The Danger of the Web
As we know that the internet was conceived as a utopia of shared human
knowledge. Yet for all the good it has wrought, the Web has
also harbored bad actors, from hackers to terrorists Here We read same Basics .......
■ THE DEEP WEB
■ FIGHTING REVENGE PORN
■ THE YEAR OF THE HACKER
The Deep Web :
History ....
Some 10 years ago, the government built a totally private, anonymous
network. Then it became a haven for drugs and child pornography By Lev
Grossman and Jay Newton-Small.
What is Deep Web?
Every One Know This .........
The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard web search-engines. The opposite term to the deep web is the "surface web", which is accessible to anyone/everyone using the Internet.
The story of the Deep
The Stroy Of Deep Web Is very lengthy.But most Importent For Hacker And IT masters....
Web is a fable of technology and its unintended consequences. In May 1996, three
scientists with the U.S. Naval Research Laboratory presented a paper titled “Hiding Routing Information”
at a workshop in Cambridge, England. The paper laid out the technical features of a system whereby users
could access the internet without divulging their identities to any Web servers or routers they might
interact with along the way. They called their idea “onion routing” because of the layers of encryption that
surround and obscure the data being passed back and forth. By October 2003, the idea was ready to be
released onto the Net as an open-source project called Tor.
How TO access Deep Web ?
Tor is an Open Sourse Project From This we easly access Hidden Web
Tor is originally stood for The Onion Router,
though the basis for the acronym has since been abandoned.Every One Must want to know about this that If the Deep Web is a masked ball, Tor
provides the costumes. It was a highly elegant and effective creation, so much so that even the people who
built it didn’t know how to break it.
Do You know ?
Now everywhere we go, we radiate information about ourselves—our browsing history, our
purchases, our taste in videos, our social connections, often even our physical location.
The corruption of the Deep Web began not long after it was built. As early as 2006, a website that came
to be known as The Farmer’s Market was selling drugs such as marijuana and ketamine. It built up a
clientele in 50 states and 34 countries before a DEA-led team brought it down in April 2012. The Deep
Web isn’t just a source for drugs: there is evidence that jihadists communicate through it and that botnets
—massive networks of virus-infected computers employed by spammers—use it to hide from investigators.
Even now, it takes just a minute or two to find weapons or child pornography on the Deep Web. In August
2013, the FBI took down Freedom Hosting, a company specializing in Deep Web sites, alleging that it was
“the largest facilitator of child porn on the planet.” Its owner, a now-32-year-old named Eric Marques, is
facing extradition from Ireland.
Silk Road
But Silk Road was different. For one thing, it was more discriminating: its terms of service forbade child
pornography, stolen goods and counterfeit currency. For another, it didn’t use dollars; it used Bitcoins.
Bitcoins
Bitcoins belong to an era in which trust in banks and government has been compromised. Users can
transfer them from one digital wallet to another without banks brokering the transaction or imposing fees.
The currency is completely decentralized—its architecture owes a lot to Napster’s successor, BitTorrent—
and is based on sophisticated cryptography. Bitcoin is essentially cash for the internet, virtually anonymous
and extremely difficult to counterfeit. The Farmer’s Market was vulnerable because it left financial tracks in
the real world. Silk Road didn’t. Read more Come Here...
DEEP WEB–SOURCED These fake passports were seized in a federal investigation.
NOTE : Don't share this pic please..
DARK MARKETS
Illicit sites like the now-shuttered Silk Road find safe haven on the Deep Web and deal in everything from hard drugs to pornography
SILK ROAD
Ross Ulbricht was accused of running a site that sold drugs and hacking software.
UK PASSPORTS
Sells forged documents, claiming to put passport numbers in a government database
WHMX
Allows users to buy counterfeit dollars and euros
SURFING THE DEEP WEB
Unlike conventional internet browsers, Tor allows users to surf the Web anonymously. It is also the portal
to illegal-commerce sites like Silk Road. Here’s how it works only by hacked me tech
Why It’ s So Hard for Revenge-Porn Victims to Get Justice
Every one Know that Sex crimes can be difficult to prosecute when they take place in the physical world—when the offense
happens online, justice is even harder to come by. Between cultural attitudes, technological obstacles and
legal inconsistencies, victims of nonconsensual porn face a challenging road to recourse ..
PERSONAL SHAME
As We know That many revenge-porn victims are too embarrassed to come forward. Victim blaming is pervasive, and the first
response of many friends, family and even police officers is to ask why anyone would take and send a nude
photo in the first place. People would ask, “‘How could you share those photos?’” recalls Cyber Civil Rights
Initiative founder Holly Jacobs, describing her own experiences.
ILL-EQUIPPED POLICE
Few local law-enforcement agencies have a sophisticated understanding of the impact of revenge porn and
the technological tools to address it. Even if they do take the crime seriously, in many cases local police
can’t effectively collect digital evidence.
PATCHWORK LAWS
While 40 states now have laws against revenge porn, those laws apply a variety of standards. And unlike
crimes in which the victim and perpetrator have a physical encounter, nonconsensual porn can be spread
across state lines, creating a tangle of different jurisdictions and competing laws.
TECHNOLOGICAL REALITY
This is most Read able content please don't miss.
As we know that Once something is on the internet,So it’s nearly impossible to erase it. While many social-media like Facebooks Whatsapp and others platforms
and porn websites (Secret) have become more cooperative about removing content that was shared without
consent, there’s no guarantee that those photos haven’t spread elsewhere online.“Generally speaking, the
internet is permanent,”says Reg Harnish, the CEO of GreyCastle Security.
The Year of the Hacker
It was in 2016 that hackers made vulnerability the new normal and took aim
at democracy itself BY MATT VELLA.
Hackers have a bad name everywhere. YES or NO............
Please Tell in comment......