Have Any Of You Ever Journeyed Into The Darknet?

Discussion in 'The Howard Stern Show' started by HS Cult Leader, Oct 24, 2014.

  1. HS Cult Leader

    HS Cult Leader Elite Member

    Reputations:
    60,163
    Joined:
    Jun 2, 2012
    Messages:
    16,471
    Likes Received:
    26,671
    Darknets: Murky recesses of the hidden web
    By James Rogers

    Published October 24, 2014
    FoxNews.com

    [​IMG]
    (REUTERS/Kacper Pempel/Files)

    The Brazilian police investigation that cracked a high-tech child porn ring earlier this month has shone a spotlight on the darker recesses of the web, an area which still poses massive technology challenges to law enforcement.

    The ring was buried deep inside a “darknet” – private networks built from connections between trusted peers using unconventional protocols.

    Darknets are just one part of what is known as deep web – a vast network which is not indexed by search engines such as Google and Bing. While most of the deep web is not mired in criminality - resources such as academic databases and libraries are said to make up much of its content - darknets typically run on the fortress-like Tor network.

    Tor, which stands for ‘The onion router,’ started out as a military project, but now functions largely as a highly clandestine civilian network.

    “When you refer to the deep web that is used by criminals, it’s the web that uses the encrypted Tor network,” Matthew Green, assistant research professor in the department of computer science at Johns Hopkins University, told FoxNews.com. “Every connection that you make with Tor is not only encrypted, but it’s routed via three ‘hops’ around the world.”

    “It’s like a cloud that anonymizes your traffic,” added Pierluigi Paganini, author of the book “The Deep Dark Web” and founder of the Security Affairs blog. “The traffic is bounced among randomly proxy computers maintained by volunteers worldwide, before sending it on to final destination.”

    Users connect to the network by downloading a free Tor web browser, which can then be used to access myriad 'hidden' sites. "There are specific repositories that are lists of what is available," said Paganini. "You copy the addresses into the Tor web browser and then access the pages."


    The Tor Metrics web site says that the network has just over 2.25 million users.


    Paganini explained that people communicating via Tor include the likes of whistleblowers and journalists. Activists and dissidents are also said to use the network, particularly in countries with repressive regimes. With Tor offering extremely high levels of anonymity, however, criminals have been quick to exploit it.

    “Today, for a cybercriminal, it’s quite easy,” Paganini said, explaining that crooks can use Tor-based black markets for drugs, weapons, underage sex, and hacking services. Payments, he added, can be made using virtual currency, such as Bitcoin.

    The best-known Tor-based black market was the notorious Silk Road, an underground marketplace for the likes of narcotics and weapons. The site, which generated an estimated $1.2 billion between 2011 and 2013, was seized by U.S. authorities last year.

    According to a court filing, the F.B.I. exploited a software misconfiguration on the site’s login page, which accidentally revealed the location of its server.

    “[Silk Road] got busted because they made mistakes,” said Green. “They made some mistakes in the way that they set up the server – that got them caught.”

    While a technical error helped investigators bring down Silk Road, relatively little is known about law enforcement’s tactics for infiltrating Tor-based darknets. The FBI, however, reportedly used a mass malware attack to target Tor servers as part a major child pornography investigation last year.

    The F.B.I has not yet responded to a request for comment on this story from FoxNews.com.

    Nonetheless, Tor clearly remains a headache for the authorities. Documents leaked by NSA whistleblower Edward Snowden purportedly describe the intelligence agency’s ongoing struggle with the clandestine network.

    Entitled ‘Tor Stinks,’ the June 2012 presentation, which was published in The Guardian last year, states that “we will never be able to de-anonymize all Tor users all the time.” The document adds, however, that “with manual analysis” the agency can de-anonymize a very small fraction of Tor users.

    According to the document, the NSA has access to very few Tor “nodes” - computers which relay traffic across the Tor network. The document claims that the NSA’s U.K. counterpart GCHQ runs Tor nodes under a project code-named ‘Newton’s Cradle.’

    Potential tactics for tackling Tor are also discussed, such as setting up a large number of slow nodes to degrade the network’s stability and using cookies to identify Tor users. Some cookies may “survive” Tor use, depending on how “targets” are using the network, according to the presentation.

    In a statement emailed to FoxNews.com, the NSA said that it collects "only those communications that it is authorized by law to collect for valid foreign intelligence and counterintelligence purposes," noting that it has "unmatched technical capabilities" to accomplish its mission.

    "As such, it should hardly be surprising that our intelligence agencies seek ways to counteract targets’ use of technologies to hide their communications," it added. "Throughout history, nations have used various methods to protect their secrets, and today terrorists, cybercriminals, human traffickers and others use technology to hide their activities. Our intelligence community would not be doing its job if we did not try to counter that."

    GCHQ declined to comment on this story, but noted, in an emailed statement, that all of its work "is carried out in accordance with a strict legal and policy framework."

    Paganini told FoxNews.com that law enforcement and intelligence agencies across the globe are working hard to peel away the anonymity of Tor users. Confronted with the challenge of breaking the network’s encryption or attacking flaws in its infrastructure, attackers are concentrating their efforts on the latter option, according to the security expert.

    Still, though, much of Tor remain clouded in secrecy.

    Even the number of sites running on the network is a mystery, although Green estimates that it may be a relatively modest number. “The number of sites is not enormous,” he said. “It’s probably in the hundreds, I would guess.”
     
