presented by:
*
* there are just estimation
• Spider (crawler) will seek out webpage by going from one hyperlink to another and adding each page to it's catalog
• A program called an indexer then reads these webpages and creates an index, storing the URL and important content of webpage.
• Each search engine has its own ranking algorithm that returns results based on their relevance to the user’s specified keywords or phrases.
• To be discovered, a webpage must be static and linked to other pages.
Some sites are not linked by other pages and therefore can not be discovered by crawlers
sites that require registration and login (password-protected resources).
Some sites require authentication before accessing the actual content
The webpages in their design may make it difficult to indexing
The use of language JavaScript (like Ajax ) misunderstood by robots
Darknet content
• Certain content is intentionally hidden from the regular Internet, accessible only with special software, such as Tor, I2P, or other darknet software.
• The darknets which constitute the Darknet content include small, friend-to-friend, peer-to- peer networks, as well as large, popular networks like Freenet, I2P, and Tor, operated by public organizations and individuals.
Researchers at the U.S. Naval Research Laboratory release an early version of Tor. Originally designed to protect the identity of American operatives and dissidents in repressive countries like China.
MILNET (Military Network) was the name given to the part of the ARPANET internetwork designated for unclassified United States Department of Defense traffic.
Alice
Bob
Ease of use: Research is more complex due the absence of indexing of the content
Speed: Slower to access than surface Web information.
Cybercrime: Inability to track down criminals. Activities range from the sales of illegal drugs and weapons, to hacking services, the hiring of contract killers etc...
Deep
Web
"there is always something positive..."
Privacy: Avoid statistical analysis by changing entry node every ~10min (Anonymousity)
Security: Cannot know which connection is initiated as a user and which as node, making impossible the monitoring of the communications
Information: Greater scope. Access to private content and information (Government Security Info) archived in searchable databases. But is this info ethical?...
Alice
Freedom of speech and information: A way for people living under oppressive or restrictive regimes to reveal the truth.
WikiLeaks is an international, online, non-profit, journalistic organisation which publishes secret information, news leaks, and classified media from anonymous sources.