定(购)卡尔顿大学毕业证(CU毕业证)成绩单学位证
一比一定(购)卡尔顿大学毕业证(CU毕业证)成绩单学位证一比一定(购)卡尔顿大学毕业证(CU毕业证)成绩单学位证
一比一定(购)卡尔顿大学毕业证(CU毕业证)成绩单学位证
 
Hackathon evaluation template_latest_uploadpdf
Hackathon evaluation template_latest_uploadpdfHackathon evaluation template_latest_uploadpdf
Hackathon evaluation template_latest_uploadpdf
 
Q4-Trends-Networks-Module-3.pdfqquater days sheets123456789
Q4-Trends-Networks-Module-3.pdfqquater days sheets123456789Q4-Trends-Networks-Module-3.pdfqquater days sheets123456789
Q4-Trends-Networks-Module-3.pdfqquater days sheets123456789
 
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman MuscatAbortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
Abortion Pills in Oman (+918133066128) Cytotec clinic buy Oman Muscat
 
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
一比一原版(ANU毕业证书)澳大利亚国立大学毕业证原件一模一样
 
TRose UXPA Experience Design Concord .pptx
TRose UXPA Experience Design Concord .pptxTRose UXPA Experience Design Concord .pptx
TRose UXPA Experience Design Concord .pptx
 
Top profile Call Girls In Mysore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Mysore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Mysore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Mysore [ 7014168258 ] Call Me For Genuine Models We...
 
Call Girls Jalaun Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Jalaun Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Jalaun Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Jalaun Just Call 8617370543 Top Class Call Girl Service Available
 
Top profile Call Girls In Mau [ 7014168258 ] Call Me For Genuine Models We ar...
Top profile Call Girls In Mau [ 7014168258 ] Call Me For Genuine Models We ar...Top profile Call Girls In Mau [ 7014168258 ] Call Me For Genuine Models We ar...
Top profile Call Girls In Mau [ 7014168258 ] Call Me For Genuine Models We ar...
 
Pondicherry Escorts Service Girl ^ 9332606886, WhatsApp Anytime Pondicherry
Pondicherry Escorts Service Girl ^ 9332606886, WhatsApp Anytime PondicherryPondicherry Escorts Service Girl ^ 9332606886, WhatsApp Anytime Pondicherry
Pondicherry Escorts Service Girl ^ 9332606886, WhatsApp Anytime Pondicherry
 
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样
一比一原版(WLU毕业证)罗瑞尔大学毕业证成绩单留信学历认证原版一模一样
 
Top profile Call Girls In Meerut [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Meerut [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Meerut [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Meerut [ 7014168258 ] Call Me For Genuine Models We...
 
怎样办理伦敦国王学院毕业证(KCL毕业证书)成绩单留信认证
怎样办理伦敦国王学院毕业证(KCL毕业证书)成绩单留信认证怎样办理伦敦国王学院毕业证(KCL毕业证书)成绩单留信认证
怎样办理伦敦国王学院毕业证(KCL毕业证书)成绩单留信认证
 
Just Call Vip call girls Fatehpur Escorts ☎️8617370543 Two shot with one girl...
Just Call Vip call girls Fatehpur Escorts ☎️8617370543 Two shot with one girl...Just Call Vip call girls Fatehpur Escorts ☎️8617370543 Two shot with one girl...
Just Call Vip call girls Fatehpur Escorts ☎️8617370543 Two shot with one girl...
 
Mohanlalganj ! Call Girls in Lucknow - 450+ Call Girl Cash Payment 9548273370...
Mohanlalganj ! Call Girls in Lucknow - 450+ Call Girl Cash Payment 9548273370...Mohanlalganj ! Call Girls in Lucknow - 450+ Call Girl Cash Payment 9548273370...
Mohanlalganj ! Call Girls in Lucknow - 450+ Call Girl Cash Payment 9548273370...
 
Just Call Vip call girls Kasganj Escorts ☎️8617370543 Two shot with one girl ...
Just Call Vip call girls Kasganj Escorts ☎️8617370543 Two shot with one girl ...Just Call Vip call girls Kasganj Escorts ☎️8617370543 Two shot with one girl ...
Just Call Vip call girls Kasganj Escorts ☎️8617370543 Two shot with one girl ...
 
