Deep web

17
DEEP WEB THE HIDDEN INTERNET

description

This presentstion introduces you to the deep web, Darknet and the anonymizing network of TOR and I2P.

Transcript of Deep web

Page 1: Deep web

DEEP WEBTHE HIDDEN INTERNET

Page 2: Deep web

CLEARNET

That Internet, used by billions around the world every day, is sometimes known as the Surface

Web, or the Clearnet, as coined by Tor and other anonymous online users. The so-called surface

Web, which all of us use routinely, consists of data that search engines can find and then offer

up in response to your queries. But in the same way that only the tip of an iceberg is visible to

observers, a traditional search engine sees only a small amount of the information that's

available -- a measly 0.03 percent

Page 3: Deep web

WHAT IS DEEP WEB ?

In simple words Everything else Clearnet is Deep Web.

The deep Web (also known as the undernet, invisible Web and hidden Web, among

other monikers) consists of data that you won't locate with a simple Google search.

It’s made up of tens of billions of sites that are hidden within a universe of code --

various estimates have put the Deep Web at anywhere from five to 500,000 times the

size of the Surface Web.

Page 4: Deep web

DARKNET

Darknets are small niches of the “Deep Web,” which is itself a catch-all term for the assorted

Net-connected stuff that isn’t discoverable by the major search engines. (BrightPlanet has a

stellar Deep Web primer.) They cloak themselves in obscurity with specialized software that

guarantees encryption and anonymity between users, as well as protocols or domains that the

average webizen will never stumble across.

Page 5: Deep web

WHY DARKNET IS IMPORTANT ?

Many countries lack the equivalent of the United States’ First Amendment. Darknets grant

everyone the power to speak freely without fear of censorship or persecution. According to the

Tor Project, anonymizing Hidden Services have been a refuge for dissidents in Lebanon,

Mauritania, and Arab Spring nations; hosted blogs in countries where the exchange of ideas is

frowned upon; and served as mirrors for websites that attract governmental or corporate angst,

such as GlobalLeaks, Indymedia, and Wikileaks.

Page 6: Deep web

ANONYMOUS NETWORKS

TOR

Tor makes it possible for users to hide their locations while offering various kinds of services,

such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor

users can connect to these hidden services, each without knowing the other's network identity.

Page 7: Deep web

STEP 1A hidden service needs to advertise its existence in the Tor network before clients will be able to contact it

Page 8: Deep web

STEP 2the hidden service assembles a hidden service descriptor, containing its public key and a summary of each introduction point, and signs this descriptor with its private key.

Page 9: Deep web

STEP 3A client that wants to contact a hidden service needs to learn about its onion address first. After that, the client can initiate connection establishment by downloading the descriptor from the distributed hash table

Page 10: Deep web

STEP 4When the descriptor is present and the rendezvous point is ready, the client sends this message to one of the introduction points, requesting it be delivered to the hidden service

Page 11: Deep web

STEP 5The hidden service decrypts the client's introduce message and finds the address of the rendezvous point and the one-time secret in it. The service creates a circuit to the rendezvous point and sends the one-time secret to it in a rendezvous message

Page 12: Deep web

FINDING A DOOR TO TOR SERVICE

Some common sites to walk in the tor network.

1. HiddenWiki

2. TorDir

3. deepweblinks.org

4. http://2vlqpcqpjlhmd5r2.onion/ – Gateway to Freenet

5. http://wiki5kauuihowqi5.onion/ – Onion Wiki

Page 13: Deep web

STEP 6In the last step, the rendezvous point notifies the client about successful connection establishment. After that, both client and hidden service can use their circuits to the rendezvous point for communicating with each other

Page 14: Deep web

I2P ANONYMIZING NETWORK

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can

use to securely communicate. All data is wrapped with several layers of encryption, and the

network is both distributed and dynamic, with no trusted parties. Unlike many other

anonymizing networks, I2P doesn't try to provide anonymity by hiding the originator of some

communication and not the recipient, or the other way around. I2P is designed to allow peers

using I2P to communicate with each other anonymously — both sender and recipient are

unidentifiable to each other as well as to third parties

Page 15: Deep web

GARLIC ROUTING STRUCTURE

Page 16: Deep web

PRACTICAL SESSION ON TOR AND ONION HOSTING

Page 17: Deep web

THANK YOU