Showing posts with label Darknet. Show all posts
Showing posts with label Darknet. Show all posts

Monday, 17 July 2017

Darknet : Your Guide to the Badlands of the Internet


Darknet – Totally Diverse Being

If there tends to be something peculiar going on online, then the same could be taking place on the darknet such as hacked login details, cybersecurity exploits put up for hire and much more. In 2013, Target had been hacked and details of customer card had turned up on darknet marketplaces. Hackers had also attempted to do the same with login credential of Yahoo as well as details of O2 phone network customers in the UK.

One will find cybercriminals also selling security exploits. With the growth of bitcoin, the currency of choice on the darknet and unidentified payments seems to be much easier than before. A news enquiry in Australia had recently discovered that an unidentified darknet user had offered up access to the Medicare records of `any Australian’ for only 0.0089 bitcoin - $22, AU$30, £18. Europol has mentioned that the darknet together with the other peer-to-peer networks are yet the `main platform’ for the purpose of sharing child abuse material.

For users using Chrome or Safari to get online, the darknet is said to be a totally diverse being and how could it be diverse from the `surface web’ which we are aware of? What is it that users need to be aware of in advance should one intend to wade in?

`Darknet’ Not Same as `Deep Web’

We need to know that the darknet is not the same as the `deep web’, which is referred to any area of the internet which is not noticeable by search engine. However that does not mean that is suspicious and there are several other sites one would visit in their daily browsing which may fall in this classification. When a user tends to log in to internet banking, they are navigated to a particular location online and one that is not assisted in Google results.

The same could go for various pages which may tend to pop up in webmail services such as Gmail or educational databases on a university network. It seems to be complex in estimating presently how big the deep web could be though the generally cited research, (from 2001) has placed the deep web at 400 to 500 times the size of the `surface web’.

It is said that if the surface web could be the tip of the iceberg and the deep web, of what lies below the water, then the darknet would be what one would find deep in the blackest water beneath. The darknet itself is the network while the dark web the content which is served up on these networks.

Hidden Crime Bazaars

According to researcher Brian Krebs, it is here that one would find a type of open market which tends to pursue their trade in illegal wares, the hidden crime bazaars which can only be accessed through special software that obscures one’s true location online.

Last month the UN had observed that though the drug trafficking over the darknet seems to be comparatively uncertain, drug transaction has increased by 50% annually from September 2013 to January 2016. Moreover in early 2016, Loretta Lynch the then-US Attorney General had cautioned that some gun sales had been shifting to the dark web in order to stay beyond the reach of regulations.

 Here the main key is secrecy and whistle-blowers, activists together with political insurgents definitely tend to a valid reason to obscure their online location and post secrecy on the deep web as well as the darknet, though that level of secrecy has also been sought by the criminals.

Precise Software/Devoted Browser

This does not seem to be a matter of issues to `’ and to spy one would need precise software together with a devoted browser. Most probably the Tor software and its dedicated Tor Browser are the most famous of these but there are other comprising of I2P and Freenet.

By utilising software initially called The Onion Router, Tor tends to secure traffic by routing it via a network of secure relays which anonymize traffic. These relays are said to be run by volunteers all over the world who donate their server bandwidth. Considering it as a network of safe house, one travels through underground tunnels which run along the line of the street above and tend to pop out where you desire safe houses donated by fellow network users.

However with links on the darknet, it is usually only alphanumeric stings of gibberish and could be very difficult to know what you’re getting. It is significant to recall that Tor is not illegal software, only as torrenting software, does not do anything illegal till one tends to use the same in sharing pirated movies.

Tor states that plenty of `normal people’ tend to use its service together with citizen journalists, whistle-blowers, law enforcement agencies and as per Human Rights Watch, Chinese dissidents. As per the estimates of Tor only around 4% of traffic over its network is for hidden services and the rest is people accessing regular internet sites with greater secrecy.

Saturday, 11 March 2017

Dark Net is More Resilient to Attack than the Internet

Our reliance on internet for day to day activities is growing exponentially with every passing month. Internet is regarded as a robust and complex network which happens to fail quite a lot even though the technological evolutions are upgrading it capabilities at break neck speed. A research conducted by the scientists has revealed that the dark net which remains hidden from the regular internet as well as invisible to the common search engine happens to be less vulnerable to the cyber attacks. Given the fact it has low visibility and not everyone knows about it keeps it secure even though it works on the same foundation of the commonly used internet.

Decentralization is the major reason for attacks on common internet

The regular is extremely decentralized which is known to become extremely stable in normal circumstance which makes it easier to wreak it. Internet is just an amalgamation of sites and servers which are millions in number and works fine even when you take out few sites or servers from this complex network. That is why it becomes more vulnerable and can easily be used to launch a coordinated attack and this is what exactly happens when someone launches a distributed denial of service attacks or more commonly known as (DDoS). Dark Net is less vulnerable because of its unique structure.

Lack of rick club effect safeguards dark net from attacks

Their study has found that the powerful network nodes in the regular internet tend to connect with the powerful nodes with ease. This helps in forming what these scientists describe as network elites. Therefore launching an attack on single such node results in triggering the failure of the other nodes and this ultimately results in failure of the whole network. Dark net simply does away with the high level connectivity among the powerful nodes present in its network.

When it comes to network elites in the dark elites then appear to avoid each other which ensure its robustness against the mitigated attacks. Dark net in essence creates the ‘small world network’ which is filled up with the heavily connected nodes link which is a part of the smaller local nodes. It can be easily visualized as the major traffic hubs and how they connect with the smaller airports spread across the region. Scientists are still to figure what makes the dark net so much touch against the attacks when they happens to very much similar to regular internet in the way it works and interacts with different node in many ways.

Scientists have put forward the thought that completely reconfiguring the internet is the only resort toward infusing the robust toughness in the regular internet. This method of reconfiguring the complete internet will certainly be a giant momentous task that would be expensive beyond imagination but this will help in bringing highly secure environment for the next generation of the users and large companies.