______________________________________________________________________________________________________________________________________
+What is web?
====A web is a hypertext document on the world wide web. web pages are delivered by the web server to the user and displayed in a web brouser. A website consist oc many web pages linked together under a common domain name.It contains no of identified pages when become a pile then named as "BOOK".====
______________________________________________________________________________________________________________________________________
+WHAT IS DARK NET OR DARK WEB?+
A dark net or darknet is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol.
Two typical darknet types are social networks (usually used for file hosting with a peer-to-peer connection), and anonymity proxy networks such as Tor via an anonymized series of connections.
The term "darknet" was popularized by major news outlets to associate with Tor Onion services, when the infamous drug bazaar Silk Road used it, despite the terminology being unofficial. Technology such as Tor, I2P, and Freenet was intended to defend digital rights by providing security, anonymity, or censorship resistance and is used for both illegal and legitimate reasons. Anonymous communication between whistle-blowers, activists, journalists and news organisations is also facilitated by darknets through use of applications such as SecureDrop.
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
BACK ROOMS
The Backrooms is an urban legend and creepypasta which describes an endless maze with empty offices which originated in a 2019 4chan thread about unsettling images. One of the first examples of liminal spaces — an internet aesthetic which includes usually busy locations depicted as unnaturally empty — the Backrooms are an endless maze of office rooms which are entered by "[noclipping] out of reality in the wrong areas". As its popularity grew, internet users have expanded upon the original concept by creating different levels and entities which inhabit the Backrooms. Fan-made video games, collaborative fiction wikis and YouTube videos have also been inspired by the Backrooms.
Impact and fandom
As the creepypasta grew in popularity, some users claimed to have visited the Backrooms and others shared memes about it across social media. On the subreddits r/creepypasta and later r/backrooms, users began to share stories about the Backrooms. A fandom began to develop around the Backrooms and creators expanded upon the original iteration of the creepypasta by creating additional floors or "levels" and entities which populate them. Happy Mag noted in particular two other levels: Level 1, a level with industrial architecture, and Level 2, a darkly lit level with long service tunnels, with the original version named Level 0.
The fandom began dividing into groups such as "originalists", fans who prefer the original Backrooms, and "expansionists", who continue to expand the Backrooms with new levels. A Reddit user named Litbeep created a subreddit called r/TrueBackrooms focusing only on the original version. ABC News said that unlike fandoms surrounding existing properties, the lack of a canonical Backrooms made "drawing a line between authentic storytelling and jokes" difficult. It grouped the Backrooms into an "emerging genre of collaborative online horror" which also included the SCP Foundation.In March 2022, r/backrooms had over 157,000 members and the creepypasta began to amass a following on TikTok.
Dan Erickson, creator of the television series Severance, named the Backrooms as one of his many influences while working on the series.
Terminology
The term originally described computers on ARPANET that were hidden, programmed to receive messages but not respond to or acknowledge anything, thus remaining invisible, in the dark.
Since ARPANET, the usage of dark net has expanded to include friend-to-friend networks (usually used for file sharing with a peer-to-peer connection) and privacy networks such as Tor. The reciprocal term for a darknet is a clearnet or the surface web when referring to content indexable by search engines.
The term "darknet" is often used interchangeably with "dark web" because of the quantity of hidden services on Tor's darknet. Additionally, the term is often inaccurately used interchangeably with the deep web because of Tor's history as a platform that could not be search-indexed. Mixing uses of both these terms has been described as inaccurate, with some commentators recommending the terms be used in distinct fashions.
Origins
"Darknet" was coined in the 1970s to designate networks isolated from ARPANET (the government-founded military/academical network which evolved into the Internet), for security purposes. Darknet addresses could receive data from ARPANET but did not appear in the network lists and would not answer pings or other inquiries.
The term gained public acceptance following publication of "The Darknet and the Future of Content Distribution", a 2002 paper by Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman, four employees of Microsoft who argued the presence of the darknet was the primary hindrance to the development of workable digital rights management (DRM) technologies and made copyright infringement inevitable.
This paper described "darknet" more generally as any type of parallel network that is encrypted or requires a specific protocol to allow a user to connect to it.