  2. JOHN DENVER

    JOHN DENVER floating around VIP Gold

    Reputations:
    20,814
    Joined:
    Mar 18, 2014
    Messages:
    5,610
    Likes Received:
    5,392
  3. HowieStearn

    HowieStearn HateClub

    Reputations:
    15,574
    Joined:
    Dec 13, 2011
    Messages:
    18,082
    Likes Received:
    19,467
    I've been to Detroit and Atlanta, does that count? :eek:
     
  4. Head Censor

    Head Censor Turgid Member VIP

    Reputations:
    70,917
    Joined:
    Dec 13, 2011
    Messages:
    16,205
    Likes Received:
    40,442
    That's very interdasting stuff, HS.
     
  5. chapped

    chapped Well-Known Member

    Reputations:
    18
    Joined:
    Jan 6, 2012
    Messages:
    55,631
    Likes Received:
    61,917
    I was on the DeepWeb for 5 mins.. the names alone of different sites sent me running for the hills and I never went back..

    fucking anyone that clicks on that shit is asking for trouble
     
  6. HS Cult Leader

    HS Cult Leader Elite Member

    Reputations:
    60,163
    Joined:
    Jun 2, 2012
    Messages:
    16,471
    Likes Received:
    26,671

    That's what I was thinking, for a moment I thought of trying that browser to see what's there, then I thought an alarm would go off in a place like this and suddenly there will be an open investigation on me. :chair:


    [​IMG]
     
    smichal likes this.
  7. greenchiclets

    greenchiclets Well-Known Member

    Reputations:
    11,835
    Joined:
    Dec 13, 2011
    Messages:
    5,087
    Likes Received:
    9,071
    "I use deepweb, but only to research a book."
    Pete Townshend (and Double A)
     
    Brokenbad, Droog, Mantis and 6 others like this.
  8. Wesmantooth

    Wesmantooth VIP Extreme Gold

    Reputations:
    174
    Joined:
    Dec 14, 2011
    Messages:
    12,756
    Likes Received:
    10,996
  9. ScottBaiosPenis

    ScottBaiosPenis Well-Known Member

    Reputations:
    590
    Joined:
    May 26, 2013
    Messages:
    9,052
    Likes Received:
    15,549
    i bought a few things off silkroad when it first started it up, way before it got busted. too much of a hassle but amazing that it actually worked as advertised
     
    HeyThere likes this.
  10. Omen

    Omen Well-Known Member

    Reputations:
    0
    Joined:
    Jul 24, 2014
    Messages:
    4,513
    Likes Received:
    4,191
    :lol:
     
  11. Omen

    Omen Well-Known Member

    Reputations:
    0
    Joined:
    Jul 24, 2014
    Messages:
    4,513
    Likes Received:
    4,191
    One guy left his wallet????
    :lol:
     
  12. OV

    OV Rapscallion

    Reputations:
    9
    Joined:
    Sep 10, 2010
    Messages:
    12,796
    Likes Received:
    35,722
    Hell no, I got enough trouble trying to figure out where to place the parenthesis and "+" marks in Google search phrases :dontknow:
     
    Senator Rick, TeeDonkey and JameGumb like this.
  13. Divorce Chicken

    Divorce Chicken I've got angst in my pants VIP

    Reputations:
    39,749
    Joined:
    Jan 24, 2012
    Messages:
    18,592
    Likes Received:
    42,888
  14. lilbuddy67

    lilbuddy67 A man with breath-taking anger management issues Banned User

    Reputations:
    3
    Joined:
    Aug 23, 2010
    Messages:
    13,272
    Likes Received:
    15,753
    I've been on it many times. Almost everything is available on there. Too much CP. I stopped because it's just too damn slow.
     
  15. JameGumb

    JameGumb We're all out of toner!

    Reputations:
    71,677
    Joined:
    Dec 29, 2013
    Messages:
    53,945
    Likes Received:
    42,463
    Zero interest. I've heard there's cool stuff on there like secret government projects like real photos of aliens/ufo crash landings but I'd never risk it. I'll wait until the shit shows up on the history channel :dontknow:
     
  16. ScottBaiosPenis

    ScottBaiosPenis Well-Known Member

    Reputations:
    590
    Joined:
    May 26, 2013
    Messages:
    9,052
    Likes Received:
    15,549
    whats cp?
     
  17. jokeland

    jokeland Well-Known Member

    Reputations:
    4,765
    Joined:
    Dec 19, 2011
    Messages:
    6,191
    Likes Received:
    4,688
    I've gone about as far as I ever want to go in seeing that first beheading video on the regular nets.
     
    Turkeyneck, smichal and JameGumb like this.
  18. alittlebitcunty

    alittlebitcunty Well-Known Member

    Reputations:
    0
    Joined:
    Aug 14, 2013
    Messages:
    1,220
    Likes Received:
    656
    How do you find CP unless you're searching it out? I never stumbled upon it accidentally, but I've never been in those parts of the web.
     
    HeyThere likes this.
  19. HowieStearn

    HowieStearn HateClub

    Reputations:
    15,574
    Joined:
    Dec 13, 2011
    Messages:
    18,082
    Likes Received:
    19,467
  20. lilbuddy67

    lilbuddy67 A man with breath-taking anger management issues Banned User

    Reputations:
    3
    Joined:
    Aug 23, 2010
    Messages:
    13,272
    Likes Received:
    15,753
    I didn't say I watched it dummy. They have search engine on there, and links that are categorized.And Listal lists with explanations of what the links lead to.It's easy to put two and two together. I don't think you can Google it on the regular Web, not unless you're suicidal.