Explore chapters and articles related to this topic
An Overview of the Dark Web
Published in Mohiuddin Ahmed, Abu S. S. M. Barkat Ullah, Al-Sakib Khan Pathan, Security Analytics for the Internet of Everything, 2020
Shahrin Sadik, Mohiuddin Ahmed
There is no proper estimation of how much of the deep web is used specifically for illegal or legitimate arena of the dark web. The Onion Router [3] most commonly known as Tor and the Invisible Internet Project abbreviated as I2P along with many other anonymous and decentralized nodes of the network are used to access the dark web. This was originally created and released by the USA Naval Research Laboratory for being able to communicate online keeping the user’s identity hidden. Tor generally refers to both the network which operates all the Tor connections and the software which is installed to use and run Tor in the system. The users of Tor basically do not create a direct connection and rather pass through a series of tunnels which are virtually integrated in it. This allows sharing information in the website without compromising the privacy of any user. There is a three-way pass for the Tor users, and the last one is referred as “the exit relay.” The web traffic is routed through the other users’ system by the authentic user to avoid the identification and tracking of the real user. Tor particularly creates three imaginary layers just as the natural onion has, and it routes the movement in those layers in order to hide the original identity of the users by hiding the IP address.
The Three Generations of DDoS
Published in Rocky Dr. Termanini, The Nano Age of Digital Immunity Infrastructure Fundamentals and Applications, 2018
Deep Web: The Deep Web is the black hole of the Internet. It is estimated that 90% of all Internet data and websites are hidden from search engine indexing; this area of the Internet is known as the Deep Web. There is much confusion between the two, with some outlets and researchers freely interchanging between them. However, the dark web is not the Deep Web; it is only part of the Deep Web. The dark web relies on darknets, that is, networks where connections are made between trusted peers. Examples of dark web systems include The Onion Router (Tor) and the Invisible Internet Project (I2P). There is another smaller subset of the Deep Web that consists of darknet markets and sites about drugs, pornography, weapons, assassins, counterfeiting, forgeries, hacking, and the like. This section is called the dark web.
Towards Preserving Privacy and Security in Blockchain
Published in Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino, Essentials of Blockchain Technology, 2019
Mohammad Mustafa Helal, Muhammad Rizwan Asghar
Finally, Monero adopts kovri project to obfuscate the Internet traffic in a way such that any passive traffic monitoring can neither reveal the sender’s geographical location nor the IP addresses. The Kovri project is based on the Invisible Internet Project (I2P) routing service. All the traffic is encrypted and then routed through the I2P nodes. Passive listeners can detect that one is using the I2P service. However, they cannot determine what are you using it for, nor the destinations set up by users.
Towards a Conceptual Typology of Darknet Risks
Published in Journal of Computer Information Systems, 2023
Obi Ogbanufe, Jordan Wolfe, Fallon Baucum
Information gathering is when individuals begin to collect information about getting on darknet sites. Usually, these types of information are gathered on open sites or forums like Reddit or Google, where the individual’s IP addresses could be stored. In this phase, the individual learns about different anonymizing software like Tor or I2P, PGP encryption keys, and peer-to-peer communication applications like Telegram. The second phase is the account formation phase, which involves using Tor to find specific darknet sites. It also involves creating an account/username and profile, setting up a cryptocurrency wallet for sending and receiving payments, and setting up a PGP key for communications.17 The third phase is the market use phase, which involves buyers and sellers using the market to purchase or sell goods and services. The buyer searches the listings and communicates with the seller on price, security, and shipping issues. Though communications and fund exchange are mainly performed on the darknet site, some communications may be performed outside the site using secure messaging applications (e.g., Telegram). The fund could also be exchanged directly to the seller’s crypto-wallet without using the darknet site’s escrow services. These direct communications and fund exchange methods potentially expose buyers and sellers to law enforcement detection. The fourth and last crime script phase is the delivery and receipt, which involves offline transactions, including packaging and shipping the product using several stealth shipping strategies to conceal the package’s content, the sender, and the recipient. Interestingly, government-based mail systems (e.g., USPS) are preferred over private shipping organizations like UPS.17