Sub-cultures
Journalist J. D. Lasica, in his 2005 book Darknet: Hollywood's War Against the Digital Generation, described the darknet's reach encompassing file sharing networks. Subsequently, in 2014, journalist Jamie Bartlett in his book The Dark Net used the term to describe a range of underground and emergent subcultures, including camgirls, cryptoanarchists, darknet drug markets, self harm communities, social media racists, and transhumanists.
Uses
Darknets in general may be used for various reasons, such as:
To better protect the privacy rights of citizens from targeted and mass surveillance
Computer crime (cracking, file corruption, etc.)
Protecting dissidents from political reprisal
File sharing (warez, personal files, pornography, confidential files, illegal or counterfeit software, etc.)
Sale of restricted goods on darknet markets
Whistleblowing and news leaks
Purchase or sale of illicit or illegal goods or services
Circumventing network censorship and content-filtering systems, or bypassing restrictive firewall policies
softwere
All darknets require specific software installed or network configurations made to access them, such as Tor, which can be accessed via a customized browser from Vidalia (aka the Tor browser bundle), or alternatively via a proxy configured to perform the same function
Active
Tor is the most popular instance of a darknet, often mistakenly equated with darknet in general.
A cartogram illustrating the average number of Tor users per day between August 2012 and July 2013
Alphabetical list:
anoNet is a decentralized friend-to-friend network built using VPN and software BGP routers.
BitTorrent is a high performance semi-decentralized peer-to-peer communication protocol.
Decentralized network 42 (not for anonymity but research purposes).
Freenet is a popular DHT file hosting darknet platform. It supports friend-to-friend and opennet modes.
GNUnet can be utilized as a darknet if the "F2F (network) topology" option is enabled.
I2P (Invisible Internet Project) is an overlay proxy network that features hidden services called "Eepsites".
IPFS has a browser extension that may backup popular webpages.
RetroShare is a friend-to-friend messenger communication and file transfer platform. It may be used as a darknet if DHT and Discovery features are disabled.
Riffle is a government, client-server darknet system that simultaneously provides secure anonymity (as long as at least one server remains uncompromised), efficient computation, and minimal bandwidth burden.
Secure Scuttlebutt is a peer-to peer communication protocol, mesh network, and self-hosted social media ecosystem
Syndie is software used to publish distributed forums over the anonymous networks of I2P, Tor and Freenet.
Tor (The onion router) is an anonymity network that also features a darknet – via its onion services.
Tribler is an anonymous BitTorrent client with built in search engine, and non-web, worldwide publishing through channels.
Urbit is a federated system of personal servers in a peer-to-peer overlay network.
Zeronet is a DHT Web 2.0 hosting with Tor users.
What is Darknet market?
A darknet market is a commercial website on the dark web that operates via darknets such as Tor or I2P. They function primarily as black markets, selling or brokering transactions involving drugs, cyber-arms, weapons, counterfeit currency, stolen credit card details, forged documents, unlicensed pharmaceuticals,[5] steroids, and other illicit goods as well as the sale of legal products. In December 2014, a study by Gareth Owen from the University of Portsmouth suggested the second most popular sites on Tor were darknet markets.
Following on from the model developed by Silk Road, contemporary markets are characterized by their use of darknet anonymized access (typically Tor), Bitcoin or Monero payment with escrow services, and eBay-like vendor feedback systems.
Silk Road and early markets
The first marketplace to use both Tor and Bitcoin escrow was Silk Road, founded by Ross Ulbricht under pseudonym "Dread Pirate Roberts" in February 2011. In June 2011, Gawker published an article about the site, which led to "Internet buzz" and an increase in website traffic This in turn led to political pressure from Senator Chuck Schumer on the US DEA and Department of Justice to shut it down,] which they finally did in October 2013 after a lengthy investigation. Silk Road's use of all of Tor, Bitcoin escrow and feedback systems would set the standard for new darknet markets for the coming years. The shutdown was described by news site DeepDotWeb as "the best advertising the dark net markets could have hoped for" following the proliferation of competing sites this caused, and The Guardian predicted others would take over the market that Silk Road previously dominated.
The months and years after Silk Road's closure were marked by a greatly increased number of shorter-lived markets as well as semi-regular law enforcement take downs, hacks, scams and voluntary closures.