Eye-Catching Web Design Crafting User Interfaces .docx
Eye-Catching Web Design Crafting User Interfaces .docxEye-Catching Web Design Crafting User Interfaces .docx
Eye-Catching Web Design Crafting User Interfaces .docx
 
Abortion pills in Kuwait 🚚+966505195917 but home delivery available in Kuwait...
Abortion pills in Kuwait 🚚+966505195917 but home delivery available in Kuwait...Abortion pills in Kuwait 🚚+966505195917 but home delivery available in Kuwait...
Abortion pills in Kuwait 🚚+966505195917 but home delivery available in Kuwait...
 

Dark Net

  • 1. DARK NETDARK NET 1 Preparad by: Jangezkhan Arif khamu Group ‘B’ 3th Stage University of Duhok College of science Computer Department PRESENTATION
  • 2. Contents Of Deep webContents Of Deep web 2 • Introduction . • How can open or go inside the tor ? • History . • what is inside the Dark Net ? • Ones who visited Dark net , what is their purpose ? • How work results perform ? • What Should suffix of the websites inside dark net ? • Bitcoin . • Conclusion .
  • 3. Dark net ... Is a place to kill and material of Anesthetic, and hacking..... etc. The Internet is not only Google, Facebook, Yahoo Instagram, YouTube, Amazon, and others, so when writing this report a number of sites reached more than one billion and one hundred and forty-four million. All sites only 4% deals with online business made of, now the question here is, what about 96% of the site and the latest work in where? 3 Introduction
  • 4. 4 In the world on a wide range of Internet you from that only 4% of the work you see and fall dramatically, but somewhere else there, although they say the Web drop out of this dark network (deep web, web-dim), here this side of the second work and 96% of the Internet. Introduction
  • 5. How can open or go inside the tor?How can open or go inside the tor? • Of course, you can not go deep inside the Internet using Google Chrome, Firefox, Opera, Safari, etc. but you need to use the Tor project, this Tor project is not private, everyone can use it. 5 Now let know what is (TOR) project? •Tor is free software for enabling anonymous communication. The name is derived from an acronym for the original software project name "The Onion Router". Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis.
  • 6. • The core principle of Tor, "onion routing", was developed in the mid-1990s by the United States Naval Research Laboratory employees, mathematician Paul Syverson, and computer scientists Michael G. Reed and David Goldschlag, with the purpose of protecting U.S. intelligence communications online. Onion routing was further developed by DARPA in 1997. 6 History
  • 7. what is inside the Dark Net?what is inside the Dark Net? 1.Used for Hack. 2.sell all kind of weapon. 3.Business with human, especially the child. 4.buy video and erotic graphics. 5.Buy of document in secret . 6.buy and sell of program computer and mobile with cheaper price. 7
  • 8. Ones who visited Dark net , what is their purpose?Ones who visited Dark net , what is their purpose? According to after statistical of official of tor project, rate as such : 1.The rate of 15. 4% is private to buy any of the material of Anesthetic. 2.The rate of 9% buy and of program. 3.The rate of 5. 6% for hack peoples (you pay money and personal you are applicant to hack hem). 4.The rate of 4. 24 % for host and domain. 5.The rate of 3. 70% for engine . It stay is private deal with human and kill peoples and erotic aggression.. Etc. 8
  • 9. How work results perform?How work results perform? 9 All people inside Dark net, unknown person, It mean no one knows their identity, No murder request and no the murderer know each other, but first aspect request to kill or buy material.
  • 10. What Should suffix of the websites inside dark net?What Should suffix of the websites inside dark net? • Of course that normal suffix or domain is org, info, net, edu,. Etc, • but on dark net all of them should be end with (onion). • Most of the code of project net written by (python) language. 10
  • 11. BitcoinBitcoin What is bitcoin? •Money is online and There is no Relationship with any country and any bank, by Unknown named (Satoshi Nakamoto) and in 13`October 2008 outed. 11 The value of bitcoin is: •Earlier each bitcoin value 150$, •But now each bitcoin value more than 7000$. How is this money get ? •Become coin based on several equation of mathematics of institution, so that money with hand blame on, it is necessary to get this money, you need to solve the equation in a minimum period.
  • 12. • The end talks my all side knows what happening inside the internet, and understand that internet not just Facebook and chat, but there is world else and we not know. 12 Conclusion

Hinweis der Redaktion

  1. Percent