SlideShare a Scribd company logo
1 of 32
Download to read offline
1
DARKNET – THE ESSENTIAL GUIDE
“It will continue to grow, because it makes things more convenient”
Jonathan Jedrasiak
2
TABLE DE MATIÈRES
Introduction ...........................................................................................................................4
The Darknet and its technical aspects ...................................................................................5
Who invented the term of Darknet? .....................................................................................5
How to correctly define the Darknet? ...................................................................................5
How does it work? .................................................................................................................6
TOR.........................................................................................................................................7
Who is using Tor?...................................................................................................................7
What’s so special about TOR? ...............................................................................................8
What is the purpose of Darknet?...........................................................................................9
What is the difference between Peer to Peer (P2P) and traditional networking? .............10
Why do P2P networks work so well?...................................................................................10
Are P2P users traceable? .....................................................................................................11
Examples of Peer-to-Peer Networks....................................................................................11
What is F2F?.........................................................................................................................12
What is the main goal of so called darknets?......................................................................12
What is Freenet?..................................................................................................................13
What differs Freenet from normal P2P networks? .............................................................13
How is the situation regarding Copyright? ..........................................................................13
Does copyright work? ..........................................................................................................14
The Darknet: a practical approach.......................................................................................15
What are the advantages of using this infrastructure?.......................................................15
Where are advantages, there always must be disadvantages, what are these? ................15
One may question himself, what are the implications of Darknet to e-commerce?..........15
is there a war going on against this business? ....................................................................16
How did Ross Ulbricht get caught knowing his skills? .........................................................17
What should other platforms like Agora Market do to fill the gap and to stay anonymous?17
What happened to Silkroad? ...............................................................................................18
3
Can a person be identified?.................................................................................................18
Darknet is virtually impossible to control............................................................................19
Are those places safe? .........................................................................................................20
What awaits us in the future? .............................................................................................21
So what to do? .....................................................................................................................21
Conclusion............................................................................................................................23
Appendix ..............................................................................................................................24
Sources.................................................................................................................................25
Ross Ulbricht’s court exhibit................................................................................................29
4
INTRODUCTION
This paper will present you the Darknet from a simple observational point of view. Its goal is to
explain the multiple layers that make such a network possible. At first we will learn how Darknet
works from a technical angle, than what are the functionalities and benefits of such a network in
our society.
Inventions like the Darknet have often as source the need to protect against something, in this
particular case, Darknet was created by the military in order to make anonymous
communications from countries at war. We will see that this invention derived into a huge
network of people who now exchange knowledge, confidential information, but also illegal goods
like weapons or drugs.
5
THE DARKNET AND ITS TECHNICAL ASPECTS
In order to have a better understanding how Darknet works and what are the implications of
using such a network, we will first of all see how it is defined and what are the tools used to get
a secure access.
WHO INVENTED THE TERM OF DARKNET?
When we talk about the Darknet we refer to the underground Internet. But where does this
definition come from? Four senior Microsoft workers wrote an influential paper in 2002 entitled
“The Darknet and the Future of Content Distribution”, which made quite a buzz. This term got
known by more and more people until reaching the mainstream that defines the Darknet as an
agglomeration of clandestine and illicit activities using the Internet. The Darknet nowadays
evokes nebulous and even threatening activities on private, anonymous networks including
illegal share of copyrighted files.1
HOW TO CORRECTLY DEFINE THE DARKNET?
The Darknet is a distribution network available to a fraction of internet users that non-exclusively
leak popular and interesting content into the web.
More precisely, it is a collection of non-indexed webpages hidden in the underground of the
web.2 This means in other words that they cannot be found on a normal search engine like Google
or Yahoo. Why so? Well, most of these webpages are completely illegal and are not supposed to
1
How 4 Microsoft engineers proved that the « darknet » would defeat DRM, http://arstechnica.com/tech-
policy/2012/11/how-four-microsoft-engineers-proved-copy-protection-would-fail/
2
[DARKNET] Comment je l’ai découvert et comment y accéder, http://www.parlonsgeek.com/darknet-le-web-
profond/
6
be found by everyday internet users. The Darknet is also called “friend-to-friend network”3,
because people on the the Darknet are presumed to be trustful. In order to find webpages within
the Darknet you have to use customized search engines like Clusty, Scirus or you can use the
default Tor search engine that has some hundred thousands of pages listed, which is not bad for
a start.4 Estimations from 2013 say they might be more than 600TB of data hidden in the
shadows.5
HOW DOES IT WORK?
All websites hidden in the Darknet finish by
“.oignon”, it is a specific suffix from a browser
called Tor. In order to access them you need to
install this navigator that is based on the Firefox
navigator, but having unique features.6 More
precisely, this navigator makes it possible to connect from one pc to another one using a proxy
connection, so that authorities are not able to backtrack the user. Adepts of these kind of hobbies
also use the virtual currency called “Bitcoin”7. This currency allows to make transactions between
3
Private Communication Through a Network of Trusted Connections : The Dark Freenet,
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8&ved=0CEcQFjAHahUKEwiBv-
L0mLXIAhXDvhQKHXfnD2g&url=https%3A%2F%2Ffreenetproject.org%2Fpapers%2Ffreenet-0.7.5-
paper.pdf&usg=AFQjCNE4RIW2_WAHycZVhWYROfF_VyF02Q&sig2=bAf6fa9YaEy52emCuQ8cDA&cad=rja
4
Five search engines for exploring the darknet / deep web, http://www.depotekk.com/2015/02/five-search-
engines-for-exploring.html
5
Forensic Memory Dump Analysis And Recovery Of The Artifacts Of Using Tor Bundle Browser – The Need,
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8&ved=0CEcQFjAHahUKEwiBv-
L0mLXIAhXDvhQKHXfnD2g&url=https%3A%2F%2Ffreenetproject.org%2Fpapers%2Ffreenet-0.7.5-
paper.pdf&usg=AFQjCNE4RIW2_WAHycZVhWYROfF_VyF02Q&sig2=bAf6fa9YaEy52emCuQ8cDA&cad=rja
6
How to use the Tor Browser to surf the web anonymously, http://www.pcworld.com/article/2686467/how-to-use-
the-tor-browser-to-surf-the-web-anonymously.html
7
Dark Net Drug Sales Using Bitcoins Are Booming After Fall Of Silk Road Marketplace, http://www.ibtimes.com/dark-
net-drug-sales-using-bitcoins-are-booming-after-fall-silk-road-marketplace-1960833
7
two virtual wallets without the capability to track who send the money to who, very handy to
stay anonymous.8
TOR
The Tor network allows people to navigate through the Internet in a more secure and anonymous
way thanks to volunteer-operated servers around the globe. The main idea is to connect through
a series of virtual tunnels in order to hide who connects and from where.
People who use Tor benefit from not getting tracked by websites. Thanks to Tor it is also possible
to publish websites and other services without getting located. This is crucial in order to develop
an active community. Software developers also find their interest in this network, they can work
together without getting tracked either. Social sensitive information can be communicated
through private chat rooms and forums.9
WHO IS USING TOR?
Well, not as you may think, Tor is not only used by criminals. The truth is Tor is very useful to
journalists.10 Indeed they communicate with ease with whistleblowers and dissidents. When this
network got created, one of the most important ideas was to ensure free speech. There are
countries where you cannot express yourself and the deep web gets in handy.
NGO’s members use Tor to connect to their websites and communicate with the services
avoiding everybody around them knowing that they’re working with that given organization.
Activist groups use Tor in order to keep their members safe while organizing themselves.
8
How To Use Bitcoin Anonymously, http://cryptorials.io/how-to-use-bitcoin-anonymously/
9 https://www.torproject.org/about/overview
10
https://freedom.press/bundle/encryption-tools-journalists
8
Even the US Navy uses Tor, their mission is to gather open source intelligence.
It is the variety of users that makes Tor such a good performing network. In other words, the
more crowded the Tor network is and the more diverse it is, the more anonymous it becomes. It
is also important to keep in mind that using TOR is completely legal, it only depends what you do
with it that can make it illegal. You can for example just browse on normal internet in order to
avoid being tracked by robots.
WHAT’S SO SPECIAL ABOUT TOR?
This infrastructure is working on the same principle as the internet itself, it only has some
fundamental differences. The most outstanding ones are the fact that it is an anonymous and
decentralized network that cannot be controlled by a single individual.11 These are the main
reasons why people tend to use TOR in order to navigate on the Darknet.
11
Deterministic Builds Part Two: Technical Details, https://blog.torproject.org/category/tags/decentralization
9
WHAT IS THE PURPOSE OF DARKNET?
Like you may imagine, Darknet is full of illegal things, this is why the most of the community are
hackers, outlaws, drug or weapon dealers, criminals, but also socio-phobic people that don’t
want to get their private life touched. In order to be untouched, they try to stay anonymous by
using this encrypted way to access information and exchange between two individuals. One of
the most known sites in the history of Darknet is silkroad. It is an anonymous market allowing to
buy illegal drugs, weapons, stolen credit cards, forbidden literature, high tech used to steal
personal information, but you can also hire people to kill someone or deliver goods or do any
kind of things. Some people call this site “the ebay of drugs”.12
12
Silkroad, http://silkroaddrugs.org/silkroad/
10
WHAT IS THE DIFFERENCE BETWEEN PEER TO PEER (P2P) AND TRADITIONAL
NETWORKING?
