Download presentation
Presentation is loading. Please wait.
Published byImogen Simmons Modified over 9 years ago
1
Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong
2
WHAT IS Tor (The Onion Router) is a technology that allows people to browse the web and access online services without revealing their identities. Originally developed with the U.S Navy in mind for the purpose of protecting government communications Normal people Militaries Journalists and their audience Law enforcement officers (Police) Activists & Whistleblowers Business executives (Investment bankers) IT professionals Who uses Tor?
3
HOW DOES WORK? The Tor network directs traffic through a worldwide, volunteer network consisting of more than 5,000 relays. Your identity is disguised as your traffic is encrypted as it move across Tor’s thousands of servers.
5
IS LEGAL? YES! You can use it as you would like any other Internet Browser. Many people are now beginning to use TOR as a way of maintaining their privacy whilst online. Due to anonymity that TOR offers, the Deep Web has become a popular nesting ground for criminal activities. BECAREFUL of the dark side. THIS INCLUDES THINGS SUCH AS http://kpvz7ki2v5agwt35.onion
6
DEEP WEB CURRENCY Ever wondered what is the preferred medium of exchange in the deep web? The digital black market needs the digital equivalent of cash. And that's exactly what Bitcoin is. Bitcoin, like cash, allows transactions to be made anonymously bitcoin Why Bitcoin?
7
WHAT DO YOU THINK OF OR
8
THE LEGAL GRAY ZONE
9
(Map of Tor Usage around the world.)
15
WHY USE TOR? Anonymity Online Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world Prevents somebody from watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.
16
WHO ARE THE ENEMIES OF INTERNET FREEDOM? NSA Government convinced the major telecommunications companies in the US, including AT&T, MCI, and Sprint, to hand over the “call-detail records” of their customers. Included “customers' names, street addresses, and other personal information Same telecommunications companies also allowed for installation of sophisticated communications surveillance equipment in secret rooms at key telecommunications facilities around the country Access to large streams of domestic and international communications in real time
18
WHAT CAN THEY ACCESS? Weakening privacy Project Bullrun aimed to weaken online privacy by inserting vulnerabilities into commercial encryption systems. Monitoring citizens Under the auspices of the Foreign Intelligence Surveillance Act, the PRSIM surveillance program set out to monitor electronic exchanges among users of Google, Facebook and Skype. Smartphone spying The NSA is capable of accessing users’ data from leading manufacturers of smartphones, including iPhones and Android mobile operating systems.
19
QUESTION Do you think it is right for the NSA to be constantly monitoring us? Why?
20
WHO ELSE IS WATCHING? Countries on every continent have formed special organizations and task forces to monitor the activity of not only their own citizens, but of people around the world. They’re not only monitoring activity, but restricting it as well. Any website deemed illegal or harmful to their citizens is blocked, including news sites, blogs, and even social media. In some countries they can even enter your home to search for illegal media if evidence of your activities is found online. Even countries you may think of as valuing the freedom of their citizens may not be governed by people who believe in a free Internet.
22
REFERENCES http://en.wikipedia.org/wiki/Tor_(anonymity_network) https://www.torproject.org/about/torusers.html.en http://www.vox.com/2014/12/31/7470965/dark-web-explained http://www.whoishostingthis.com/blog/2013/12/17/tor-deep-web/ http://www.theguardian.com/technology/2013/nov/05/tor-beginners-guide-nsa-browser https://www.eff.org/torchallenge/faq.html https://www.torproject.org/eff/tor-legal-faq.html.en http://en.wikipedia.org/wiki/Operation_Onymous http://www.vocativ.com/tech/internet/dark-net-russia/ https://metrics.torproject.org/clients-data.html https://www.eff.org/nsa-spying/how-it-works http://www.whoishostingthis.com/blog/2014/10/27/internet-enemies/ http://en.wikipedia.org/wiki/Bullrun_(decryption_program)
23
Have you ever wanted to browse the Internet anonymously? The truth is that browser settings such as "incognito mode" or "private window" don't quite cut it. If you want real anonymity, you're going to want to use The Onion Router, aka Tor. Surprisingly, Tor was created with financial support from the US government, which wanted to promote the free flow of information. Government support for Tor has continued in recent years as part of the State Department's internet freedom agenda, which seeks to help people in repressive regimes gain access to information censored by their governments. In 1984(novel), a government known as Big Brother controls nearly every aspect of citizens' lives. TO BE DELETED. It’s for extra info.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.