{"id":203753,"date":"2017-07-05T22:51:17","date_gmt":"2017-07-06T02:51:17","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/darknet-101-your-guide-to-the-badlands-of-the-internet-cnet-cnet\/"},"modified":"2017-07-05T22:51:17","modified_gmt":"2017-07-06T02:51:17","slug":"darknet-101-your-guide-to-the-badlands-of-the-internet-cnet-cnet","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/darknet-101-your-guide-to-the-badlands-of-the-internet-cnet-cnet\/","title":{"rendered":"Darknet 101: Your guide to the badlands of the internet &#8211; CNET &#8211; CNET"},"content":{"rendered":"<p><p>Andrew  Brookes\/Getty Images  <\/p>\n<p>    Hacked login details. Cybersecurity exploits for hire. Drugs,    guns and ammo. If there's something shady going on online,    chances are it's happening on the darknet.  <\/p>\n<p>    When Target was hacked in 2013, customer card details     turned up on darknet marketplaces. Hackers have tried to do    the same with     Yahoo login credentials, and details of     O2 phone network customers in the UK.  <\/p>\n<p>    You'll also find     cybercriminals selling security exploits.    Ransomware, anyone?  <\/p>\n<p>    Everything's for sale if you look in the right place. And with    the rise of bitcoin, the \"currency of    choice\" on the darknet, virtually anonymous payments are    easier than ever.  <\/p>\n<p>    Just this week in Australia, a news investigation revealed that    an anonymous darknet user has offered up     access to the Medicare records of \"any Australian\" for just    0.0089 bitcoin ($22, AU$30, 18).  <\/p>\n<p>    That's not to mention the things you really don't want to see.    Europol says the darknet and other peer-to-peer networks are    still the \"main platform\"    for sharing child abuse material.  <\/p>\n<p>    So for those of us used to opening Chrome or Safari to get    online, the darknet is an entirely different beast.    How does it work? How is it different from the \"surface web\"    that we all know? And what do you need to know ahead of time,    should you choose to wade in?  <\/p>\n<p>    The first thing to remember: The darknet is not the same as the    \"deep web.\"  <\/p>\n<p>    The deep web refers to any part of the internet that isn't    discoverable by a search engine. But that doesn't mean it's    suspicious -- there are plenty of sites you visit in your    day-to-day browsing that fall into this category.  <\/p>\n<p>    When you log in to internet banking, you've navigated to a    specific location online, but one that's not served up in    Google results. The same goes for the different pages that pop    up in webmail services, like Gmail, or academic databases on a    university network.  <\/p>\n<p>    It's hard to estimate just how big the deep web is, but the    commonly cited    research (albeit from 2001) puts the deep web at 400 to 550    times the size of the \"surface web.\"  <\/p>\n<p>    If the surface web is the tip of the iceberg and the deep web    is what's below the water, then the darknet is what you'll find    deep in the blackest waters below. The darknet is the network    itself, whereas the dark web is the content that is served up    on these networks.  <\/p>\n<p>    This is where you'll find the kind of marketplaces that ply    their trade in illicit wares -- what security researcher    Brian Krebs    calls the \"hidden crime bazaars that can only be accessed    through special software that obscures one's true location    online.\"  <\/p>\n<p>    The UN noted last    month that although     drug trafficking over the darknet is relatively    modest, drug transactions increased 50 percent annually from    September 2013 to January 2016. And in early 2016, then-US    Attorney General Loretta Lynch    warned that some gun sales were shifting to the dark web to    stay outside the reach of regulations.  <\/p>\n<p>    Anonymity is the key here. Whistleblowers, activists and    political dissidents certainly have good reason to obscure    their online location and post with anonymity on the deep web    and the darknet, but that level of secrecy is also sought by    criminals.  <\/p>\n<p>    This isn't just a matter of heading to \"darknet.com\" and having    a snoop -- you'll need specific software and a dedicated    browser. The Tor software (and    its dedicated Tor Browser) is probably the most famous of    these, though there are others, including I2P and Freenet.  <\/p>\n<p>    Using software originally known as The Onion Router (think    layers and layers of encryption), Tor secures traffic by    routing it through a network of secure relays that anonymize    traffic. These relays are run by volunteers around the world    who donate their server bandwidth.  <\/p>\n<p>    Think of it as a network of safe houses: You travel through    underground tunnels that run along the lines of the streets    above, and you pop out where you want using safe houses donated    by fellow network users.  <\/p>\n<p>    But with links on the darknet typically just alphanumeric    strings of nonsense (think kwyjibo.onion) it can be very hard    to know what you're getting.  <\/p>\n<p>    It's important to remember that Tor isn't illegal software,    just as torrenting software doesn't do anything illegal    until you use it for sharing pirated movies. Tor says plenty    of\"normal people\" use its    service, as well as citizen journalists, whistleblowers,    law enforcement agencies and, according toHuman Rights    Watch, Chinese dissidents. Tor estimates that    onlyabout 4 percent    of trafficover its network is for hidden services (or    dark web content); the rest is people accessing regular    internet sites with greater anonymity.  <\/p>\n<p>    Still, wherever you have anonymous traffic on hidden networks,    the criminal activity will follow.  <\/p>\n<p>    It's the darknet after all -- be careful what you click    for.  <\/p>\n<p>    Tech    Culture: From film and television to social media    and games, here's your place for the lighter side of tech.  <\/p>\n<p>    Batteries    Not Included: The CNET team shares experiences    that remind us why tech stuff is cool.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.cnet.com\/au\/news\/darknet-dark-web-101-your-guide-to-the-badlands-of-the-internet-tor-bitcoin\/\" title=\"Darknet 101: Your guide to the badlands of the internet - CNET - CNET\">Darknet 101: Your guide to the badlands of the internet - CNET - CNET<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Andrew Brookes\/Getty Images Hacked login details.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/darknet-101-your-guide-to-the-badlands-of-the-internet-cnet-cnet\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-203753","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/203753"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=203753"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/203753\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=203753"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=203753"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=203753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}