Before, computers were easily identifiable because using a server-client relation in which you
had to know an URL or IP-address in order to access the uploaded content. All sort of media files
were stored on the server (host) and could be accessed by the client (user) through websites
using internet. The client was not able to directly exchange files with other clients. A P2P network
allows all clients to share media between each other.13 There is no central server storing the files,
all exchanges are between the users that give authorization to download from or to them
directly.14
In order to exchange files in P2P networks, specific software is required. This application
establishes a connection between all users adding the possibility to chat, write comments or look
what’s on other peoples PC’s.15
WHY DO P2P NETWORKS WORK SO WELL?
Open distribution of free content is an immensely valuable method to encourage creation and
dissemination of user content. P2P is also economically very efficient since there is no main server
base. All the network cost is divided by the number of users. Equally, the more users are on a P2P
network, the more files can be browsed. And the more users are online, the bigger the capacity
of the network.16 Also networks are not limited on bandwidth, the data transfer can be very fast
13
David Barkai, An Introduction in Peer-to-Peer Computing, INTEL DEVELOPPER MAG, Feb. 2000, at 1, 3.
14
Androutsellis-Theotokis, supra note 14, at 337.
15
What You Ned To Know About Peer-to-Peer File Sharing, http://www.zonealarm.com/blog/2014/06/what-you-
need-to-know-about-peer-to-peer-file-sharing/
16
Niva Elkin-Koren, Making Technology Visible: Liability of Internet Service Providers for Peer-to-Peer Traffic, 9
N.Y.U.J. LEGIS. PUB. POL’Y 15, 22 (2006).
11
and is independent of a given server. A traditional client/server model has limited capacities. We
can tell that Peer-to Peer networks improve quality of publicly available content.
Providers have a hard time shutting down decentralized servers because they are not able to
supervise activity and remove illicit content. Infringing content and users stay free and untouched
from the system. Those networks also often function on open-source code so even if someone is
able to shut it down, there are copied available to put it back on track immediately.
ARE P2P USERS TRACEABLE?
Yes, it all started then Gnutella and BitTorrent administrators created a protocol that allowed
them to know which user was uploading how much. All this to equally redistribute bandwidth
between users because there were people only downloading and never uploading and this was
counterproductive. The content industry got interested and started to target entities like Napster
and then ordinary citizens. That’s when P2P developers started to protect users with security,
anonymity and privacy and the Darknet was born.17
EXAMPLES OF PEER-TO-PEER NETWORKS
In order to better illustrate how peer to peer networks work, we will briefly see what the two
most known networks are.
NAPSTER
This service got introduced in 1999 and started mass peer-to-peer exchange. Audio files were
transferred infringing the copyright law. The specificity of this platform was that users were
allowing other users to access their content that was situated on their PC’s. With a simple search
17
MIKA SUVANTO, PRIVACY IN PEER-TO-PEER NETWORKS, 3 (2010)
12
and click it was possible to listen to the desired song. This new trend should have been used in
the legal music industry, but unfortunately they missed the trend.18
GNUTELLA
Gnutella is a protocol created the 14th march 2000 that was complementary to Napster. Knowing
that Napster was already on the radar and received lots of negative criticism, Gnutella was
supposed to fix several problems. The service got centralized and every user had to pay a certain
fee in order to access the files.19
WHAT IS F2F?
Friend to Friend or F2F is a term used by Darknet users to describe how their file sharing method
works. Actually in order to establish direct connections and share files with other persons you
must be trusted. So there will be no sharing with untrusted individuals.20
WHAT IS THE MAIN GOAL OF SO CALLED DARKNETS?
The idea is to create a closed network that enables secured communication defying detection
and penetration of unwanted public. Once inside the network you can freely download and
upload whatever suits your needs anonymously without getting identified by an outsider.21 This
means that darknet users are difficult or even impossible for outsiders to discover.
18
Hören, was die Freunde hören, http://www1.wdr.de/themen/archiv/stichtag/stichtag8360.html
19
Gnutella VS. Freenet,
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&ved=0CEEQFjAFahUKEwjhqraworXIAhUJ
fhoKHX71CEY&url=https%3A%2F%2Fwww-vs.informatik.uni-
ulm.de%2Fteach%2Fws06%2Fp2p%2Ftalks%2Fpapers%2Fhein.pdf&usg=AFQjCNFjpRTGWyoHXupMELymCZgCzYnn
uA&sig2=3-WTBhItyXR1hGOwL3YPlA&cad=rja
20
Freenet, http://gentoo-en.vfose.ru/wiki/Freenet
21
Johan A. Pouwelse et al., Pirates and Samaritians: a Decde of Measurements on Peer Production and Their
Implications for Net Neutrality and Copyright, 32 TELECOMMS. POL’Y 701, 711 (2008)
13
WHAT IS FREENET?
Freenet is one on the first Darknets that got introduced by In Clake who presents it by the
following: “The primary goal of this Darknet is to protect political opponents of repressive
regimes”. 22 His main idea is that without anonymity there will be no freedom of speech and
without decentralization no guarantee that the network is going to stay up all the time. He also
believes that copyright infringement is “an inevitable consequence of the design”. 23
WHAT DIFFERS FREENET FROM NORMAL P2P NETWORKS?
This software is capable of running millions of connections simultaneously. The security aspect is
widely developed, in order to ensure security the user has the choice to choose with whom he
connects with. There is no automatic connection like in P2P. This means that not only this
network is protected from outsiders but also restricted inside which makes it extremely hard to
find the identity of a given user.24
HOW IS THE SITUATION REGARDING COPYRIGHT?
Like John Perry Barlow once said: “Legal efforts to keep the old boat floating are taking three
forms: a frenzy of deck chair rearrangement, stem warnings to the passengers that if she goes
down, they will face harsh criminal penalties, and serene, glassy-eyed denial.”25 He also affirms
that pursuing someone for his crimes is only possible if you can clearly identify the infringer and
the infringing activity. Since Darknets are private and anonymous, file use is not traceable. Even
22
John markoff, File Shareres Anonymous: Building a Net That’s Provate, N:Y: TIMES, 2005
23
John markoff, File Shareres Anonymous: Building a Net That’s Provate, N:Y: TIMES, 2005
24
Is Freenet more secure and anonymous than Tor?, https://www.quora.com/Is-Freenet-more-secure-and-
anonymous-than-Tor
25
Aric Jacover, Note, I want my MP3 ! Creating a Legal and Practical Scheme to Combat Copyright Infringement on
Peer-to-Peer Internet Applications, 90 GEO.L.J.2207,2208 (2002).
14
service providers have no access to the traffic since these networks are secured and blocking any
external intrusion. We came up to a point where it is very hard to find the responsible individuals.
DOES COPYRIGHT WORK?
The purpose of copyright is to effectively protect user content creation and so for encourage
creativity. In order to ensure the effectiveness of copyright protection so called TPM’s
(technological protection measures) got developed. The only problem with those protection
measures is that once they are unlocked they are useless. It is enough that one expert hacker
“cracks” the code and “leaks” the content to the public and the TPM has become ineffective. So
practically digital copyright management is not a very efficient way of protection, stronger
measures should be applied in order to ensure copyright owners to express their creativity. The
problem is, the more the content gets protected and the more the need of Darknet will be
accentuated.26
26
Technological Protection Measures, http://www.smartcopying.edu.au/copyright-guidelines/hot-
topics/technological-protection-measures
15
THE DARKNET: A PRACTICAL APPROACH
In this part, we will try to get a better understanding of the implications that Darknet has to our
society and more precisely to the users that spend their free time on illegal sites.
WHAT ARE THE ADVANTAGES OF USING THIS INFRASTRUCTURE?
In the early stages Darknet was used to make undercover military communications possible.
First of all, users of Darknet benefit from a very strong privacy level. This is because, if done well,
they are untraceable. This allows them to access content without any restrictions, there are no
filters, you can find about anything imaginable on this web. You have freedom, anything you want
to see or personally share is available. Working alone is not a problem, you have full
independence in an unbiased environment.
WHERE ARE ADVANTAGES, THERE ALWAYS MUST BE DISADVANTAGES, WHAT ARE
THESE?
Not only dangerous objects like weapons or drugs are sold, but you will also have access to child
pornography, illegal matters, terrorists and other trafficking rings. If you decide to buy or sell
anything on this platform you risk high bills and imprisonment.
ONE MAY QUESTION HIMSELF, WHAT ARE THE IMPLICATIONS OF DARKNET TO E-
COMMERCE?
Since all transactions are made anonymously, the notion of security is different. In a normal
cyber-environment, people are not well informed of all the risks that the internet is presenting
and are open to get hacked. That is why professionals of the e-commerce domain ensure more
16
or less bulletproof security and traceability of customers in financial transactions. But there is
more, they tend to prevent any hacker-attack, malware, spyware etc.27
IS THERE A WAR GOING ON AGAINST THIS BUSINESS?
In March 2014 no less than 17 people responsible of creating black-market sites were arrested
thanks to the European police office Europol. This action was able to close 414 dangerous
websites and scared with no doubt some of the Darknet users.28 The mission was to stop selling,
distribution and promotion of illegal objects like weapons or drugs. This action has shown that
those criminals are not invincible, it is a great way to calm things down.
29
27
Bitcoin, the Darknet Economy, and the Low Over-Head Revolution, http://c4ss.org/content/11718
28
Darknet: Vaste opération de police contre les responsables de marchés noirs sur internet,
http://www.20minutes.fr/monde/1477227-20141107-darknet-vaste-operation-police-contre-responsables-
marches-noirs-internet
29
Memex – Le moteur d’exploration du DarkNet de la DARPA, http://www.undernews.fr/reseau-securite/memex-
le-moteur-dexploration-du-darknet-de-la-darpa.html
17
As we can see on the above image, advanced tools are used by the legal forces to better
understand what is going on in the deep web. Millions of dollars are spend hoping that thanks
to Big Data analysis, we will be able to stop all illegal activity in the Internet.
This year, Ross Ulbricht, the creator of silkroad got sentenced. Convicted of all 7 charges held
against him, he should spend his life in prison.30
Since the entire population saw Ross Ulbricht getting arrested by the FBI for being the creator of
the biggest Darknet platform called Silkroad, two main questions emerged:
HOW DID ROSS ULBRICHT GET CAUGHT KNOWING HIS SKILLS?
As we know, Ross Ulbrecht was a genius in his specialty. Nevertheless he got caught by the FBI.
How come? Well he made several mistakes:
- He used to have a LinkedIn profile in which he mentioned indirectly the existence of SilkRoad. He
wrote on this profile that he was working on an “ economic simulation’ designed to ‘give people
a first-hand experience of what it would be like to live in a world without the systemic use of force’
by institutions and governments”31
- Even having a fake ID, he was using his real photograph while renting servers for his illegal
activities.
- He once asked a question using his real name in order to find a solution to connect to a Tor hidden
service using curl in php.
- He paid 80.000$ to kill a person, to an undercover cop…32
WHAT SHOULD OTHER PLATFORMS LIKE AGORA MARKET DO TO FILL THE GAP AND TO STAY
ANONYMOUS?
30
Silkroad mastermind Ross Ulbricht convicted of all 7 charges, http://www.wired.com/2015/02/silk-road-ross-
ulbricht-verdict/
31
Five stupid things Dread Pirate Roberts did to get arrested,
http://www.theguardian.com/technology/2013/oct/03/five-stupid-things-dread-pirate-roberts-did-to-get-arrested
32
