presented by:
*
* there are just estimation
1st we need to knwo how
works
• Spider (crawler) will seek out webpage by going from one hyperlink to another and adding each page to it's catalog
• A program called an indexer then reads these webpages and creates an index, storing the URL and important content of webpage.
• Each search engine has its own ranking algorithm that returns results based on their relevance to the user’s specified keywords or phrases.
Some sites are not linked by other pages
Some sites require authentication before accessing the actual content (password-protected resources)
Difficult desing for indexer
The use of language JavaScript (like Ajax) misunderstood by spiders
Dynamic links (URL)
Darknet content
| Normal Web Site | Darknet Hosted Web Site |
|---|---|
| The domain name (and associated registration details) | No owner details |
| The IP address (and thus the physical location and registered owner) | No physical location |
Tor is a free software for for enabling anonymous communication.
Protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world
Works on The Onion Routing technique
.onion Links
Access by Tor Browser
Onion routing encrypts and decrypts data typically 3 or more separate times, once for each tor node it passes through on the way to the destination via the path given by the tor directory server.
It does this using the public key of the router(tor relay), which only the router’s private key can decrypt.
No single router knows the entire network path from source to destination.
Alice
Bob
Ease of use: Surfing is more complex due the absence of indexing of the content
Speed: Slower to access than surface Web information.
Cybercrime: Inability to track down criminals. Activities range from the sales of illegal drugs and weapons, to hacking services, the hiring of contract killers etc...
Deep
Web
"there is always something positive..."
Privacy and Security: Cannot know which connection is initiated as a user and which as node, making impossible the monitoring of the communications
Information: Access to private content and information (Government Security Info)
Freedom of speech and information: A way for people living under oppressive or restrictive regimes to reveal the truth like WikiLeaks
http://xmh57jrzrnw6insl.onion – TORCH – Tor Search Engine
http://xmh57jrzrnw6insl.onion - Freedom of Press Foundation
http://32rfckwuorlf4dlv.onion – Onion URL Repository
http://tuu66yxvrnn3of7l.onion – UK Guns and Ammo
http://dirnxxdraygbifgc.onion - OnionDir - Deep Web Link Directory
http://wlupld3ptjvsgwqw.onion/wlupload.en.html - WikiLeaks Submission Upload
http://rso4hutlefirefqp.onion/ - Medical Grade Cannabis Buds
http://newpdsuslmzqazvr.onion/ - THE PEOPLES DRUG STORE
http://smoker32pk4qt3mx.onion/ - Smokeables! Finest Organic Cannabis, shipping from the USA!
http://fzqnrlcvhkgbdwx5.onion/ - CannabisUK
Bergman, Michael K , "The Deep Web: Surfacing Hidden Value". The Journal of Electronic Publishing , August 2001
http://www.nytimes.com/2009/02/23/technology/internet/23search.html?th&emc=th
Jesse Alpert & Nissan Hajaj, “We knew the web was big…”, 2008
http://googleblog.blogspot.com/2008/07/we-knew-web-was-big.html
https://en.wikipedia.org/wiki/Deep_web
https://www.deepdotweb.com/how-to-access-onion-sites/
http://www.deepwebsiteslinks.com/