Have Any Of You Ever Journeyed Into The Darknet?

Discussion in 'The Howard Stern Show' started by HS Cult Leader, Oct 24, 2014.

  1. HS Cult Leader

    HS Cult Leader Elite Member Gold

    Reputations:
    101,846
    Joined:
    Jun 2, 2012
    Messages:
    13,106
    Likes Received:
    18,399
    Darknets: Murky recesses of the hidden web
    By James Rogers

    Published October 24, 2014
    FoxNews.com

    [​IMG]
    (REUTERS/Kacper Pempel/Files)

    The Brazilian police investigation that cracked a high-tech child porn ring earlier this month has shone a spotlight on the darker recesses of the web, an area which still poses massive technology challenges to law enforcement.

    The ring was buried deep inside a “darknet” – private networks built from connections between trusted peers using unconventional protocols.

    Darknets are just one part of what is known as deep web – a vast network which is not indexed by search engines such as Google and Bing. While most of the deep web is not mired in criminality - resources such as academic databases and libraries are said to make up much of its content - darknets typically run on the fortress-like Tor network.

    Tor, which stands for ‘The onion router,’ started out as a military project, but now functions largely as a highly clandestine civilian network.

    “When you refer to the deep web that is used by criminals, it’s the web that uses the encrypted Tor network,” Matthew Green, assistant research professor in the department of computer science at Johns Hopkins University, told FoxNews.com. “Every connection that you make with Tor is not only encrypted, but it’s routed via three ‘hops’ around the world.”

    “It’s like a cloud that anonymizes your traffic,” added Pierluigi Paganini, author of the book “The Deep Dark Web” and founder of the Security Affairs blog. “The traffic is bounced among randomly proxy computers maintained by volunteers worldwide, before sending it on to final destination.”

    Users connect to the network by downloading a free Tor web browser, which can then be used to access myriad 'hidden' sites. "There are specific repositories that are lists of what is available," said Paganini. "You copy the addresses into the Tor web browser and then access the pages."


    The Tor Metrics web site says that the network has just over 2.25 million users.


    Paganini explained that people communicating via Tor include the likes of whistleblowers and journalists. Activists and dissidents are also said to use the network, particularly in countries with repressive regimes. With Tor offering extremely high levels of anonymity, however, criminals have been quick to exploit it.

    “Today, for a cybercriminal, it’s quite easy,” Paganini said, explaining that crooks can use Tor-based black markets for drugs, weapons, underage sex, and hacking services. Payments, he added, can be made using virtual currency, such as Bitcoin.

    The best-known Tor-based black market was the notorious Silk Road, an underground marketplace for the likes of narcotics and weapons. The site, which generated an estimated $1.2 billion between 2011 and 2013, was seized by U.S. authorities last year.

    According to a court filing, the F.B.I. exploited a software misconfiguration on the site’s login page, which accidentally revealed the location of its server.

    “[Silk Road] got busted because they made mistakes,” said Green. “They made some mistakes in the way that they set up the server – that got them caught.”

    While a technical error helped investigators bring down Silk Road, relatively little is known about law enforcement’s tactics for infiltrating Tor-based darknets. The FBI, however, reportedly used a mass malware attack to target Tor servers as part a major child pornography investigation last year.

    The F.B.I has not yet responded to a request for comment on this story from FoxNews.com.

    Nonetheless, Tor clearly remains a headache for the authorities. Documents leaked by NSA whistleblower Edward Snowden purportedly describe the intelligence agency’s ongoing struggle with the clandestine network.

    Entitled ‘Tor Stinks,’ the June 2012 presentation, which was published in The Guardian last year, states that “we will never be able to de-anonymize all Tor users all the time.” The document adds, however, that “with manual analysis” the agency can de-anonymize a very small fraction of Tor users.

    According to the document, the NSA has access to very few Tor “nodes” - computers which relay traffic across the Tor network. The document claims that the NSA’s U.K. counterpart GCHQ runs Tor nodes under a project code-named ‘Newton’s Cradle.’

    Potential tactics for tackling Tor are also discussed, such as setting up a large number of slow nodes to degrade the network’s stability and using cookies to identify Tor users. Some cookies may “survive” Tor use, depending on how “targets” are using the network, according to the presentation.

    In a statement emailed to FoxNews.com, the NSA said that it collects "only those communications that it is authorized by law to collect for valid foreign intelligence and counterintelligence purposes," noting that it has "unmatched technical capabilities" to accomplish its mission.

    "As such, it should hardly be surprising that our intelligence agencies seek ways to counteract targets’ use of technologies to hide their communications," it added. "Throughout history, nations have used various methods to protect their secrets, and today terrorists, cybercriminals, human traffickers and others use technology to hide their activities. Our intelligence community would not be doing its job if we did not try to counter that."

    GCHQ declined to comment on this story, but noted, in an emailed statement, that all of its work "is carried out in accordance with a strict legal and policy framework."

    Paganini told FoxNews.com that law enforcement and intelligence agencies across the globe are working hard to peel away the anonymity of Tor users. Confronted with the challenge of breaking the network’s encryption or attacking flaws in its infrastructure, attackers are concentrating their efforts on the latter option, according to the security expert.

    Still, though, much of Tor remain clouded in secrecy.

    Even the number of sites running on the network is a mystery, although Green estimates that it may be a relatively modest number. “The number of sites is not enormous,” he said. “It’s probably in the hundreds, I would guess.”
     