Silk Road’s mastermind allegedly paid $80,000 for a hitman. The hitman was a cop,
https://www.washingtonpost.com/news/the-switch/wp/2013/10/02/silk-roads-mastermind-allegedly-paid-80000-
for-a-hitman-the-hitman-was-a-cop/
18
As the FBI published details about how they got to Ross Ulbricht, things got clearer. The main
idea was to find relative information on Google from before founding the site in February 2011.
The FBI has found messages, forum threats and similar about a person trying to see if a bitcoin
only marketplace would work and who would like to work with him. The problem was, he was
using his personal e-mail address while posting help wanted messages on the internet.
Consequences are that free users and especially owners of such platforms got more careful. It
seems that business on those marketplaces only gets bigger since Silkroad got closed. Indeed,
Agora Market added more levels of security and so customers feel more secure and that for
encouraged to make traffic happen.
WHAT HAPPENED TO SILKROAD?
The Silkroad is a website where you can buy all sort of illegal products and services. This site got
closed in 2013 by the FBI but reopened only 4 weeks later and all the users came back in no-time.
That’s why a second attempt was needed to finally close this black market. The FBI, with the help
of Europol and Eurojust, arrested the creator of this website, however all the clients were free,
so they just migrated to other market sites.
CAN A PERSON BE IDENTIFIED?
The question that a lot of people must be asking themselves is if it is possible to backtrack the
activities in order to get to the user.33 In reality yes, 90% of users that get caught made a mistake.
The system works very well, but people make mistakes. For example, if a user connects to his
33
Anonymity on the Internet: Darknet,
www.it.uu.se/edu/course/homepage/sakdat/ht06/assignments/pm/programme/ljunggren.pdf
19
deepweb email via a normal connection, he got exposed and can be found. This is one of many
examples of how to get caught.34
The authorities say that thanks to the LOPPSI II law (Loi n° 2011-267 du 14 mars 2011
d’orientation et de programmation pour la performance de la sécurité intérieure), a mal
ware (most often Trojan) can be introduced to some users to find out what they are typing on
their keyboard.
DARKNET IS VIRTUALLY IMPOSSIBLE TO CONTROL.
One noticeable change in the digital world is that internet users no longer passively consume
media. These days, they participate actively and create tons of content. They also choose what
to watch, where and with whom. Web 2.0 makes is all possible, forums, social media, wikis,
search engines, etc., are all technologies that make it possible to interact with others. Peer to
Peer fits perfectly into this combination.
34
Dark Net 101, http://askthecomputerguy.com/opinions/dark-net-101/
20
Here you can find a listed enumeration of the most
known black market sites on the internet and their
availability. Like you can see, there are many sites,
not only Silkroad was active but lots of others.
ARE THOSE PLACES SAFE?
Well, no! You can get scammed like with the example of the Age of Evolution marketplace. They
closed and kept over 40.000BTC which represents about 12M dollars.
21
Other scams taken place in the past, like the sheep marketplace scam. A Czech user has
apparently stolen a big amount of Bitcoins from the owner of the marketplace. But he got
exposed using the same IP address as the sheepmarketplace.com.
WHAT AWAITS US IN THE FUTURE?
The problem is, one big fish got caught, but new actors already appear in the market. New
websites more powerful and more diverse like Agora and Evolution are already online. As long as
there is interest in exchanging illegal things, people will find a way to make it possible. Stopping
some providers will certainly slow down the growing process, but in the end as long there is
internet, there will be Darknet. People that are in this kind of activity learn fast, there is no doubt
some of the bigger online drug lords were watching the trial of Ross Ulbricht in order to learn
what mistakes had been done. It is difficult to predict when the next one will get caught.
SO WHAT TO DO?
Darknet is one of many phenomenons that we can observe in the world. In order to find the
answer to this question we have to ask ourselves why it is so popular and observe the evolution.
We have a number of facts, for instance we cannot just close all the networks and even if we do
there will be new ones coming. So in order to get rid of all illegal activity on the internet we would
have to shut the whole internet down. But then again, exclusive underground networks could
emerge, because technology and money is not the problem. That means there is no way of
eradicating illicit activities on the internet. This means that we have to adapt.
We could see on the example of Ulbrecht’s arrest and the shutdown of Silkroad that immediately
after this event new marketplaces got opened. Those last ones being even more protected and
anonymous than the one before. So it is all a question of finding the right balance between
22
copyright protection and free access of user content. If legal restrictions get to stiff more and
more interest will grow in Darknet. On the other hand, the more liberty we give, the less content-
creators get encouraged to public their work in order to gain money. We can also add, the more
protection there is, and the less sophisticated the given product is. If there is no need for
bulletproof security, the producers will not create advanced technology and so the security will
not be well developed.
23
CONCLUSION
As we saw Darknet is a strong creation that not only is dangerous to individuals, but also to
economic activity. Darknet can be considered like an everlasting model. It’s a low cost, high-
quality service that will always be going to be competitive against legal commerce. From an
economic point of view, the Darknet can be considered like a business model that offers the same
product as the concurrence, here legal commerce, but for free. What do legal vendors tend to
do? They think that by making their products more and more secured they will get their clients
back. Well, big mistake, in order to compete with Darknet, they have to fight on the same level,
that means, they have to make their products more convenient and low cost. Legal forces are
working on it to stop this huge marketplace and special team observe the Darknet in big numbers.
The more we can learn about it the better we can anticipate next steps and prepare for the worst.
Even if there is a predominant cr4iminal purpose to it, we could also observe the use of it in cases
like freedom of speech, communication from endangered zones or a communication tool for
journalists and socio-phobic people. Since we already know that Darknet will always exist and get
bigger and bigger, why not to try and converge it into a less dangerous space?
24
APPENDIX
 Sources
 PowerPoint presentation about Darknet (in French)
 Ross Ulbricht’s court exhibit
25
SOURCES
1How 4 Microsoft engineers proved that the « darknet » would defeat DRM, http://arstechnica.com/tech-
policy/2012/11/how-four-microsoft-engineers-proved-copy-protection-would-fail/
1 [DARKNET] Comment je l’ai découvert et comment y accéder, http://www.parlonsgeek.com/darknet-le-web-
profond/
1 Private Communication Through a Network of Trusted Connections : The Dark Freenet,
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8&ved=0CEcQFjAHahUKEwiBv-
L0mLXIAhXDvhQKHXfnD2g&url=https%3A%2F%2Ffreenetproject.org%2Fpapers%2Ffreenet-0.7.5-
paper.pdf&usg=AFQjCNE4RIW2_WAHycZVhWYROfF_VyF02Q&sig2=bAf6fa9YaEy52emCuQ8cDA&cad=rja
1 Five search engines for exploring the darknet / deep web, http://www.depotekk.com/2015/02/five-search-
engines-for-exploring.html
1 Forensic Memory Dump Analysis And Recovery Of The Artifacts Of Using Tor Bundle Browser – The Need,
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8&ved=0CEcQFjAHahUKEwiBv-
L0mLXIAhXDvhQKHXfnD2g&url=https%3A%2F%2Ffreenetproject.org%2Fpapers%2Ffreenet-0.7.5-
paper.pdf&usg=AFQjCNE4RIW2_WAHycZVhWYROfF_VyF02Q&sig2=bAf6fa9YaEy52emCuQ8cDA&cad=rja
1 How to use the Tor Browser to surf the web anonymously, http://www.pcworld.com/article/2686467/how-to-use-
the-tor-browser-to-surf-the-web-anonymously.html
1 Dark Net Drug Sales Using Bitcoins Are Booming After Fall Of Silk Road Marketplace,
http://www.ibtimes.com/dark-net-drug-sales-using-bitcoins-are-booming-after-fall-silk-road-marketplace-
1960833
1 How To Use Bitcoin Anonymously, http://cryptorials.io/how-to-use-bitcoin-anonymously/
1 https://www.torproject.org/about/overview
1 https://freedom.press/bundle/encryption-tools-journalists
1 Deterministic Builds Part Two: Technical Details, https://blog.torproject.org/category/tags/decentralization
1 Silkroad, http://silkroaddrugs.org/silkroad/
1 David Barkai, An Introduction in Peer-to-Peer Computing, INTEL DEVELOPPER MAG, Feb. 2000, at 1, 3.
1 Androutsellis-Theotokis, supra note 14, at 337.
1 What You Ned To Know About Peer-to-Peer File Sharing, http://www.zonealarm.com/blog/2014/06/what-you-
need-to-know-about-peer-to-peer-file-sharing/
1 Niva Elkin-Koren, Making Technology Visible: Liability of Internet Service Providers for Peer-to-Peer Traffic, 9
N.Y.U.J. LEGIS. PUB. POL’Y 15, 22 (2006).
1 MIKA SUVANTO, PRIVACY IN PEER-TO-PEER NETWORKS, 3 (2010)
26
1Hören, was die Freunde hören, http://www1.wdr.de/themen/archiv/stichtag/stichtag8360.html
1 Gnutella VS. Freenet,
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&ved=0CEEQFjAFahUKEwjhqraworXIAhUJ
fhoKHX71CEY&url=https%3A%2F%2Fwww-vs.informatik.uni-
ulm.de%2Fteach%2Fws06%2Fp2p%2Ftalks%2Fpapers%2Fhein.pdf&usg=AFQjCNFjpRTGWyoHXupMELymCZgCzYnn
uA&sig2=3-WTBhItyXR1hGOwL3YPlA&cad=rja
1 Freenet, http://gentoo-en.vfose.ru/wiki/Freenet
1 Johan A. Pouwelse et al., Pirates and Samaritians: a Decde of Measurements on Peer Production and Their
Implications for Net Neutrality and Copyright, 32 TELECOMMS. POL’Y 701, 711 (2008)
1 John markoff, File Shareres Anonymous: Building a Net That’s Provate, N:Y: TIMES, 2005
1 Is Freenet more secure and anonymous than Tor?, https://www.quora.com/Is-Freenet-more-secure-and-
anonymous-than-Tor
1 Aric Jacover, Note, I want my MP3 ! Creating a Legal and Practical Scheme to Combat Copyright Infringement on
Peer-to-Peer Internet Applications, 90 GEO.L.J.2207,2208 (2002).
1 Technological Protection Measures, http://www.smartcopying.edu.au/copyright-guidelines/hot-
topics/technological-protection-measures
1 Bitcoin, the Darknet Economy, and the Low Over-Head Revolution, http://c4ss.org/content/11718
1 Darknet: Vaste opération de police contre les responsables de marchés noirs sur internet,
http://www.20minutes.fr/monde/1477227-20141107-darknet-vaste-operation-police-contre-responsables-
marches-noirs-internet
1 Memex – Le moteur d’exploration du DarkNet de la DARPA, http://www.undernews.fr/reseau-securite/memex-le-
moteur-dexploration-du-darknet-de-la-darpa.html
1 Silkroad mastermind Ross Ulbricht convicted of all 7 charges, http://www.wired.com/2015/02/silk-road-ross-
ulbricht-verdict/
1 Five stupid things Dread Pirate Roberts did to get arrested,
http://www.theguardian.com/technology/2013/oct/03/five-stupid-things-dread-pirate-roberts-did-to-get-arrested
1 Silk Road’s mastermind allegedly paid $80,000 for a hitman. The hitman was a cop,
https://www.washingtonpost.com/news/the-switch/wp/2013/10/02/silk-roads-mastermind-allegedly-paid-80000-
for-a-hitman-the-hitman-was-a-cop/
1 Anonymity on the Internet: Darknet,
www.it.uu.se/edu/course/homepage/sakdat/ht06/assignments/pm/programme/ljunggren.pdf
1 Dark Net 101, http://askthecomputerguy.com/opinions/dark-net-101/
27
POWERPOINT PRESENTATION ABOUT DARKNET (IN FRENCH)
The dark side of the web
What is Darknet and how does it work?
• Collection of non-indexed webpages
• More than 600TB of illegal data
• Need of using a custom search engine like Clusty or Scirus
• Specific navigator called TOR is necessary
How does is work?
28
What is the purpose of it?
Gathering place for
• Hackers
• criminals
• weapon and drug dealers
• Headhunters
• socio-phobic people
Place to exchange
• Drugs
• Weapons
• Humans
• Smuggles goods
• Human organs
• Illegal litterature
• Pictures / videos
How to fight against it?
March 2014
• 17 people got arrested
• 414 illegal websites got closed
• Europol fights against:
• Selling
• Distribution
• Promotion
04 january 2015
• Ross Ulbricht guilty!
• Creator of silkroad
What awaits us in the future?
• Silkroad got replaced by Agora and Evolution
• As long as there is interest, people will make it possible
• Caution is advised: those people are smart!
29
ROSS ULBRICHT’S COURT EXHIBIT
30
31
32

