Where is the dark web, and what's on it?

Where is the dark web, and what's on it?

Author
Discussion

WCZ

10,534 posts

195 months

Thursday 22nd February 2018
quotequote all
pip t said:
There are many perfectly legitimate uses for the dark web, as have been detailed several times on the thread above. To briefly list a few:

- Human rights activists in oppressive regimes
- Illegal minorities in oppressive regimes (eg homosexuals in Iran)
- Journalists protecting sources
- Whistleblowers
- Security agencies protecting officers in the field
- People who are concerned about their online privacy
- People using it altruistically to improve the effectiveness of it for those who genuinely need it's protection

You really have to actively look for the seedy/illegal/abusive onion services. It's completely possible to never come across any. You almost certainly won't just stumble across them. I've used TOR on and off for years, and I've never seen anything illegal. I'm sure it's out there, we know it's out there from operations against it detailed in the press, but you are unlikely to accidentally access it.

Yes, this level of 'privacy' does make it difficult for the police & security services to track offenders using it for unpleasant purposes. However, I would say the benefits of it's existence outweigh the negatives. I'm not a 'tin foil hatter' - I accept the fact that we are under surveillance on the internet, both commercially and from government agencies, and I can see the benefits of it. But I don't like it much, and I like the fact that there are ways to counteract it should you wish to.

Any technology can be used for evil. It's up to society to find ways to root out the evil, while keeping the benefits the technology brings.
all good points

I personally think the bad outweighs the good with this kind of anonymity and encrypted chat too


GrumpyTwig

3,354 posts

158 months

Thursday 22nd February 2018
quotequote all
WCZ said:
all good points

I personally think the bad outweighs the good with this kind of anonymity and encrypted chat too
Encryption is the foundation on which the whole internet is built.

andy_s

19,400 posts

260 months

Thursday 22nd February 2018
quotequote all
WCZ said:
all good points

I personally think the bad outweighs the good with this kind of anonymity and encrypted chat too
Encrypted chat like iMessenger and Whatsapp?

Regiment

2,799 posts

160 months

Thursday 22nd February 2018
quotequote all
The dark web is basically the opposite to the light web. This is the light web, on the dark web is Piston Heads alter ego version which is essentially exactly the same apart from it's filled with lots of reviews of diesel cars and Labour voters.

WCZ

10,534 posts

195 months

Thursday 22nd February 2018
quotequote all
andy_s said:
Encrypted chat like iMessenger and Whatsapp?
I was thinking more of telegram, chatsecure, signal etc

GrumpyTwig

3,354 posts

158 months

Thursday 22nd February 2018
quotequote all
Regiment said:
The dark web is basically the opposite to the light web. This is the light web, on the dark web is Piston Heads alter ego version which is essentially exactly the same apart from it's filled with lots of reviews of diesel cars and Labour voters.
Along with threats to hammer lawns into you sausages.

handpaper

1,296 posts

204 months

Thursday 22nd February 2018
quotequote all
eliot said:
fblm said:
Can anyone answer some TOR questions for me?

Who in the hell would host an exit node? Won't their IP look like a wretched hive of scum and villany? Secondly whilst I understand the middle relays don't know your IP won't the actual .onion site you're connecting to need to know your IP in order to route anything back to you? If so, can't the FBI/NCA just set up their own .onion site with some promising clickbait and get lots of 'target rich' IP's from that? Lastly I read there are only something like 5000 server relays. Isn't it entirely possible that half of them are FBI/NSA/DOJ/CIA? In which case wouldn't it be relatively simple to track many connections from guard to exit node? It seems very suspicious to me that the US military would set up a highly secret communication protocol seemingly ideal for criminals, terrorists and 'rogue' states and then sit back and go, ''oh no there's nothing we can do''.... scratchchin
I have the same questions.
Also wrt VPN sites and anonymous email sites listed on the other page - given they are anonymous, how do you know who’s running them. The feds probably run the majority of these servers as a massive receptical to profile low level / intermediate crime.
Have a look at torproject.org for details of how the system works.

Basically, a tor hidden service site (.onion) cannot see your IP address, nor can you determine its location or the public IP of the machine it runs on.
Australian police recently shut down one of the biggest child porn sites on the dark web - after running it themselves for nearly a year. During that time they sought to identify as many users as possible, but were largely thwarted by the security built into the protocol.

Never you mind

1,507 posts

113 months

Thursday 22nd February 2018
quotequote all
4x4Tyke said:
Spoon Burner said:
I’m really interested in hacking, would it be a silly idea to go on there to the hacking forums & have a read?
It's not necessary, the best information is freely available from public sources such IT security researchers operating on reasonable disclosure basis.
Hacker IRC Channels are sometimes best used via TOR I've met several hackers in the "Dark Web". But as tyke says most of the info is available freely and legally on the surface web.

e.g.

https://access.redhat.com/security/vulnerabilities


I suspect Microsoft have something similar

And any code you need to learn, i.e Ruby if you use Social Engineering tool kit/ Metasploit is also available on the surface web or just search GitHub.


I used to use TOR and proxy chains for when I was network scanning looking for specific targets. If I needed to ask questions about certain exploits that would work on a target I would use the IRC channels but as with everything you get some people that will help and some that just want to exploit you.


Anyway, here is a non evil google like search engine that is available on the dark web.

hss3uro2hsxfogfq.onion



moustachebandit

1,269 posts

144 months

Thursday 22nd February 2018
quotequote all
Really interesting thread!

I was wondering how VPN and TOR differ? Or is TOR the same thing with more layers of encryption as the data is passed between different servers.

