web analytics
Tuesday , 25 April 2017
Latest
Home » Tech News Blog » Hacking » What is the Dark Web?

What is the Dark Web?

Despite attempts to index the Dark Web, much is still unknown about its contents. We do know that various characters and people with differing motives use the Dark Web to perform nefarious activities and sell illegal products.

darkweb2

Black Markets: Selling and dealing of illegal items and products, e.g. drugs and weapons Botnets Services: Creating a large amount of traffic to temporarily or indefinitely interrupt or suspend a server Terrorists: The US Government has successfully intercepted messages from Al Qaeda on the Dark Web Hoaxers: It’s incredibly hard to tell what’s true and what is a hoax on the Dark Web Hackers: The anonymity of the Dark Web provides the perfect base for hackers to work from Fraudsters: There are many sites and forums dedicated to scamming and counterfeiting Phishing: Cloned sites and scam sites are abundant on the Dark Web Hitmen: Services include hitmen for hire and arms dealers, with a pricing structure Pornography: Dominated by illegal and ethically disputed pornography

Despite attempts to index the Dark Web, much is still unknown about its contents. We do know that various characters and people with differing motives use the Dark Web to perform nefarious activities and sell illegal products. Black Markets: Selling and dealing of illegal items and products, e.g. drugs and weapons
Botnets Services: Creating a large amount of traffic to temporarily or indefinitely interrupt or suspend a server
Terrorists: The US Government has successfully intercepted messages from Al Qaeda on the Dark Web
Hoaxers: It’s incredibly hard to tell what’s true and what is a hoax on the Dark Web
Hackers: The anonymity of the Dark Web provides the perfect base for hackers to work from
Fraudsters: There are many sites and forums dedicated to scamming and counterfeiting
Phishing: Cloned sites and scam sites are abundant on the Dark Web
Hitmen: Services include hitmen for hire and arms dealers, with a pricing structure
Pornography: Dominated by illegal and ethically disputed pornography

Your Data for Sale (and it doesn't cost too much...) If your personal details have been stolen, compromised, or fall into the hands of the wrong people, then it wouldn't cost too much to buy the information if it were to be sold on the Dark Web. Buying a Social Security number costs just $1.00, whilst getting hold of someone's medical records will cost just $50. If your credit card details were to be put up for sale the average price would be $60 but could be sold for much less. For a little bit more your bamk details can be bought for $1000 and commerical malware would cost a buyer $2500+. This would exploit hundreds of thousands of dollars, possibly millions.

Your Data for Sale (and it doesn’t cost too much…)
If your personal details have been stolen, compromised, or fall into the hands of the wrong people, then it wouldn’t cost too much to buy the information if it were to be sold on the Dark Web.
Buying a Social Security number costs just $1.00, whilst getting hold of someone’s medical records will cost just $50. If your credit card details were to be put up for sale the average price would be $60 but could be sold for much less. For a little bit more your bamk details can be bought for $1000 and commerical malware would cost a buyer $2500+. This would exploit hundreds of thousands of dollars, possibly millions.

The Dark Web isn’t totally full of criminal activity, some use the anonoymity for good, such as whistleblowing, or activism. There is also some suggestion that government agencies uses complex code-breaking puzzles to recruit new staff, such as the US Naval Research Lab circa 2002. Following this, in 2003 the I2P peer-to-peer network was developed from the Freenet network. Tor continued to develop and in 2003 the network was released under general license and in 2004 became a nonprofit organisation. In 2013 Tor usership reached 4 million users. A huge development came in 2009 when Bitcoin, the digital currency was developed, making annonymous, encrypted transactions possible.

The Dark Web isn’t totally full of criminal activity, some use the anonoymity for good, such as whistleblowing, or activism. There is also some suggestion that government agencies uses complex code-breaking puzzles to recruit new staff, such as the US Naval Research Lab circa 2002. Following this, in 2003 the I2P peer-to-peer network was developed from the Freenet network. Tor continued to develop and in 2003 the network was released under general license and in 2004 became a nonprofit organisation. In 2013 Tor usership reached 4 million users.
A huge development came in 2009 when Bitcoin, the digital currency was developed, making annonymous, encrypted transactions possible.

darkweb6

Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than six thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Your chosen Tor client will pick a random path to the destination server which consists of Tors nodes, encrypted and unencrypted links.

Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than six thousand relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Your chosen Tor client will pick a random path to the destination server which consists of Tors nodes, encrypted and unencrypted links.

We'd recomemmend that you don't start browing around the Dark Web, but if you did, you’d need a Tor-enabled browser or a proxy to do so. Dark Web links aren’t that easy to stumble across, based on their composition, but occasionally links find their way onto popular sites such as Youtube, Twitter, Reddit and online forums. Here's an example of a Dark Web URL: http://3g2upl4pq6kufc4m.onion The hostname (3g2upl4pq6kufc4m) is randomly generated from the Tor software to create a hidden service. The domain suffic (.onion) is a domain reachable only via the Tor network.

We’d recomemmend that you don’t start browing around the Dark Web, but if you did, you’d need a Tor-enabled browser or a proxy to do so. Dark Web links aren’t that easy to stumble across, based on their composition, but occasionally links find their way onto popular sites such as Youtube, Twitter, Reddit and online forums.
Here’s an example of a Dark Web URL: http://3g2upl4pq6kufc4m.onion
The hostname (3g2upl4pq6kufc4m) is randomly generated from the Tor software to create a hidden service. The domain suffic (.onion) is a domain reachable only via the Tor network.

A massive 96% of the internet is not accessible by search engines, like Google or Bing. $20k is the cost for a hitman to target an ‘ordinary’ person. $100k for someone ‘important’. Incredibly, 80% of Tor’s funding comes from the US Government. There are an estimated 50,000 extremist terrorist groups on the Dark Web The Deep (& Dark) Web are growing at a faster rate than the surface rate. The 60 largest Deep Web sites contain around 750 TB. That’s 40 times bigger than the entire Surface Web!

A massive 96% of the internet is not accessible by search engines, like Google or Bing.
$20k is the cost for a hitman to target an ‘ordinary’ person. $100k for someone ‘important’.
Incredibly, 80% of Tor’s funding comes from the US Government.
There are an estimated 50,000 extremist terrorist groups on the Dark Web
The Deep (& Dark) Web are growing at a faster rate than the surface rate.
The 60 largest Deep Web sites contain around 750 TB. That’s 40 times bigger than the entire Surface Web!

In 2013 Silk Road 2.0 was taken down in a single day following a six month, 17-nation police operation, with Europol keeping quiet about how this was achieved. The US Defence Advanced Reasearch Projects Agency (DARPA) have begun the ardious task of indexing the Deep Web, getting one step closer to identifying the structure of the Deep web.

In 2013 Silk Road 2.0 was taken down in a single day following a six month, 17-nation police operation, with Europol keeping quiet about how this was achieved.
The US Defence Advanced Reasearch Projects Agency (DARPA) have begun the ardious task of indexing the Deep Web, getting one step closer to identifying the structure of the Deep web.

Stay away from the Dark Web - don't give in to curiousity. Keep all your software up-to-date, not just your anti-virus software. Use many strong passwords - don't have a single password for everything. Be vigilant when using public WiFi. It may not be as secure as you are told or think it is. Check all your privacy settings on your social media accounts. Look for a padlock or HTTPS in your browser window - especially when online shopping. Don't open or download attachments from unknown email addresses. Don't click any links within email messages if you don't know the sender. Make sure your firewall is installed and don't disable it! Have a set-limit on your credit card for online transactions.

1. Stay away from the Dark Web – don’t give in to curiousity.
2. Keep all your software up-to-date, not just your anti-virus software.
3. Use many strong passwords – don’t have a single password for everything.
4. Be vigilant when using public WiFi. It may not be as secure as you are told or think it is.
5. Check all your privacy settings on your social media accounts.
6. Look for a padlock or HTTPS in your browser window – especially when online shopping.
7. Don’t open or download attachments from unknown email addresses.
8. Don’t click any links within email messages if you don’t know the sender.
9. Make sure your firewall is installed and don’t disable it!
10. Have a set-limit on your credit card for online transactions.

darkweb12

Additional Links: The Dark Net, Onion Router

Any other comments or pointers? Please leave in the comments section below:

Comments

comments

Support us!

If you like this site please follow us and click on any of these buttons!

Powered by WordPress Popup