More Related Content

Viewers also liked

Friends design studio on Startup Village
Friends design studio on Startup VillageFriends design studio on Startup Village
Friends design studio on Startup VillageNina Itova
 
Mir Pasternaka B.L.
Mir Pasternaka B.L.Mir Pasternaka B.L.
Mir Pasternaka B.L.viktoriay
 
Spisdegfrisk / test / pdf
Spisdegfrisk / test / pdfSpisdegfrisk / test / pdf
Spisdegfrisk / test / pdfSven Casavitas
 
10 шагов кросс-канального аудита UX.
10 шагов кросс-канального аудита UX. 10 шагов кросс-канального аудита UX.
10 шагов кросс-канального аудита UX. Svetlana Tsikoza
 
东南快报东快网简介
东南快报东快网简介东南快报东快网简介
东南快报东快网简介mumian
 
Annual report 2012 2013
Annual report 2012 2013Annual report 2012 2013
Annual report 2012 2013ciplc
 
Luonto ja Raamattu
Luonto ja RaamattuLuonto ja Raamattu
Luonto ja RaamattuPanu Pihkala
 
Martial Martin Négociales
Martial Martin NégocialesMartial Martin Négociales
Martial Martin NégocialesMartial Martin
 
WebSite Evaluating
WebSite EvaluatingWebSite Evaluating
WebSite EvaluatingCarr Tamara
 
Внешняя оптимизация сайта
Внешняя оптимизация сайтаВнешняя оптимизация сайта
Внешняя оптимизация сайтаzaharec
 
Boostapal where it all starts
Boostapal   where it all startsBoostapal   where it all starts
Boostapal where it all startsBoostapal
 
II-SDV 2015, 20 - 21 April, in Nice
II-SDV 2015, 20 - 21 April, in NiceII-SDV 2015, 20 - 21 April, in Nice
II-SDV 2015, 20 - 21 April, in NiceDr. Haxel Consult
 
Графический пакет
Графический пакетГрафический пакет
Графический пакетMKoryakina
 
Gazette numéro 1 - Jeudi 15 Otobre 2014
Gazette numéro 1 - Jeudi 15 Otobre 2014Gazette numéro 1 - Jeudi 15 Otobre 2014
Gazette numéro 1 - Jeudi 15 Otobre 2014olivier
 

Viewers also liked (19)

Casting a Wider Net(work)
Casting a Wider Net(work)Casting a Wider Net(work)
Casting a Wider Net(work)
 
Achieving better results
Achieving better resultsAchieving better results
Achieving better results
 
Friends design studio on Startup Village
Friends design studio on Startup VillageFriends design studio on Startup Village
Friends design studio on Startup Village
 
Mir Pasternaka B.L.
Mir Pasternaka B.L.Mir Pasternaka B.L.
Mir Pasternaka B.L.
 
Spisdegfrisk / test / pdf
Spisdegfrisk / test / pdfSpisdegfrisk / test / pdf
Spisdegfrisk / test / pdf
 
10 шагов кросс-канального аудита UX.
10 шагов кросс-канального аудита UX. 10 шагов кросс-канального аудита UX.
10 шагов кросс-канального аудита UX.
 
东南快报东快网简介
东南快报东快网简介东南快报东快网简介
东南快报东快网简介
 
Annual report 2012 2013
Annual report 2012 2013Annual report 2012 2013
Annual report 2012 2013
 
Luonto ja Raamattu
Luonto ja RaamattuLuonto ja Raamattu
Luonto ja Raamattu
 
Martial Martin Négociales
Martial Martin NégocialesMartial Martin Négociales
Martial Martin Négociales
 
WebSite Evaluating
WebSite EvaluatingWebSite Evaluating
WebSite Evaluating
 
Внешняя оптимизация сайта
Внешняя оптимизация сайтаВнешняя оптимизация сайта
Внешняя оптимизация сайта
 
Boostapal where it all starts
Boostapal   where it all startsBoostapal   where it all starts
Boostapal where it all starts
 
II-SDV 2015, 20 - 21 April, in Nice
II-SDV 2015, 20 - 21 April, in NiceII-SDV 2015, 20 - 21 April, in Nice
II-SDV 2015, 20 - 21 April, in Nice
 
Графический пакет
Графический пакетГрафический пакет
Графический пакет
 
Admision.unc.edu.pe pdf declaracion
Admision.unc.edu.pe pdf declaracionAdmision.unc.edu.pe pdf declaracion
Admision.unc.edu.pe pdf declaracion
 
Facebook for Art
Facebook for ArtFacebook for Art
Facebook for Art
 
70 casos de_innovacion
70 casos de_innovacion70 casos de_innovacion
70 casos de_innovacion
 
Gazette numéro 1 - Jeudi 15 Otobre 2014
Gazette numéro 1 - Jeudi 15 Otobre 2014Gazette numéro 1 - Jeudi 15 Otobre 2014
Gazette numéro 1 - Jeudi 15 Otobre 2014
 

Similar to Darknet - Is it good for you?

Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsBiagio Botticelli
 
wp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeatwp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeatRobert Leong
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its typesRishab Gupta
 
Real-life Application of a Decentralized System
Real-life Application of a Decentralized SystemReal-life Application of a Decentralized System
Real-life Application of a Decentralized SystemIRJET Journal
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
ppt.TECHNICALfffgvggfssdcvvvgggfddffg.pptx
ppt.TECHNICALfffgvggfssdcvvvgggfddffg.pptxppt.TECHNICALfffgvggfssdcvvvgggfddffg.pptx
ppt.TECHNICALfffgvggfssdcvvvgggfddffg.pptxGeetha982072
 
Decentralized applications 101: How and why to build a DApp
Decentralized applications 101: How and why to build a DAppDecentralized applications 101: How and why to build a DApp
Decentralized applications 101: How and why to build a DAppErik Trautman
 
Project report (web 3.0)
Project report (web 3.0)Project report (web 3.0)
Project report (web 3.0)Abhishek Roy
 
(130727) #fitalk anonymous network concepts and implementation
(130727) #fitalk   anonymous network concepts and implementation(130727) #fitalk   anonymous network concepts and implementation
(130727) #fitalk anonymous network concepts and implementationINSIGHT FORENSIC
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight IntelliaggGavin O'Toole
 
Malware Analysis: Ransomware
Malware Analysis: RansomwareMalware Analysis: Ransomware
Malware Analysis: Ransomwaredavidepiccardi
 
Blockchain technology.docx
Blockchain technology.docxBlockchain technology.docx
Blockchain technology.docxaymenabbaci
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.Kalpesh Doru
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technologyRinshi Singh
 
Aztec Labs - Digital Pound Consultation Response.pdf
Aztec Labs - Digital Pound Consultation Response.pdfAztec Labs - Digital Pound Consultation Response.pdf
Aztec Labs - Digital Pound Consultation Response.pdfAztecLabs
 
Blockchain technology overview
Blockchain technology overviewBlockchain technology overview
Blockchain technology overviewRishabhMalik32
 
The case for a unified way of speaking to things
The case for a unified way of speaking to thingsThe case for a unified way of speaking to things
The case for a unified way of speaking to thingsLuca Mattia Ferrari
 

Similar to Darknet - Is it good for you? (20)

Darknet
DarknetDarknet
Darknet
 
Anonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing ProtocolsAnonymity in the Web based on Routing Protocols
Anonymity in the Web based on Routing Protocols
 
wp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeatwp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeat
 
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
 
Real-life Application of a Decentralized System
Real-life Application of a Decentralized SystemReal-life Application of a Decentralized System
Real-life Application of a Decentralized System
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
ppt.TECHNICALfffgvggfssdcvvvgggfddffg.pptx
ppt.TECHNICALfffgvggfssdcvvvgggfddffg.pptxppt.TECHNICALfffgvggfssdcvvvgggfddffg.pptx
ppt.TECHNICALfffgvggfssdcvvvgggfddffg.pptx
 
Decentralized applications 101: How and why to build a DApp
Decentralized applications 101: How and why to build a DAppDecentralized applications 101: How and why to build a DApp
Decentralized applications 101: How and why to build a DApp
 
Project report (web 3.0)
Project report (web 3.0)Project report (web 3.0)
Project report (web 3.0)
 
(130727) #fitalk anonymous network concepts and implementation
(130727) #fitalk   anonymous network concepts and implementation(130727) #fitalk   anonymous network concepts and implementation
(130727) #fitalk anonymous network concepts and implementation
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
 
FCN
FCNFCN
FCN
 
Malware Analysis: Ransomware
Malware Analysis: RansomwareMalware Analysis: Ransomware
Malware Analysis: Ransomware
 
Blockchain technology.docx
Blockchain technology.docxBlockchain technology.docx
Blockchain technology.docx
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.
 
Dissertation
DissertationDissertation
Dissertation
 
Block chain technology
Block chain technologyBlock chain technology
Block chain technology
 
Aztec Labs - Digital Pound Consultation Response.pdf
Aztec Labs - Digital Pound Consultation Response.pdfAztec Labs - Digital Pound Consultation Response.pdf
Aztec Labs - Digital Pound Consultation Response.pdf
 
Blockchain technology overview
Blockchain technology overviewBlockchain technology overview
Blockchain technology overview
 
The case for a unified way of speaking to things
The case for a unified way of speaking to thingsThe case for a unified way of speaking to things
The case for a unified way of speaking to things
 

Recently uploaded

Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxBipin Adhikari
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 

Recently uploaded (20)

Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Intellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptxIntellectual property rightsand its types.pptx
Intellectual property rightsand its types.pptx
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 

Darknet - Is it good for you?

