IS THE "DARK WEB" DEEP AND DARK?
Abstract
Since its foundation the Internet has, due to the principles on which it was created, evolved in different directions. During its development, two main parts were crystallized, one visible and accessible to ordinary users and tools which should ensure that its use is simple and comfortable, and the other, less affordable and accessible only to those who make a little more effort, for many invisible. Although invisible, it is not exclusive, because everyone can join it, if they want to. This paper intended to make an overview of the state of use of the Internet at the beginning of 2016 and to analyze advantages and disadvantages of both parts of the Internet. Here are considered only the contents of the Internet, and the contents on private intranet facilities that are located behind firewalls are completely excluded from the analysis, although they contain a large amount of data. At the beginning of the paper, there is considered the terminology used in the literature and in mutual communications of Internet users. Further, there an analysis of visible and invisible parts of the Internet, and an emphasis is placed on the invisible Internet, because it is a less public, and most of people are not familiar with it. The reasons why the invisible Internet has become attractive are discussed in more detail, as well as the way it is created and procedures for its use. Here are also considered the risks to which the invisible Internet is exposed, as well as risks to which its users may be exposed. In the framework of the conclusions, the dillema of "transparency or privacy“ is discussed, along with the topic of whether the dark web is really dark, as well as perspectives of development of the Internet.
Keywords
Full Text:
PDF (Serbian)References
sata. (2015, Avgust 18). Šest najužasnijih stvari koje skriva tamna strana interneta. 24 sata. Retrieved from http://www.24sata.hr/tech/sest-najuzasnijih-stvari-koje-skriva-tamna-strana-interneta-422927/foto
Akhoondi, M., Yu, C., & Madhyastha, H. V. (2012, May). LASTor: A Low-Latency AS-Aware Tor client. Proceedings of IEEE Symposium on Security and Privacy (Oakland'12). San Francisco, CA. Retrieved from http://lastor.cs.ucr.edu/oakland12.pdf
Beal, V. (n.d.). DDoS attack - Distributed Denial of Service. Retrieved December 04, 2015, from webopedia: http://www.webopedia.com/TERM/D/DDoS_attack.html
Beckett, A. (2009, November 26). The dark side of the internet . Retrieved from theguardian: http://www.theguardian.com/technology/2009/nov/26/dark-side-internet-freenet
Bergman, M. K. (2001). White Paper: The Deep Web: Surfacing Hidden Value. JEP the journal of electronic publishing, 7(1). doi:http://dx.doi.org/10.3998/3336451.0007.104
Bishop, E. (2013, November 18). 5 threats to your security when using social media. Retrieved from SocialTimes: http://www.adweek.com/socialtimes/5-social-media-threats/493325
Blotnej, B. (2015, maj 17). Tamna strana interneta: Stisni 'enter' za ubojstvo i kriminal. Retrieved from 24 sata: http://www.24sata.hr/news/tamna-strana-interneta-stisni-enter-za-ubojstvo-i-kriminal-419601
BOB. (2015, November). BOB - basic open bridge. Retrieved from I2P: https://geti2p.net/en/docs/api/bob
Cunningham, P. (2011, August 6). Email Fundamentals: What is an MX record, and how do they work? Retrieved from exchangeserverpro.com: http://exchangeserverpro.com/mx-record/
Čekerevac, Z. (2013). Small an medium sized enterprises data seccurity in cloud computing. ITEP 2013 (str. 280-283). Chernivtsi: Bukovinski Universitet.
Čekerevac, Z., & Radonjić, S. (2013). Some SMEs data safety and security issues in the in-house and in the cloud computing. 18. medzinarodna vedecka konferencia Riešenie krizovych situacii v špecifickom prostredi (str. 99-106). Žilina: Fakulta špecialneho inžinierstva.
Čekerevac, Z., Anđelić, S., & Radović, D. (2011). Data protection in small and medium sized enterprises. 2011. PROCEEDINGS of International Conference “Smal and Medium Enterprises - Possibilities and Perspectives 2011” (str. 445-456). Novi Pazar, Serbia: International University. Preuzeto sa http://news.uninp.edu.rs/media/filer_public/1e/fe/1efe18dc-cb15-4335-ad94-61c197a16e98/smepp2011.pdf
Čekerevac, Z., Čekerevac, P., & Vasiljević, J. (2014, Jan 15). Internet sigurnost MSP sa aspekta sigurnosti elektronske pošte. FBIM Transactions, 2(1), 45-56. doi:10.12709/fbim.02.02.01.05
Čekerevac, Z., Dvorak, Z., & Čekerevac, P. (2014). Internet safety of SMEs and e-mail protection in the light of recent revelations about espionage of internet communication system. Zbirnyk naukovykh pratsʹ Bukovynsʹkoho universytetu. Ekonomichni nauky, 10.
