Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
You can change this under Settings & Account at any time.
DIGGING INTO THE DEEP WEB
Transcript of DIGGING INTO THE DEEP WEB
THE DEEP WEB
of the world wide web content
WHAT IS THE REST
The Dark net or The Deep Web is that part of the surface web that is not indexed by standard search engines.
-7500 terabytes of information
-400 to 550 times larger than the
commonly defined world wide web.
Why can't we access
The Deep Web
4. Limited access content
5. Non-HTML/text content
6. contextual pages
How can we access The Deep Web ?
There are specific search engines to access the deep web :
What is TOR ?
How does TOR work ?
-TOR is a search
engine to access
The Deep Web
functional in the
-Tor prevents people from learning
your location or browsing habits.
LIGHT IN THE DARKNESS
The Deep Web offers an avenue for expression, organization and the influx of information for people living under oppressive or restrictive regimes.
EXPRESSION FOR THE OPPRESSED
The Brighter Side
- TOR provides some hidden services like money laundering, contract killing, cyber-attacks for hire, contraband chemicals, and bomb making.
- Hidden Wiki is just like wikipedia and it is community-maintained link directory to these hidden services.
How To Bypass the Great
Firewall Of China
Internet During the Middle East Revolution
-"Amazon.com of illegal products"
-An online black market, trading in legal and many illegal products, including all manner of drugs, using encrypted technology to protect the user's anonymity.
-Launched in 2011
The common people have the opportunity to know what their government is really up to, basically making government more transparent and leading to a more informed voting population. Also the makers could enjoy privacy and not fear about what they were posting.
$1.2 billion in revenue and $79.8 million in commissions
THE DARK BUSINESS
SECURITY & PRIVACY
Presentation By :
Pankaj Thukral (165)
Sonali Kathuria (292)
Itee Ashok (350)
Megha Aggarwal (453)
The Deep Web provide an environment to the users protect their privacy and ensure safety. Although there are several conditions and different type of attacks that could expose a user’s identity if criminal activity is found
Despite the vast amount of information the Deep Web contains, it is still an ambiguous part of the digital world. Many Internet users have not heard of it and believe that what they see on their Google search results is all that the Web has to offer. Others would rather have it abolished, claiming that it is an underground world of crime and unethical behavior. Then there are those who are interested in the possibilities of this unexplored frontier, but simply do not know where to begin. But from what we have gathered, the Deep Web is not going away anytime soon. It is worth our time to further investigate its contents and learn how to harness its power.
-Bitcoin is a digital crypto-currency, proposed by Satoshi Nakamoto (fake name) as a Project under an MIT license.
-It is a peer to peer network that allows you to do anonymous currency trading.
-Can be used for worldwide payments with ZERO processing fee.
-There will only be 21 million bitcoins ever.
-The cost of electricity used to mine a bitcoin is generally more than its "Value".
-"Mined" by solving a block chain algorithm.
-Each bitcoin is divisible by 100,000,000.
HOW TO ACQUIRE?
1. Get a digital wallet or wallets.
2. Get Bitcoins (mine, trade or buy)
3. Use or save bitcoins.
-You WILL go to PRISON or worse if you do some things discussed here.
-This is presented for information security and knowledge purposes only, DON'T DO THIS EVER!
-Our presentation does not constitute advice and recommendations and is NOT representative of the views of the team members.