  • 1. 1 DARKNET – THE ESSENTIAL GUIDE “It will continue to grow, because it makes things more convenient” Jonathan Jedrasiak
  • 2. 2 TABLE DE MATIÈRES Introduction ...........................................................................................................................4 The Darknet and its technical aspects ...................................................................................5 Who invented the term of Darknet? .....................................................................................5 How to correctly define the Darknet? ...................................................................................5 How does it work? .................................................................................................................6 TOR.........................................................................................................................................7 Who is using Tor?...................................................................................................................7 What’s so special about TOR? ...............................................................................................8 What is the purpose of Darknet?...........................................................................................9 What is the difference between Peer to Peer (P2P) and traditional networking? .............10 Why do P2P networks work so well?...................................................................................10 Are P2P users traceable? .....................................................................................................11 Examples of Peer-to-Peer Networks....................................................................................11 What is F2F?.........................................................................................................................12 What is the main goal of so called darknets?......................................................................12 What is Freenet?..................................................................................................................13 What differs Freenet from normal P2P networks? .............................................................13 How is the situation regarding Copyright? ..........................................................................13 Does copyright work? ..........................................................................................................14 The Darknet: a practical approach.......................................................................................15 What are the advantages of using this infrastructure?.......................................................15 Where are advantages, there always must be disadvantages, what are these? ................15 One may question himself, what are the implications of Darknet to e-commerce?..........15 is there a war going on against this business? ....................................................................16 How did Ross Ulbricht get caught knowing his skills? .........................................................17 What should other platforms like Agora Market do to fill the gap and to stay anonymous?17 What happened to Silkroad? ...............................................................................................18
  • 3. 3 Can a person be identified?.................................................................................................18 Darknet is virtually impossible to control............................................................................19 Are those places safe? .........................................................................................................20 What awaits us in the future? .............................................................................................21 So what to do? .....................................................................................................................21 Conclusion............................................................................................................................23 Appendix ..............................................................................................................................24 Sources.................................................................................................................................25 Ross Ulbricht’s court exhibit................................................................................................29
  • 4. 4 INTRODUCTION This paper will present you the Darknet from a simple observational point of view. Its goal is to explain the multiple layers that make such a network possible. At first we will learn how Darknet works from a technical angle, than what are the functionalities and benefits of such a network in our society. Inventions like the Darknet have often as source the need to protect against something, in this particular case, Darknet was created by the military in order to make anonymous communications from countries at war. We will see that this invention derived into a huge network of people who now exchange knowledge, confidential information, but also illegal goods like weapons or drugs.
  • 5. 5 THE DARKNET AND ITS TECHNICAL ASPECTS In order to have a better understanding how Darknet works and what are the implications of using such a network, we will first of all see how it is defined and what are the tools used to get a secure access. WHO INVENTED THE TERM OF DARKNET? When we talk about the Darknet we refer to the underground Internet. But where does this definition come from? Four senior Microsoft workers wrote an influential paper in 2002 entitled “The Darknet and the Future of Content Distribution”, which made quite a buzz. This term got known by more and more people until reaching the mainstream that defines the Darknet as an agglomeration of clandestine and illicit activities using the Internet. The Darknet nowadays evokes nebulous and even threatening activities on private, anonymous networks including illegal share of copyrighted files.1 HOW TO CORRECTLY DEFINE THE DARKNET? The Darknet is a distribution network available to a fraction of internet users that non-exclusively leak popular and interesting content into the web. More precisely, it is a collection of non-indexed webpages hidden in the underground of the web.2 This means in other words that they cannot be found on a normal search engine like Google or Yahoo. Why so? Well, most of these webpages are completely illegal and are not supposed to 1 How 4 Microsoft engineers proved that the « darknet » would defeat DRM, http://arstechnica.com/tech- policy/2012/11/how-four-microsoft-engineers-proved-copy-protection-would-fail/ 2 [DARKNET] Comment je l’ai découvert et comment y accéder, http://www.parlonsgeek.com/darknet-le-web- profond/
  • 6. 6 be found by everyday internet users. The Darknet is also called “friend-to-friend network”3, because people on the the Darknet are presumed to be trustful. In order to find webpages within the Darknet you have to use customized search engines like Clusty, Scirus or you can use the default Tor search engine that has some hundred thousands of pages listed, which is not bad for a start.4 Estimations from 2013 say they might be more than 600TB of data hidden in the shadows.5 HOW DOES IT WORK? All websites hidden in the Darknet finish by “.oignon”, it is a specific suffix from a browser called Tor. In order to access them you need to install this navigator that is based on the Firefox navigator, but having unique features.6 More precisely, this navigator makes it possible to connect from one pc to another one using a proxy connection, so that authorities are not able to backtrack the user. Adepts of these kind of hobbies also use the virtual currency called “Bitcoin”7. This currency allows to make transactions between 3 Private Communication Through a Network of Trusted Connections : The Dark Freenet, https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8&ved=0CEcQFjAHahUKEwiBv- L0mLXIAhXDvhQKHXfnD2g&url=https%3A%2F%2Ffreenetproject.org%2Fpapers%2Ffreenet-0.7.5- paper.pdf&usg=AFQjCNE4RIW2_WAHycZVhWYROfF_VyF02Q&sig2=bAf6fa9YaEy52emCuQ8cDA&cad=rja 4 Five search engines for exploring the darknet / deep web, http://www.depotekk.com/2015/02/five-search- engines-for-exploring.html 5 Forensic Memory Dump Analysis And Recovery Of The Artifacts Of Using Tor Bundle Browser – The Need, https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8&ved=0CEcQFjAHahUKEwiBv- L0mLXIAhXDvhQKHXfnD2g&url=https%3A%2F%2Ffreenetproject.org%2Fpapers%2Ffreenet-0.7.5- paper.pdf&usg=AFQjCNE4RIW2_WAHycZVhWYROfF_VyF02Q&sig2=bAf6fa9YaEy52emCuQ8cDA&cad=rja 6 How to use the Tor Browser to surf the web anonymously, http://www.pcworld.com/article/2686467/how-to-use- the-tor-browser-to-surf-the-web-anonymously.html 7 Dark Net Drug Sales Using Bitcoins Are Booming After Fall Of Silk Road Marketplace, http://www.ibtimes.com/dark- net-drug-sales-using-bitcoins-are-booming-after-fall-silk-road-marketplace-1960833
  • 7. 7 two virtual wallets without the capability to track who send the money to who, very handy to stay anonymous.8 TOR The Tor network allows people to navigate through the Internet in a more secure and anonymous way thanks to volunteer-operated servers around the globe. The main idea is to connect through a series of virtual tunnels in order to hide who connects and from where. People who use Tor benefit from not getting tracked by websites. Thanks to Tor it is also possible to publish websites and other services without getting located. This is crucial in order to develop an active community. Software developers also find their interest in this network, they can work together without getting tracked either. Social sensitive information can be communicated through private chat rooms and forums.9 WHO IS USING TOR? Well, not as you may think, Tor is not only used by criminals. The truth is Tor is very useful to journalists.10 Indeed they communicate with ease with whistleblowers and dissidents. When this network got created, one of the most important ideas was to ensure free speech. There are countries where you cannot express yourself and the deep web gets in handy. NGO’s members use Tor to connect to their websites and communicate with the services avoiding everybody around them knowing that they’re working with that given organization. Activist groups use Tor in order to keep their members safe while organizing themselves. 8 How To Use Bitcoin Anonymously, http://cryptorials.io/how-to-use-bitcoin-anonymously/ 9 https://www.torproject.org/about/overview 10 https://freedom.press/bundle/encryption-tools-journalists
  • 8. 8 Even the US Navy uses Tor, their mission is to gather open source intelligence. It is the variety of users that makes Tor such a good performing network. In other words, the more crowded the Tor network is and the more diverse it is, the more anonymous it becomes. It is also important to keep in mind that using TOR is completely legal, it only depends what you do with it that can make it illegal. You can for example just browse on normal internet in order to avoid being tracked by robots. WHAT’S SO SPECIAL ABOUT TOR? This infrastructure is working on the same principle as the internet itself, it only has some fundamental differences. The most outstanding ones are the fact that it is an anonymous and decentralized network that cannot be controlled by a single individual.11 These are the main reasons why people tend to use TOR in order to navigate on the Darknet. 11 Deterministic Builds Part Two: Technical Details, https://blog.torproject.org/category/tags/decentralization
  • 9. 9 WHAT IS THE PURPOSE OF DARKNET? Like you may imagine, Darknet is full of illegal things, this is why the most of the community are hackers, outlaws, drug or weapon dealers, criminals, but also socio-phobic people that don’t want to get their private life touched. In order to be untouched, they try to stay anonymous by using this encrypted way to access information and exchange between two individuals. One of the most known sites in the history of Darknet is silkroad. It is an anonymous market allowing to buy illegal drugs, weapons, stolen credit cards, forbidden literature, high tech used to steal personal information, but you can also hire people to kill someone or deliver goods or do any kind of things. Some people call this site “the ebay of drugs”.12 12 Silkroad, http://silkroaddrugs.org/silkroad/