Atlantis, the first site to accept Litecoin as well as Bitcoin, closed in September 2013, just prior to the Silk Road raid, leaving users just one week to withdraw any coins. In October 2013, Project Black Flag closed and stole their users' bitcoins in the panic shortly after Silk Road's shut down Black Market Reloaded's popularity increased dramatically after the closure of Silk Road and Sheep Marketplace; however, in late November 2013, the owner of Black Market Reloaded announced that the website would be taken offline due to the unmanageable influx of new customers this caused Sheep Marketplace, which launched in March 2013, was one of the lesser known sites to gain popularity with Silk Road's closure.Not long after those events, in December 2013, it ceased operation after two Florida men stole $6 million worth of users' Bitcoins.
Market types
Items on a typical centralized darknet market are listed from a range of vendors in an eBay-like marketplace format. Virtually all such markets have advanced reputation, search and shipping features similar to Amazon.com.
By 2015 some of the most popular vendors had their own dedicated online shops separate from the large marketplaces.
Individual sites had returned to operating on the clearnet, with mixed success.
Some criminal internet forums such as the defunct Tor Carding Forum and the Russian Anonymous Marketplace function as markets with trusted members providing escrow services, and users engaging in off-forum messaging.
In May 2014 the "Deepify" service attempted to automate the process of setting up markets with a SAAS solution; however, this closed a short time later.
Following repeated problems associated with centralized infrastructure, a number of decentralized marketplace software alternatives were set up using blockchain or peer-to-peer technologies, including OpenBazaar[ and Bitmarkets
Vendors
To list on a market, a vendor may have undergone an application process via referral, proof of reputation from another market or given a cash deposit to the market.
Many vendors list their wares on multiple markets, ensuring they retain their reputation even should a single market place close. Grams have launched "InfoDesk" to allow central content and identity management for vendors as well as PGP key distribution.
Meanwhile, individual law enforcement operations regularly investigate and arrest individual vendors and those purchasing significant quantities for personal use.
A February 2016 report suggested that a quarter of all DNM purchases were for resale.
Products
An analysis of the defunct Evolution marketplace shows the different types of products and vendors on a market
Drugs
Whilst a great many products are sold, drugs dominate the numbers of listings, with the drugs including cannabis, MDMA, modafinine, LSD, cocaine, and designer drugs.
CYBER CRIME
Cyber crime and hacking services for financial institutions and banks have also been offered over the dark web. Markets such as AlphaBay Market have hosted a significant share of the commercial fraud market, featuring carding, counterfeiting and many related services. Loyalty card information is also sold as it is easy to launder.
Prohibitions and restrictions
Many markets refuse to list weapons or poisons. Markets such as the original Silk Road would refuse to list anything where the "purpose is to harm or defraud, such as stolen credit cards, assassinations, and weapons of mass destruction".
Later markets such as Evolution ban "child pornography, services related to murder/assassination/terrorism, prostitution, Ponzi schemes, and lotteries", but allow the wholesaling of credit card data.
The market in firearms appears to attract extra attention from law enforcement, as does the selling of other weapons such as certain types of knives and blades.
Market operations
Nachash, former proprietor of Doxbin, wrote a guide in early 2015 entitled So, You Want To Be a Darknet Drug Lord
Background research tasks included learning from past drug lords, researching legal matters, studying law enforcement agency tactics and obtaining legal representation. With regards to the prospective market's hosting, he recommends identifying a hosting country with gaps in their mutual legal assistance treaty with one's country of residence, avoiding overpriced bulletproof hosting and choosing a web host with Tor support that accepts suitably hard-to-trace payment. Patterns recommended to avoid include hiring hitmen like Dread Pirate Roberts, and sharing handles for software questions on sites like Stack Exchange.
He advises on running a secured server operating system with a server-side transparent Tor proxy server,
hardening web application configurations, Tor-based server administration, automated server configuration management rebuild and secure destruction with frequent server relocation rather than a darknet managed hosting service.To protect against guard node deanonymization he recommends obfuscating traffic by investing in Tor relays which the market site will exclusively use.
For a local machine configuration he recommends a computer purchased for cash running Linux, using a local Tor transparent proxy. For operations security he suggests avoiding storing conversation logs, varying writing styles, avoiding mobile phone-based tracking and leaking false personal details to further obfuscate one's identity. Use of OTR and PGP are recommended.
He recommends verifying market employees carefully, and to weed out law enforcement infiltration through barium meal tests.