Čekerevac, Z., Dvorak, Z., & Čekerevac, P. (2014, 07 15). Internet sigurnost u svetlu otkrića Edvarda Snoudena. (Z. Čekerevac, Ur.) FBIM Transactions, 2(2), 68-78. doi:10.12709/fbim.02.02.02.07
Danezis, G. (2005, January). Introducing Traffic Analysis - Attacks, Defences and Public Policy Issues... Retrieved from http://www0.cs.ucl.ac.uk/staff/G.Danezis/papers/TAIntro.pdf
darknet. (2015, November 2). Retrieved from Dictionary.com's 21st Century Lexicon: http://dictionary.reference.com/browse/darknet
dark-web. (2015, November 28). Retrieved from Dictionary.com Unabridged: http://dictionary.reference.com/browse/dark-web
Davis, R. (2011, Jun 25). What is Dark Internet, How to Access Onion Domains and Configure Hosting for the Dark Web. Retrieved from The ramblings of a weirdo: http://www.rogerdavies.com/2011/06/dark-internet/#torroutingdiagram
deep-web. (2015, November 28). (Dictionary.com) Retrieved November 28, 2015, from Dictionary.com Unabridged: http://dictionary.reference.com/browse/deep-web
Dnssec.net. (2015, Jun 16). DNSSEC: DNS Security Extensions Securing the Domain Name System. Retrieved from Dnssec.net: http://www.dnssec.net/
Egan, M. (2015, Nov 23). What is the Dark Web? How to access the Dark Web. What's the difference between the Dark Web and the Deep Web? Retrieved from PC Advisor: http://www.pcadvisor.co.uk/how-to/internet/what-is-dark-web-how-access-dark-web-deep-joc-3593569/
Falkvinge, R. (2015, June 18). Google Chrome listening in to your room shows the importance of privacy defense in depth. Retrieved from Privacy Online News: https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/
Goodman, M. (2015, April 1). Most of the web is invisible to Google. Kere's what it contains. Preuzeto sa Popular Science: http://www.popsci.com/dark-web-revealed
Greenwald, G., & MacAskill, E. (2013, 06 07). NSA Prism program taps in to user data of Apple, Google and others. The Guardian. Preuzeto 08 04, 2013 sa http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data
Hill, K. (2015, November 30). The attack that broke the Dark Web—and how Tor plans to fix it. Retrieved from Fusion: http://fusion.net/story/238742/tor-carnegie-mellon-attack/
I2P. (n.d.). I2PTunnel. Retrieved December 3, 2015, from I2P: https://geti2p.net/en/docs/api/i2ptunnel
ICANN. (n.d.). ICANN. Retrieved December 3, 2015, from Internet Corporation for Assigned Names and Numbers: http://archive.icann.org/tr/english.html
Internet Archaeologists Reconstruct Lost Web Pages. (2013, September 18). Retrieved from MIT Technology Review: http://www.technologyreview.com/view/519391/internet-archaeologists-reconstruct-lost-web-pages/
Kessler, M. (2013, July 23). Deutsche User: Zwei Drittel halten ihre Daten im Netz für unsicher. Retrieved from teltarif.de: http://www.teltarif.de/bitkom-internet-nutzer-daten-unsicher-befragung-prism/news/51871.html
Kumar, M. (2011, October 24). Tor anonymizing network Compromised by French researchers. Retrieved from The hacker news: http://thehackernews.com/2011/10/tor-anonymizing-network-compromised-by.html
Labovitz, C., Ahuja, A., & Bailey, M. (2001). Shining light on dark address space. Ann Arbor, Michigan, USA: Arbor Netwoks. Retrieved from http://mdbailey.ece.illinois.edu/publications/dark_address_space.pdf
Le Blond, S., Manils, P., Chaabane, A., Ali Kaafar, M., Castelluccia, C., Legout, A., & Dabbous, W. (2011, March). One bad apple spoils the bunch: Exploiting P2P applications to trace and profile Tor users. Retrieved from usenix: https://www.usenix.org/legacy/events/leet11/tech/full_papers/LeBlond.pdf