  • 10. 10 WHAT IS THE DIFFERENCE BETWEEN PEER TO PEER (P2P) AND TRADITIONAL NETWORKING? Before, computers were easily identifiable because using a server-client relation in which you had to know an URL or IP-address in order to access the uploaded content. All sort of media files were stored on the server (host) and could be accessed by the client (user) through websites using internet. The client was not able to directly exchange files with other clients. A P2P network allows all clients to share media between each other.13 There is no central server storing the files, all exchanges are between the users that give authorization to download from or to them directly.14 In order to exchange files in P2P networks, specific software is required. This application establishes a connection between all users adding the possibility to chat, write comments or look what’s on other peoples PC’s.15 WHY DO P2P NETWORKS WORK SO WELL? Open distribution of free content is an immensely valuable method to encourage creation and dissemination of user content. P2P is also economically very efficient since there is no main server base. All the network cost is divided by the number of users. Equally, the more users are on a P2P network, the more files can be browsed. And the more users are online, the bigger the capacity of the network.16 Also networks are not limited on bandwidth, the data transfer can be very fast 13 David Barkai, An Introduction in Peer-to-Peer Computing, INTEL DEVELOPPER MAG, Feb. 2000, at 1, 3. 14 Androutsellis-Theotokis, supra note 14, at 337. 15 What You Ned To Know About Peer-to-Peer File Sharing, http://www.zonealarm.com/blog/2014/06/what-you- need-to-know-about-peer-to-peer-file-sharing/ 16 Niva Elkin-Koren, Making Technology Visible: Liability of Internet Service Providers for Peer-to-Peer Traffic, 9 N.Y.U.J. LEGIS. PUB. POL’Y 15, 22 (2006).
  • 11. 11 and is independent of a given server. A traditional client/server model has limited capacities. We can tell that Peer-to Peer networks improve quality of publicly available content. Providers have a hard time shutting down decentralized servers because they are not able to supervise activity and remove illicit content. Infringing content and users stay free and untouched from the system. Those networks also often function on open-source code so even if someone is able to shut it down, there are copied available to put it back on track immediately. ARE P2P USERS TRACEABLE? Yes, it all started then Gnutella and BitTorrent administrators created a protocol that allowed them to know which user was uploading how much. All this to equally redistribute bandwidth between users because there were people only downloading and never uploading and this was counterproductive. The content industry got interested and started to target entities like Napster and then ordinary citizens. That’s when P2P developers started to protect users with security, anonymity and privacy and the Darknet was born.17 EXAMPLES OF PEER-TO-PEER NETWORKS In order to better illustrate how peer to peer networks work, we will briefly see what the two most known networks are. NAPSTER This service got introduced in 1999 and started mass peer-to-peer exchange. Audio files were transferred infringing the copyright law. The specificity of this platform was that users were allowing other users to access their content that was situated on their PC’s. With a simple search 17 MIKA SUVANTO, PRIVACY IN PEER-TO-PEER NETWORKS, 3 (2010)
  • 12. 12 and click it was possible to listen to the desired song. This new trend should have been used in the legal music industry, but unfortunately they missed the trend.18 GNUTELLA Gnutella is a protocol created the 14th march 2000 that was complementary to Napster. Knowing that Napster was already on the radar and received lots of negative criticism, Gnutella was supposed to fix several problems. The service got centralized and every user had to pay a certain fee in order to access the files.19 WHAT IS F2F? Friend to Friend or F2F is a term used by Darknet users to describe how their file sharing method works. Actually in order to establish direct connections and share files with other persons you must be trusted. So there will be no sharing with untrusted individuals.20 WHAT IS THE MAIN GOAL OF SO CALLED DARKNETS? The idea is to create a closed network that enables secured communication defying detection and penetration of unwanted public. Once inside the network you can freely download and upload whatever suits your needs anonymously without getting identified by an outsider.21 This means that darknet users are difficult or even impossible for outsiders to discover. 18 Hören, was die Freunde hören, http://www1.wdr.de/themen/archiv/stichtag/stichtag8360.html 19 Gnutella VS. Freenet, https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&ved=0CEEQFjAFahUKEwjhqraworXIAhUJ fhoKHX71CEY&url=https%3A%2F%2Fwww-vs.informatik.uni- ulm.de%2Fteach%2Fws06%2Fp2p%2Ftalks%2Fpapers%2Fhein.pdf&usg=AFQjCNFjpRTGWyoHXupMELymCZgCzYnn uA&sig2=3-WTBhItyXR1hGOwL3YPlA&cad=rja 20 Freenet, http://gentoo-en.vfose.ru/wiki/Freenet 21 Johan A. Pouwelse et al., Pirates and Samaritians: a Decde of Measurements on Peer Production and Their Implications for Net Neutrality and Copyright, 32 TELECOMMS. POL’Y 701, 711 (2008)
  • 13. 13 WHAT IS FREENET? Freenet is one on the first Darknets that got introduced by In Clake who presents it by the following: “The primary goal of this Darknet is to protect political opponents of repressive regimes”. 22 His main idea is that without anonymity there will be no freedom of speech and without decentralization no guarantee that the network is going to stay up all the time. He also believes that copyright infringement is “an inevitable consequence of the design”. 23 WHAT DIFFERS FREENET FROM NORMAL P2P NETWORKS? This software is capable of running millions of connections simultaneously. The security aspect is widely developed, in order to ensure security the user has the choice to choose with whom he connects with. There is no automatic connection like in P2P. This means that not only this network is protected from outsiders but also restricted inside which makes it extremely hard to find the identity of a given user.24 HOW IS THE SITUATION REGARDING COPYRIGHT? Like John Perry Barlow once said: “Legal efforts to keep the old boat floating are taking three forms: a frenzy of deck chair rearrangement, stem warnings to the passengers that if she goes down, they will face harsh criminal penalties, and serene, glassy-eyed denial.”25 He also affirms that pursuing someone for his crimes is only possible if you can clearly identify the infringer and the infringing activity. Since Darknets are private and anonymous, file use is not traceable. Even 22 John markoff, File Shareres Anonymous: Building a Net That’s Provate, N:Y: TIMES, 2005 23 John markoff, File Shareres Anonymous: Building a Net That’s Provate, N:Y: TIMES, 2005 24 Is Freenet more secure and anonymous than Tor?, https://www.quora.com/Is-Freenet-more-secure-and- anonymous-than-Tor 25 Aric Jacover, Note, I want my MP3 ! Creating a Legal and Practical Scheme to Combat Copyright Infringement on Peer-to-Peer Internet Applications, 90 GEO.L.J.2207,2208 (2002).
  • 14. 14 service providers have no access to the traffic since these networks are secured and blocking any external intrusion. We came up to a point where it is very hard to find the responsible individuals. DOES COPYRIGHT WORK? The purpose of copyright is to effectively protect user content creation and so for encourage creativity. In order to ensure the effectiveness of copyright protection so called TPM’s (technological protection measures) got developed. The only problem with those protection measures is that once they are unlocked they are useless. It is enough that one expert hacker “cracks” the code and “leaks” the content to the public and the TPM has become ineffective. So practically digital copyright management is not a very efficient way of protection, stronger measures should be applied in order to ensure copyright owners to express their creativity. The problem is, the more the content gets protected and the more the need of Darknet will be accentuated.26 26 Technological Protection Measures, http://www.smartcopying.edu.au/copyright-guidelines/hot- topics/technological-protection-measures
  • 15. 15 THE DARKNET: A PRACTICAL APPROACH In this part, we will try to get a better understanding of the implications that Darknet has to our society and more precisely to the users that spend their free time on illegal sites. WHAT ARE THE ADVANTAGES OF USING THIS INFRASTRUCTURE? In the early stages Darknet was used to make undercover military communications possible. First of all, users of Darknet benefit from a very strong privacy level. This is because, if done well, they are untraceable. This allows them to access content without any restrictions, there are no filters, you can find about anything imaginable on this web. You have freedom, anything you want to see or personally share is available. Working alone is not a problem, you have full independence in an unbiased environment. WHERE ARE ADVANTAGES, THERE ALWAYS MUST BE DISADVANTAGES, WHAT ARE THESE? Not only dangerous objects like weapons or drugs are sold, but you will also have access to child pornography, illegal matters, terrorists and other trafficking rings. If you decide to buy or sell anything on this platform you risk high bills and imprisonment. ONE MAY QUESTION HIMSELF, WHAT ARE THE IMPLICATIONS OF DARKNET TO E- COMMERCE? Since all transactions are made anonymously, the notion of security is different. In a normal cyber-environment, people are not well informed of all the risks that the internet is presenting and are open to get hacked. That is why professionals of the e-commerce domain ensure more
  • 16. 16 or less bulletproof security and traceability of customers in financial transactions. But there is more, they tend to prevent any hacker-attack, malware, spyware etc.27 IS THERE A WAR GOING ON AGAINST THIS BUSINESS? In March 2014 no less than 17 people responsible of creating black-market sites were arrested thanks to the European police office Europol. This action was able to close 414 dangerous websites and scared with no doubt some of the Darknet users.28 The mission was to stop selling, distribution and promotion of illegal objects like weapons or drugs. This action has shown that those criminals are not invincible, it is a great way to calm things down. 29 27 Bitcoin, the Darknet Economy, and the Low Over-Head Revolution, http://c4ss.org/content/11718 28 Darknet: Vaste opération de police contre les responsables de marchés noirs sur internet, http://www.20minutes.fr/monde/1477227-20141107-darknet-vaste-operation-police-contre-responsables- marches-noirs-internet 29 Memex – Le moteur d’exploration du DarkNet de la DARPA, http://www.undernews.fr/reseau-securite/memex- le-moteur-dexploration-du-darknet-de-la-darpa.html
  • 17. 17 As we can see on the above image, advanced tools are used by the legal forces to better understand what is going on in the deep web. Millions of dollars are spend hoping that thanks to Big Data analysis, we will be able to stop all illegal activity in the Internet. This year, Ross Ulbricht, the creator of silkroad got sentenced. Convicted of all 7 charges held against him, he should spend his life in prison.30 Since the entire population saw Ross Ulbricht getting arrested by the FBI for being the creator of the biggest Darknet platform called Silkroad, two main questions emerged: HOW DID ROSS ULBRICHT GET CAUGHT KNOWING HIS SKILLS? As we know, Ross Ulbrecht was a genius in his specialty. Nevertheless he got caught by the FBI. How come? Well he made several mistakes: - He used to have a LinkedIn profile in which he mentioned indirectly the existence of SilkRoad. He wrote on this profile that he was working on an “ economic simulation’ designed to ‘give people a first-hand experience of what it would be like to live in a world without the systemic use of force’ by institutions and governments”31 - Even having a fake ID, he was using his real photograph while renting servers for his illegal activities. - He once asked a question using his real name in order to find a solution to connect to a Tor hidden service using curl in php. - He paid 80.000$ to kill a person, to an undercover cop…32 WHAT SHOULD OTHER PLATFORMS LIKE AGORA MARKET DO TO FILL THE GAP AND TO STAY ANONYMOUS? 30 Silkroad mastermind Ross Ulbricht convicted of all 7 charges, http://www.wired.com/2015/02/silk-road-ross- ulbricht-verdict/ 31 Five stupid things Dread Pirate Roberts did to get arrested, http://www.theguardian.com/technology/2013/oct/03/five-stupid-things-dread-pirate-roberts-did-to-get-arrested 32 Silk Road’s mastermind allegedly paid $80,000 for a hitman. The hitman was a cop, https://www.washingtonpost.com/news/the-switch/wp/2013/10/02/silk-roads-mastermind-allegedly-paid-80000- for-a-hitman-the-hitman-was-a-cop/
