Upload
mayank-chaudhari
View
313
Download
0
Tags:
Embed Size (px)
DESCRIPTION
This presentstion introduces you to the deep web, Darknet and the anonymizing network of TOR and I2P.
Citation preview
DEEP WEBTHE HIDDEN INTERNET
CLEARNET
That Internet, used by billions around the world every day, is sometimes known as the Surface
Web, or the Clearnet, as coined by Tor and other anonymous online users. The so-called surface
Web, which all of us use routinely, consists of data that search engines can find and then offer
up in response to your queries. But in the same way that only the tip of an iceberg is visible to
observers, a traditional search engine sees only a small amount of the information that's
available -- a measly 0.03 percent
WHAT IS DEEP WEB ?
In simple words Everything else Clearnet is Deep Web.
The deep Web (also known as the undernet, invisible Web and hidden Web, among
other monikers) consists of data that you won't locate with a simple Google search.
It’s made up of tens of billions of sites that are hidden within a universe of code --
various estimates have put the Deep Web at anywhere from five to 500,000 times the
size of the Surface Web.
DARKNET
Darknets are small niches of the “Deep Web,” which is itself a catch-all term for the assorted
Net-connected stuff that isn’t discoverable by the major search engines. (BrightPlanet has a
stellar Deep Web primer.) They cloak themselves in obscurity with specialized software that
guarantees encryption and anonymity between users, as well as protocols or domains that the
average webizen will never stumble across.
WHY DARKNET IS IMPORTANT ?
Many countries lack the equivalent of the United States’ First Amendment. Darknets grant
everyone the power to speak freely without fear of censorship or persecution. According to the
Tor Project, anonymizing Hidden Services have been a refuge for dissidents in Lebanon,
Mauritania, and Arab Spring nations; hosted blogs in countries where the exchange of ideas is
frowned upon; and served as mirrors for websites that attract governmental or corporate angst,
such as GlobalLeaks, Indymedia, and Wikileaks.
ANONYMOUS NETWORKS
TOR
Tor makes it possible for users to hide their locations while offering various kinds of services,
such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor
users can connect to these hidden services, each without knowing the other's network identity.
STEP 1A hidden service needs to advertise its existence in the Tor network before clients will be able to contact it
STEP 2the hidden service assembles a hidden service descriptor, containing its public key and a summary of each introduction point, and signs this descriptor with its private key.
STEP 3A client that wants to contact a hidden service needs to learn about its onion address first. After that, the client can initiate connection establishment by downloading the descriptor from the distributed hash table
STEP 4When the descriptor is present and the rendezvous point is ready, the client sends this message to one of the introduction points, requesting it be delivered to the hidden service
STEP 5The hidden service decrypts the client's introduce message and finds the address of the rendezvous point and the one-time secret in it. The service creates a circuit to the rendezvous point and sends the one-time secret to it in a rendezvous message
FINDING A DOOR TO TOR SERVICE
Some common sites to walk in the tor network.
1. HiddenWiki
2. TorDir
3. deepweblinks.org
4. http://2vlqpcqpjlhmd5r2.onion/ – Gateway to Freenet
5. http://wiki5kauuihowqi5.onion/ – Onion Wiki
STEP 6In the last step, the rendezvous point notifies the client about successful connection establishment. After that, both client and hidden service can use their circuits to the rendezvous point for communicating with each other
I2P ANONYMIZING NETWORK
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can
use to securely communicate. All data is wrapped with several layers of encryption, and the
network is both distributed and dynamic, with no trusted parties. Unlike many other
anonymizing networks, I2P doesn't try to provide anonymity by hiding the originator of some
communication and not the recipient, or the other way around. I2P is designed to allow peers
using I2P to communicate with each other anonymously — both sender and recipient are
unidentifiable to each other as well as to third parties
GARLIC ROUTING STRUCTURE
PRACTICAL SESSION ON TOR AND ONION HOSTING
THANK YOU