Saturday, February 29, 2020

The Danger of the Web

The Danger of the Web 

As we know that the internet was conceived as a utopia of shared human knowledge. Yet for all the good it has wrought, the Web has also harbored bad actors, from hackers to terrorists Here We read same Basics ....... 


■ THE DEEP WEB 
■ FIGHTING REVENGE PORN 
■ THE YEAR OF THE HACKER

The Deep Web :


History ....

Some 10 years ago, the government built a totally private, anonymous network. Then it became a haven for drugs and child pornography By Lev Grossman and Jay Newton-Small. 

What is Deep Web?

Every One Know This .........
The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard web search-engines. The opposite term to the deep web is the "surface web", which is accessible to anyone/everyone using the Internet.

The story of the Deep
The Stroy Of Deep Web Is very lengthy.But most Importent For Hacker And IT masters.... 
Web is a fable of technology and its unintended consequences. In May 1996, three scientists with the U.S. Naval Research Laboratory presented a paper titled “Hiding Routing Information” at a workshop in Cambridge, England. The paper laid out the technical features of a system whereby users could access the internet without divulging their identities to any Web servers or routers they might interact with along the way. They called their idea “onion routing” because of the layers of encryption that surround and obscure the data being passed back and forth. By October 2003, the idea was ready to be released onto the Net as an open-source project called Tor.
How TO access Deep Web ?
Tor is an Open Sourse Project From This we easly access Hidden Web  

Tor is originally stood for The Onion Router, though the basis for the acronym has since been abandoned.Every One Must want to know about this that If the Deep Web is a masked ball, Tor provides the costumes. It was a highly elegant and effective creation, so much so that even the people who built it didn’t know how to break it. 
Do You know ?
Now everywhere we go, we radiate information about ourselves—our browsing history, our purchases, our taste in videos, our social connections, often even our physical location

The corruption of the Deep Web began not long after it was built. As early as 2006, a website that came to be known as The Farmer’s Market was selling drugs such as marijuana and ketamine. It built up a clientele in 50 states and 34 countries before a DEA-led team brought it down in April 2012. The Deep Web isn’t just a source for drugs: there is evidence that jihadists communicate through it and that botnets —massive networks of virus-infected computers employed by spammers—use it to hide from investigators. Even now, it takes just a minute or two to find weapons or child pornography on the Deep Web. In August 2013, the FBI took down Freedom Hosting, a company specializing in Deep Web sites, alleging that it was “the largest facilitator of child porn on the planet.” Its owner, a now-32-year-old named Eric Marques, is facing extradition from Ireland.

Silk Road

Image result for Silk Road on deep web logo
But Silk Road was different. For one thing, it was more discriminating: its terms of service forbade child pornography, stolen goods and counterfeit currency. For another, it didn’t use dollars; it used Bitcoins. 

Bitcoins

Bitcoins belong to an era in which trust in banks and government has been compromised. Users can transfer them from one digital wallet to another without banks brokering the transaction or imposing fees. The currency is completely decentralized—its architecture owes a lot to Napster’s successor, BitTorrent— and is based on sophisticated cryptography. Bitcoin is essentially cash for the internet, virtually anonymous and extremely difficult to counterfeit. The Farmer’s Market was vulnerable because it left financial tracks in the real world. Silk Road didn’t. Read more Come Here...

DEEP WEB–SOURCED These fake passports were seized in a federal investigation.
NOTE : Don't share this pic please..

DARK MARKETS 

Illicit sites like the now-shuttered Silk Road find safe haven on the Deep Web and deal in everything from hard drugs to pornography 

SILK ROAD

Ross Ulbricht was accused of running a site that sold drugs and hacking software. 

UK PASSPORTS

 Sells forged documents, claiming to put passport numbers in a government database 

WHMX

 Allows users to buy counterfeit dollars and euros 

SURFING THE DEEP WEB 
Unlike conventional internet browsers, Tor allows users to surf the Web anonymously. It is also the portal to illegal-commerce sites like Silk Road. Here’s how it works only by hacked me tech

Why It’ s So Hard for Revenge-Porn Victims to Get Justice

 Every one Know that Sex crimes can be difficult to prosecute when they take place in the physical world—when the offense happens online, justice is even harder to come by. Between cultural attitudes, technological obstacles and legal inconsistencies, victims of nonconsensual porn face a challenging road to recourse ..
PERSONAL SHAME
As We know That many revenge-porn victims are too embarrassed to come forward. Victim blaming is pervasive, and the first response of many friends, family and even police officers is to ask why anyone would take and send a nude photo in the first place. People would ask, “‘How could you share those photos?’” recalls Cyber Civil Rights Initiative founder Holly Jacobs, describing her own experiences. 
ILL-EQUIPPED POLICE 
Few local law-enforcement agencies have a sophisticated understanding of the impact of revenge porn and the technological tools to address it. Even if they do take the crime seriously, in many cases local police can’t effectively collect digital evidence. 
PATCHWORK LAWS 
While 40 states now have laws against revenge porn, those laws apply a variety of standards. And unlike crimes in which the victim and perpetrator have a physical encounter, nonconsensual porn can be spread across state lines, creating a tangle of different jurisdictions and competing laws. 
TECHNOLOGICAL REALITY
This is most Read able content please don't miss. 
As we know that Once something is on the internet,So it’s nearly impossible to erase it. While many social-media like Facebooks Whatsapp and others platforms and porn websites (Secret) have become more cooperative about removing content that was shared without consent, there’s no guarantee that those photos haven’t spread elsewhere online.“Generally speaking, the internet is permanent,”says Reg Harnish, the CEO of GreyCastle Security. 

The Year of the Hacker 
It was in 2016 that hackers made vulnerability the new normal and took aim at democracy itself BY MATT VELLA.
Hackers have a bad name everywhere. YES or NO............
Please Tell in comment......

1 comment:

  1. SSN FULLZ AVAILABLE

    Fresh & valid spammed USA SSN+Dob Leads with DL available in bulk.

    >>1$ each SSN+DOB
    >>3$ each with SSN+DOB+DL
    >>5$ each for premium fullz (700+ credit score with replacement guarantee)

    Prices are negotiable in bulk order
    Serious buyer contact me no time wasters please
    Bulk order will be preferable

    CONTACT
    Telegram > @leadsupplier
    ICQ > 752822040
    Email > leads.sellers1212@gmail.com

    OTHER STUFF YOU CAN GET

    SSN+DOB Fullz
    CC's with CVV's (vbv & non-vbv)
    USA Photo ID'S (Front & back)

    All type of tutorials available
    (Carding, spamming, hacking, scam page, Cash outs, dumps cash outs)

    SQL Injector
    Premium Accounts (Netflix, Pornhub, etc)
    Paypal Logins
    Bitcoin Cracker
    SMTP Linux Root
    DUMPS with pins track 1 and 2
    WU & Bank transfers
    Socks, rdp's, vpn
    Php mailer
    Server I.P's
    HQ Emails with passwords
    All types of tools & tutorials.. & much more

    Looking for long term business
    For trust full vendor, feel free to contact

    CONTACT
    Telegram > @leadsupplier
    ICQ > 752822040
    Email > leads.sellers1212@gmail.com

    ReplyDelete

Hack Me Tech