My understanding is that using whilst using VPN an ISP cant see what you are looking at / files being sent and visited sites wont know your actual IP or any identifying information?


clonmult

10,529 posts

210 months

Thursday 22nd February 2018
quotequote all
WCZ said:
andy_s said:
Encrypted chat like iMessenger and Whatsapp?
I was thinking more of telegram, chatsecure, signal etc
I thought that Whatsapp was encrypted in a similar manner to telegram - they're similar overall services?

(No idea on iMessage, chatsecure, etc.)

andy_s

19,400 posts

260 months

Thursday 22nd February 2018
quotequote all
clonmult said:
WCZ said:
andy_s said:
Encrypted chat like iMessenger and Whatsapp?
I was thinking more of telegram, chatsecure, signal etc
I thought that Whatsapp was encrypted in a similar manner to telegram - they're similar overall services?

(No idea on iMessage, chatsecure, etc.)
They're much of a muchness I think, P2P encryption so even the company can't decrypt, or at least that's how I understand it. There was a wrangle with Apple and Whatsapp recently where the govt. wanted them to be able to release data but both said they couldn't even if they wanted to. There's other ways I'm sure, but it wasn't as simple as just giving the authorities a key.

(Caveat - this isn't my field, I may be barking up the wrong lamppost...)

Vocal Minority

8,582 posts

153 months

Thursday 22nd February 2018
quotequote all
GrumpyTwig said:
Along with threats to hammer lawns into you sausages.
That actually made me giggle - for shame.

But congrats on managing to revive laughter from a tedious trope

Never you mind

1,507 posts

113 months

Thursday 22nd February 2018
quotequote all
moustachebandit said:
Really interesting thread!

I was wondering how VPN and TOR differ? Or is TOR the same thing with more layers of encryption as the data is passed between different servers.

My understanding is that using whilst using VPN an ISP cant see what you are looking at / files being sent and visited sites wont know your actual IP or any identifying information?
VPN providers can see your IP and what you are getting at the exit point but your ISP can't.

But with TOR no one can see owt as the routers are only aware of what's in front and what's behind it so at the exit node, the last layer of encryption gets decrypted and the data is sent to the destination without exposing the sender's IP. However some sites are TOR aware and won't let you get to them, I.e google.

Not really a network guy but that's my basic understanding of it.



hyphen

26,262 posts

91 months

Thursday 22nd February 2018
quotequote all
clonmult said:
I thought that Whatsapp was encrypted in a similar manner to telegram - they're similar overall services?

(No idea on iMessage, chatsecure, etc.)
I would be very surprised if WhatsApp, being owned by FB, did not have backdoors/weaknesses built in.

Comes down to trust, do you trust Facebook?

hyphen

26,262 posts

91 months

Thursday 22nd February 2018
quotequote all
moustachebandit said:
Really interesting thread!

I was wondering how VPN and TOR differ? Or is TOR the same thing with more layers of encryption as the data is passed between different servers.

My understanding is that using whilst using VPN an ISP cant see what you are looking at / files being sent and visited sites wont know your actual IP or any identifying information?
Along with the answer below from Neveryoumind, a VPN will also be much faster than TOR.

tankplanker

2,479 posts

280 months

Thursday 22nd February 2018
quotequote all
andy_s said:
They're much of a muchness I think, P2P encryption so even the company can't decrypt, or at least that's how I understand it. There was a wrangle with Apple and Whatsapp recently where the govt. wanted them to be able to release data but both said they couldn't even if they wanted to. There's other ways I'm sure, but it wasn't as simple as just giving the authorities a key.

(Caveat - this isn't my field, I may be barking up the wrong lamppost...)
Signal, Whatsapp (which licensed Signal's protocol), Telegram and the like share a per conversation set of public/private keys for you between the two people having the conversation. In theory you could, with the participation of the vendor (Signal or whoever), take central copies of those keys without you knowing. Once you have the keys you can read anything you like. I have my suspicions that this is happening on some level.

It used to be very easy to do this with HTTPS traffic if you have access to the private keys (which is trivial for Government agencies if the vendor for the SSL certificate is located in a friendly country). I regularly used to use Wireshark to debug HTTPS traffic. Now it is a little harder as your browser generates a unique session key so you can't replay the session if you have the private key. However both Chrome and Firefox support logging the session keys, so you can see where this is going.

Anybody thinking that keys wouldn't be shared when the Government comes asking should look at Hushmail.



andy_s

19,400 posts

260 months

Thursday 22nd February 2018
quotequote all
tankplanker said:
andy_s said:
- this isn't my field,
Anybody thinking that keys wouldn't be shared when the Government comes asking should look at Hushmail.
thumbup TP; cheers - I use hushmail on a VPN as it happens - I work around N Africa - but never looked too deeply under the bonnet.

Spoon Burner

8,855 posts

188 months

Thursday 22nd February 2018
quotequote all
Never you mind said:
4x4Tyke said:
Spoon Burner said:
I’m really interested in hacking, would it be a silly idea to go on there to the hacking forums & have a read?
It's not necessary, the best information is freely available from public sources such IT security researchers operating on reasonable disclosure basis.
Hacker IRC Channels are sometimes best used via TOR I've met several hackers in the "Dark Web". But as tyke says most of the info is available freely and legally on the surface web.

e.g.

https://access.redhat.com/security/vulnerabilities


I suspect Microsoft have something similar

And any code you need to learn, i.e Ruby if you use Social Engineering tool kit/ Metasploit is also available on the surface web or just search GitHub.


I used to use TOR and proxy chains for when I was network scanning looking for specific targets. If I needed to ask questions about certain exploits that would work on a target I would use the IRC channels but as with everything you get some people that will help and some that just want to exploit you.


Anyway, here is a non evil google like search engine that is available on the dark web.

hss3uro2hsxfogfq.onion
Thank you, appreciate the advice.