Changes

Dark Web

506 bytes added, 21:28, 2 April 2019
The following lines were added (+) and removed (-):
Swimming in the dark web, even just out of curiosity, can get you on a government watch list.  The US government's Defense Advanced Research Projects Agency (DARPA) has been working on tools to automatically monitor the dark web.  It isn't just a matter of knowing how to access things on the dark web, but how to anonymously access the dark web so one does not become the victim of crime or subject of investigation just for being curious and poking around a bit.Illustration of a simple example might be made by describing an online forum.  There are many online forums that people can register and join in order to post questions or provide information on topics.  Forums can be read without registration.  However, an online forum that cannot be read or otherwise accessed without registration would be deeper than a typical public forum.  If the forum operator did not provide any public registration mechanism then it would be yet deeper.  If a group of criminals used this forum to communicate about their criminal activity and only provided login access to one another then it would be very deep, and perhaps part of the so called dark web.Illustration of a simple example might be made by describing an online forum.  There are many online forums that people can register and join in order to post questions or provide information on topics.  Typical forums can be read without registration.  However, an online forum that cannot be read or otherwise accessed without registration would be deeper than a typical public forum.  If the forum operator does not provide any public registration mechanism then it would be yet deeper.  If a group of criminals used this forum to communicate about their criminal activity and only provided login access to one another then it would be very deep, and perhaps part of the so called dark web.A small group of criminals with their own online forum which was secure enough to resist being hacked and compromised may continue to have success in facilitating their illegal activity as long as no one member of the criminal group rolls over and becomes an informant.  Law enforcement invasion into this example dark web forum could only be achieved by obtaining access by intimidation of one of the criminal users, forceibly breaking into the forum using cracking techniques that exploit a security flaw in the forum, or sheer carelessness of one of the forum participants exposing information necessary to achieve access relation to police cooperation or cracking the server.   A small group of criminals with their own online forum which is secure enough to resist being hacked and compromised may continue to have success in facilitating their illegal activity as long as no single member of the criminal group "rolls over" and becomes an informant.  Law enforcement invasion into this example dark web forum could only be achieved by obtaining access by (A) intimidation of one of the criminal users, (B) forcibly breaking into the forum using cracking techniques that exploit a security flaw in the forum, or (C) ordinary carelessness of one of the forum participants exposing information necessary to achieve access (via A or B) relating to police cooperation or cracking the server.   Though it should be known that a web based Internet message forum with restricted access is not a common component of the dark web, although it is a real example.  The more serious the criminal activity the more obscure the technology or medium being used to communicate or transact the criminals will utilize.  Lesser known or newly developed communication protocols might be used.  The strongest forums of encryption might be implemented.  Access based on your physical location might be incorporated so that even with the correct username and password, unless you are on a specific machine in a specific place you're still locked out.  Although a real and practical example it should be known that a web based Internet message forum with restricted access is not a common component of the dark web.  The more serious the criminal activity the more obscure the technology or medium being used to communicate or transact the criminals will utilize.  Lesser known or newly developed communication protocols might be used.  The strongest forums of encryption might be implemented.  Access based on your physical location might be incorporated so that even with the correct username and password, unless you are on a specific machine in a specific place you're still locked out.  
Bureaucrat, administrator
16,195
edits