  • 18. 18 As the FBI published details about how they got to Ross Ulbricht, things got clearer. The main idea was to find relative information on Google from before founding the site in February 2011. The FBI has found messages, forum threats and similar about a person trying to see if a bitcoin only marketplace would work and who would like to work with him. The problem was, he was using his personal e-mail address while posting help wanted messages on the internet. Consequences are that free users and especially owners of such platforms got more careful. It seems that business on those marketplaces only gets bigger since Silkroad got closed. Indeed, Agora Market added more levels of security and so customers feel more secure and that for encouraged to make traffic happen. WHAT HAPPENED TO SILKROAD? The Silkroad is a website where you can buy all sort of illegal products and services. This site got closed in 2013 by the FBI but reopened only 4 weeks later and all the users came back in no-time. That’s why a second attempt was needed to finally close this black market. The FBI, with the help of Europol and Eurojust, arrested the creator of this website, however all the clients were free, so they just migrated to other market sites. CAN A PERSON BE IDENTIFIED? The question that a lot of people must be asking themselves is if it is possible to backtrack the activities in order to get to the user.33 In reality yes, 90% of users that get caught made a mistake. The system works very well, but people make mistakes. For example, if a user connects to his 33 Anonymity on the Internet: Darknet, www.it.uu.se/edu/course/homepage/sakdat/ht06/assignments/pm/programme/ljunggren.pdf
  • 19. 19 deepweb email via a normal connection, he got exposed and can be found. This is one of many examples of how to get caught.34 The authorities say that thanks to the LOPPSI II law (Loi n° 2011-267 du 14 mars 2011 d’orientation et de programmation pour la performance de la sécurité intérieure), a mal ware (most often Trojan) can be introduced to some users to find out what they are typing on their keyboard. DARKNET IS VIRTUALLY IMPOSSIBLE TO CONTROL. One noticeable change in the digital world is that internet users no longer passively consume media. These days, they participate actively and create tons of content. They also choose what to watch, where and with whom. Web 2.0 makes is all possible, forums, social media, wikis, search engines, etc., are all technologies that make it possible to interact with others. Peer to Peer fits perfectly into this combination. 34 Dark Net 101, http://askthecomputerguy.com/opinions/dark-net-101/
  • 20. 20 Here you can find a listed enumeration of the most known black market sites on the internet and their availability. Like you can see, there are many sites, not only Silkroad was active but lots of others. ARE THOSE PLACES SAFE? Well, no! You can get scammed like with the example of the Age of Evolution marketplace. They closed and kept over 40.000BTC which represents about 12M dollars.
  • 21. 21 Other scams taken place in the past, like the sheep marketplace scam. A Czech user has apparently stolen a big amount of Bitcoins from the owner of the marketplace. But he got exposed using the same IP address as the sheepmarketplace.com. WHAT AWAITS US IN THE FUTURE? The problem is, one big fish got caught, but new actors already appear in the market. New websites more powerful and more diverse like Agora and Evolution are already online. As long as there is interest in exchanging illegal things, people will find a way to make it possible. Stopping some providers will certainly slow down the growing process, but in the end as long there is internet, there will be Darknet. People that are in this kind of activity learn fast, there is no doubt some of the bigger online drug lords were watching the trial of Ross Ulbricht in order to learn what mistakes had been done. It is difficult to predict when the next one will get caught. SO WHAT TO DO? Darknet is one of many phenomenons that we can observe in the world. In order to find the answer to this question we have to ask ourselves why it is so popular and observe the evolution. We have a number of facts, for instance we cannot just close all the networks and even if we do there will be new ones coming. So in order to get rid of all illegal activity on the internet we would have to shut the whole internet down. But then again, exclusive underground networks could emerge, because technology and money is not the problem. That means there is no way of eradicating illicit activities on the internet. This means that we have to adapt. We could see on the example of Ulbrecht’s arrest and the shutdown of Silkroad that immediately after this event new marketplaces got opened. Those last ones being even more protected and anonymous than the one before. So it is all a question of finding the right balance between
  • 22. 22 copyright protection and free access of user content. If legal restrictions get to stiff more and more interest will grow in Darknet. On the other hand, the more liberty we give, the less content- creators get encouraged to public their work in order to gain money. We can also add, the more protection there is, and the less sophisticated the given product is. If there is no need for bulletproof security, the producers will not create advanced technology and so the security will not be well developed.
  • 23. 23 CONCLUSION As we saw Darknet is a strong creation that not only is dangerous to individuals, but also to economic activity. Darknet can be considered like an everlasting model. It’s a low cost, high- quality service that will always be going to be competitive against legal commerce. From an economic point of view, the Darknet can be considered like a business model that offers the same product as the concurrence, here legal commerce, but for free. What do legal vendors tend to do? They think that by making their products more and more secured they will get their clients back. Well, big mistake, in order to compete with Darknet, they have to fight on the same level, that means, they have to make their products more convenient and low cost. Legal forces are working on it to stop this huge marketplace and special team observe the Darknet in big numbers. The more we can learn about it the better we can anticipate next steps and prepare for the worst. Even if there is a predominant cr4iminal purpose to it, we could also observe the use of it in cases like freedom of speech, communication from endangered zones or a communication tool for journalists and socio-phobic people. Since we already know that Darknet will always exist and get bigger and bigger, why not to try and converge it into a less dangerous space?
  • 24. 24 APPENDIX  Sources  PowerPoint presentation about Darknet (in French)  Ross Ulbricht’s court exhibit
  • 25. 25 SOURCES 1How 4 Microsoft engineers proved that the « darknet » would defeat DRM, http://arstechnica.com/tech- policy/2012/11/how-four-microsoft-engineers-proved-copy-protection-would-fail/ 1 [DARKNET] Comment je l’ai découvert et comment y accéder, http://www.parlonsgeek.com/darknet-le-web- profond/ 1 Private Communication Through a Network of Trusted Connections : The Dark Freenet, https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8&ved=0CEcQFjAHahUKEwiBv- L0mLXIAhXDvhQKHXfnD2g&url=https%3A%2F%2Ffreenetproject.org%2Fpapers%2Ffreenet-0.7.5- paper.pdf&usg=AFQjCNE4RIW2_WAHycZVhWYROfF_VyF02Q&sig2=bAf6fa9YaEy52emCuQ8cDA&cad=rja 1 Five search engines for exploring the darknet / deep web, http://www.depotekk.com/2015/02/five-search- engines-for-exploring.html 1 Forensic Memory Dump Analysis And Recovery Of The Artifacts Of Using Tor Bundle Browser – The Need, https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=8&ved=0CEcQFjAHahUKEwiBv- L0mLXIAhXDvhQKHXfnD2g&url=https%3A%2F%2Ffreenetproject.org%2Fpapers%2Ffreenet-0.7.5- paper.pdf&usg=AFQjCNE4RIW2_WAHycZVhWYROfF_VyF02Q&sig2=bAf6fa9YaEy52emCuQ8cDA&cad=rja 1 How to use the Tor Browser to surf the web anonymously, http://www.pcworld.com/article/2686467/how-to-use- the-tor-browser-to-surf-the-web-anonymously.html 1 Dark Net Drug Sales Using Bitcoins Are Booming After Fall Of Silk Road Marketplace, http://www.ibtimes.com/dark-net-drug-sales-using-bitcoins-are-booming-after-fall-silk-road-marketplace- 1960833 1 How To Use Bitcoin Anonymously, http://cryptorials.io/how-to-use-bitcoin-anonymously/ 1 https://www.torproject.org/about/overview 1 https://freedom.press/bundle/encryption-tools-journalists 1 Deterministic Builds Part Two: Technical Details, https://blog.torproject.org/category/tags/decentralization 1 Silkroad, http://silkroaddrugs.org/silkroad/ 1 David Barkai, An Introduction in Peer-to-Peer Computing, INTEL DEVELOPPER MAG, Feb. 2000, at 1, 3. 1 Androutsellis-Theotokis, supra note 14, at 337. 1 What You Ned To Know About Peer-to-Peer File Sharing, http://www.zonealarm.com/blog/2014/06/what-you- need-to-know-about-peer-to-peer-file-sharing/ 1 Niva Elkin-Koren, Making Technology Visible: Liability of Internet Service Providers for Peer-to-Peer Traffic, 9 N.Y.U.J. LEGIS. PUB. POL’Y 15, 22 (2006). 1 MIKA SUVANTO, PRIVACY IN PEER-TO-PEER NETWORKS, 3 (2010)
  • 26. 26 1Hören, was die Freunde hören, http://www1.wdr.de/themen/archiv/stichtag/stichtag8360.html 1 Gnutella VS. Freenet, https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=6&ved=0CEEQFjAFahUKEwjhqraworXIAhUJ fhoKHX71CEY&url=https%3A%2F%2Fwww-vs.informatik.uni- ulm.de%2Fteach%2Fws06%2Fp2p%2Ftalks%2Fpapers%2Fhein.pdf&usg=AFQjCNFjpRTGWyoHXupMELymCZgCzYnn uA&sig2=3-WTBhItyXR1hGOwL3YPlA&cad=rja 1 Freenet, http://gentoo-en.vfose.ru/wiki/Freenet 1 Johan A. Pouwelse et al., Pirates and Samaritians: a Decde of Measurements on Peer Production and Their Implications for Net Neutrality and Copyright, 32 TELECOMMS. POL’Y 701, 711 (2008) 1 John markoff, File Shareres Anonymous: Building a Net That’s Provate, N:Y: TIMES, 2005 1 Is Freenet more secure and anonymous than Tor?, https://www.quora.com/Is-Freenet-more-secure-and- anonymous-than-Tor 1 Aric Jacover, Note, I want my MP3 ! Creating a Legal and Practical Scheme to Combat Copyright Infringement on Peer-to-Peer Internet Applications, 90 GEO.L.J.2207,2208 (2002). 1 Technological Protection Measures, http://www.smartcopying.edu.au/copyright-guidelines/hot- topics/technological-protection-measures 1 Bitcoin, the Darknet Economy, and the Low Over-Head Revolution, http://c4ss.org/content/11718 1 Darknet: Vaste opération de police contre les responsables de marchés noirs sur internet, http://www.20minutes.fr/monde/1477227-20141107-darknet-vaste-operation-police-contre-responsables- marches-noirs-internet 1 Memex – Le moteur d’exploration du DarkNet de la DARPA, http://www.undernews.fr/reseau-securite/memex-le- moteur-dexploration-du-darknet-de-la-darpa.html 1 Silkroad mastermind Ross Ulbricht convicted of all 7 charges, http://www.wired.com/2015/02/silk-road-ross- ulbricht-verdict/ 1 Five stupid things Dread Pirate Roberts did to get arrested, http://www.theguardian.com/technology/2013/oct/03/five-stupid-things-dread-pirate-roberts-did-to-get-arrested 1 Silk Road’s mastermind allegedly paid $80,000 for a hitman. The hitman was a cop, https://www.washingtonpost.com/news/the-switch/wp/2013/10/02/silk-roads-mastermind-allegedly-paid-80000- for-a-hitman-the-hitman-was-a-cop/ 1 Anonymity on the Internet: Darknet, www.it.uu.se/edu/course/homepage/sakdat/ht06/assignments/pm/programme/ljunggren.pdf 1 Dark Net 101, http://askthecomputerguy.com/opinions/dark-net-101/
  • 27. 27 POWERPOINT PRESENTATION ABOUT DARKNET (IN FRENCH) The dark side of the web What is Darknet and how does it work? • Collection of non-indexed webpages • More than 600TB of illegal data • Need of using a custom search engine like Clusty or Scirus • Specific navigator called TOR is necessary How does is work?
  • 28. 28 What is the purpose of it? Gathering place for • Hackers • criminals • weapon and drug dealers • Headhunters • socio-phobic people Place to exchange • Drugs • Weapons • Humans • Smuggles goods • Human organs • Illegal litterature • Pictures / videos How to fight against it? March 2014 • 17 people got arrested • 414 illegal websites got closed • Europol fights against: • Selling • Distribution • Promotion 04 january 2015 • Ross Ulbricht guilty! • Creator of silkroad What awaits us in the future? • Silkroad got replaced by Agora and Evolution • As long as there is interest, people will make it possible • Caution is advised: those people are smart!
  • 30. 30
  • 31. 31
  • 32. 32