  2. Ferris Bueller

    Ferris Bueller floating around

    Reputations:
    13,889
    Joined:
    Mar 18, 2014
    Messages:
    4,113
    Likes Received:
    2,503
  3. HowieStearn

    HowieStearn HateClub

    Reputations:
    80,245
    Joined:
    Dec 13, 2011
    Messages:
    14,492
    Likes Received:
    14,268
    I've been to Detroit and Atlanta, does that count? :eek:
     
  4. Head Censor

    Head Censor Turgid Member VIP

    Reputations:
    394,259
    Joined:
    Dec 13, 2011
    Messages:
    10,390
    Likes Received:
    27,066
    That's very interdasting stuff, HS.
     
  5. chapped

    chapped Well-Known Member

    Reputations:
    384,616
    Joined:
    Jan 6, 2012
    Messages:
    55,632
    Likes Received:
    61,906
    I was on the DeepWeb for 5 mins.. the names alone of different sites sent me running for the hills and I never went back..

    fucking anyone that clicks on that shit is asking for trouble
     
  6. HS Cult Leader

    HS Cult Leader Elite Member Gold

    Reputations:
    101,846
    Joined:
    Jun 2, 2012
    Messages:
    13,106
    Likes Received:
    18,399

    That's what I was thinking, for a moment I thought of trying that browser to see what's there, then I thought an alarm would go off in a place like this and suddenly there will be an open investigation on me. :chair:


    [​IMG]
     
    smichal likes this.
  7. greenchiclets

    greenchiclets Well-Known Member

    Reputations:
    28,335
    Joined:
    Dec 13, 2011
    Messages:
    3,652
    Likes Received:
    6,300
    "I use deepweb, but only to research a book."
    Pete Townshend (and Double A)
     
    Brokenbad, Droog, Mantis and 6 others like this.
  8. Wesmantooth

    Wesmantooth VIP Extreme Gold

    Reputations:
    57,551
    Joined:
    Dec 14, 2011
    Messages:
    12,611
    Likes Received:
    10,694
  9. ScottBaiosPenis

    ScottBaiosPenis Well-Known Member

    Reputations:
    77,392
    Joined:
    May 26, 2013
    Messages:
    8,971
    Likes Received:
    15,455
    i bought a few things off silkroad when it first started it up, way before it got busted. too much of a hassle but amazing that it actually worked as advertised
     
    HeyThere likes this.
  10. Omen

    Omen Well-Known Member

    Reputations:
    29,829
    Joined:
    Jul 24, 2014
    Messages:
    4,513
    Likes Received:
    4,191
    :lol:
     
  11. Omen

    Omen Well-Known Member

    Reputations:
    29,829
    Joined:
    Jul 24, 2014
    Messages:
    4,513
    Likes Received:
    4,191
    One guy left his wallet????
    :lol:
     
  12. OV

    OV Rapscallion

    Reputations:
    299,667
    Joined:
    Sep 10, 2010
    Messages:
    12,796
    Likes Received:
    35,727
    Hell no, I got enough trouble trying to figure out where to place the parenthesis and "+" marks in Google search phrases :dontknow:
     
    Senator Rick, TeeDonkey and JameGumb like this.
  13. Divorce Chicken

    Divorce Chicken white punk on dope VIP

    Reputations:
    139,505
    Joined:
    Jan 24, 2012
    Messages:
    14,180
    Likes Received:
    31,300
  14. lilbuddy67

    lilbuddy67 A man with breath-taking anger management issues Banned User

    Reputations:
    86,104
    Joined:
    Aug 23, 2010
    Messages:
    13,275
    Likes Received:
    15,743
    I've been on it many times. Almost everything is available on there. Too much CP. I stopped because it's just too damn slow.
     
  15. JameGumb

    JameGumb We're all out of toner!

    Reputations:
    228,648
    Joined:
    Dec 29, 2013
    Messages:
    35,676
    Likes Received:
    26,976
    Zero interest. I've heard there's cool stuff on there like secret government projects like real photos of aliens/ufo crash landings but I'd never risk it. I'll wait until the shit shows up on the history channel :dontknow:
     
  16. ScottBaiosPenis

    ScottBaiosPenis Well-Known Member

    Reputations:
    77,392
    Joined:
    May 26, 2013
    Messages:
    8,971
    Likes Received:
    15,455
    whats cp?
     
  17. jokeland

    jokeland Well-Known Member VIP

    Reputations:
    6,044
    Joined:
    Dec 19, 2011
    Messages:
    5,236
    Likes Received:
    3,289
    I've gone about as far as I ever want to go in seeing that first beheading video on the regular nets.
     
    Turkeyneck, smichal and JameGumb like this.
  18. alittlebitcunty

    alittlebitcunty Well-Known Member

    Reputations:
    2,743
    Joined:
    Aug 14, 2013
    Messages:
    1,220
    Likes Received:
    656
    How do you find CP unless you're searching it out? I never stumbled upon it accidentally, but I've never been in those parts of the web.
     
    HeyThere likes this.
  19. HowieStearn

    HowieStearn HateClub

    Reputations:
    80,245
    Joined:
    Dec 13, 2011
    Messages:
    14,492
    Likes Received:
    14,268
  20. lilbuddy67

    lilbuddy67 A man with breath-taking anger management issues Banned User

    Reputations:
    86,104
    Joined:
    Aug 23, 2010
    Messages:
    13,275
    Likes Received:
    15,743
    I didn't say I watched it dummy. They have search engine on there, and links that are categorized.And Listal lists with explanations of what the links lead to.It's easy to put two and two together. I don't think you can Google it on the regular Web, not unless you're suicidal.