Mergen, L. (2015). On anonymous networking in Haskell: announcing Tor and I2P for Haskell. Retrieved December 3, 2015, from Luctor et Emergen: http://www.leonmergen.com/haskell/privacy/2015/05/30/on-anonymous-networking-in-haskell-announcing-tor-and-i2p-for-haskell.html
Microsoft. (n.d.). Understanding Reverse Lookup. Retrieved November 30, 2015, from https://technet.microsoft.com/en-us/library/cc730980.aspx
Mikhailian, A. (n.d.). How to block Tor exit nodes from accessing your website. Retrieved from mova.org: http://mikhailian.mova.org/node/194
Nerd, P. (2015, February 26). DNS Crash Course: A, AAAA and PTR Records. Preuzeto sa The Classic Yuppie: https://classicyuppie.com/dns-crash-course-a-aaaa-ptr-records/
Nicholson, J. (2014, February 28). What is a name server? . Retrieved from inmotion hosting: http://www.inmotionhosting.com/support/domain-names/dns-nameserver-changes/what-is-a-name-server
Orchid. (2014, March). Retrieved from Plugins.i2p.xyz/ plugins/ Orchid : http://plugins.i2p.xyz/plugins/orchid/
Osterman Research, I. (2013, July). Why Should You Encrypt Email and What Happens if You Don’t? Retrieved from Osterman Research: http://www.ostermanresearch.com/whitepapers/orwp_0194.pdf
PC. (2015, November 28). Definition of: surface Web. Retrieved from PC Magazine Encyclopedia: http://www.pcmag.com/encyclopedia/term/52273/surface-web
Peachey, P. (2013, October 9). Exposed: The dark side of the internet, where you can buy drugs, sex and indecent images. Retrieved from Independent: http://www.independent.co.uk/news/uk/crime/exposed-the-dark-side-of-the-internet-where-you-can-buy-drugs-sex-and-indecent-images-8723048.html
SAM V3. (2015, November). Preuzeto sa I2P: https://geti2p.net/en/docs/api/samv3
SEOBook. (n.d.). Robots.txt File Generator. Retrieved November 30, 2015, from SEOBook: http://tools.seobook.com/robots-txt/generator/
Srna. (2013, oktobar 08). Tamna strana interneta osvaja tržište. Retrieved from Nezavisne novine: http://www.nezavisne.com/nauka-tehnologija/internet/Tamna-strana-interneta-osvaja-trziste/212804
Syverson, P. (2005). Onion routing. Retrieved December 3, 2015, from Onion-router: http://www.onion-router.net/
Titcomb, J. (2015, November 26). Anonymous hackers install Viagra advert on Islamic State propaganda website. Retrieved from The Telegraph: http://www.telegraph.co.uk/technology/internet/12019053/Anonymous-hackers-install-Viagra-advert-on-Islamic-State-propaganda-website.html
Tor. (n.d.). Retrieved December 3, 2015, from Torproject: https://www.torproject.org/about/overview.html.en
WEBnSTUDY. (2015, avgust 20). Tamni Internet. Preuzeto sa WEBnSTUDY: http://www.webnstudy.com/tema.php?id=tamni-internet
What is a CNAME record? (2015). Retrieved November 30, 2015, from DNSimple.
What is a SOA Record? (2015). Retrieved November 30, 2015, from DNSimple: https://support.dnsimple.com/articles/soa-record/
What is an AAAA record or IPv6? (n.d.). Retrieved November 30, 2015, from No-IP: http://www.noip.com/support/knowledgebase/what-is-an-ipv6-or-aaaa-record/
Wüest, C. (2010). The Risks of Social Networking. Retrieved from symantec: https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the_risks_of_social_networking.pdf
Yale, B. (2014, October 21). How the Internet Works: The Deep Web. Retrieved from informIT: http://www.informit.com/blogs/blog.aspx?uk=How-the-Internet-Works-The-Deep-Web
Refbacks
- There are currently no refbacks.
FBIM Transactions