Law enforcement and intelligence agencies have expanded investigations of dark web markets,
Fraudulent market
A large number of services pretend to be a legitimate vendor shop, or marketplace of some kind in order to defraud people. These include the notoriously unreliable gun stores,[citation needed] or even fake assassination websites.
Exit scam
Graphical illustration of the life-cycle of vendors
Centralized market escrow allows a market to close down and "exit" with the buyer's and vendor's cryptocurrency at any time. This has happened on several occasions such as with BlackBank,Evolution,and Wall Street Market.
Individual vendors often reach a point of reputation maturity whereby they have sold sufficient product reliably to have gained a significant reputation and accumulated escrowed funds; many may choose to exit with the funds rather than compete at the higher-volume higher-priced matured product level.
Commentary
In December 2014, an exhibition by Carmen Weisskopf and Domagoj Smoljo entitled "The Darknet: From Memes to Onionland" explored Darknet culture. This featured a bot called the "Random Darknet Shopper" which spent $100 in BTC per week on products listed on Agora.Their aim was to explore the ethical and philosophical implications of these markets, which, despite high-profile internationally co-ordinated raids, persist and flourish.
James Martin's 2014 book Drugs on the Dark Net: How Cryptomarkets are Transforming the Global Trade in Illicit Drugs discusses some vendors who are even branding their opium or cocaine as "fair trade", "organic" or sourced from conflict-free zones. In June 2015 journalist Jamie Bartlett gave a TED talk about the state of the darknet market ecosystem as it stands today.
According to 2014 studies by Martin Aldridge & Décary-Hétu and a January 2015 report from the Global Drug Policy Observatory, many harm reduction trends have been spotted. These include the reduced risks associated with street dealing such as being offered hard drugs. The vendor feedback system provides accountability for risks of mixing and side effects and protection against scammers. Online forum communities provide information about safe drug use in an environment where users can anonymously ask questions. Some users report the online element having a moderating effect on their consumption due to the increased lead time ordering from the sites compared to street dealing.
Professor for addiction research Heino Stöver notes that the shops can be seen as a political statement, advancing drug legalization "from below". The results of these markets are higher quality and lower prices of psychoactive substances as well as a lower risk of violent incidents. A number of studies suggest that markets such as Silk Road may have helped users reduce the harm caused by illicit drug use, particularly compared with street-based drug marketplaces. Examples include the sale of high-quality products with low risk for contamination (including lacing and cutting), vendor-tested products, sharing of trip reports, and online discussion of harm reduction practices. Some health professionals such as "DoctorX" provide information, advice and drug-testing services on the darknet.
The quality of products is attributed to the competition and transparency of darknet markets which involve user feedback and reputation features.
Europol reported in December 2014, "We have lately seen a large amount of physical crime move online, at least the 'marketing' and delivery part of the business ... [Buyers can] get the illegal commodity delivered risk-free to a place of their choice by the mailman or a courier, or maybe by drone in the future, and can pay with virtual currency and in full anonymity, without the police being able to identify either the buyer or the seller."
In June 2015 the European Monitoring Centre for Drugs and Drug Addiction (EMCDDA) produced a report citing difficulties controlling virtual market places via darknet markets, social media and mobile apps.[137] In August 2015 it was announced that Interpol now offers a dedicated Dark Web training program featuring technical information on Tor and cybersecurity and simulated darknet market takedowns.
In October 2015 the UK's National Crime Agency and GCHQ announced the formation of a "Joint Operations Cell" to focus on cybercrime.[citation needed] In November 2015 this team would be tasked with tackling child exploitation on the dark web as well as other cybercrime.
In February 2015, the EMCDDA produced another report citing the increased importance of customer service and reputation management in the marketplace, the reduced risk of violence and increased product purity. It estimated a quarter of all purchases were for resale and that the trend towards decentralization meant they are unlikely to be eliminated any time soon.
A June 2016 report from the Global Drug Survey described how the markets are increasing in popularity, despite ongoing law enforcement action and scams. Other findings include consumers making purchases via friends operating Tor browser and Bitcoin payments, rather than directly. Access to markets in 79% of respondents' cases led to users trying a new type of drug.
DARK WEB
The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location. The dark web forms a small part of the deep web, the part of the Web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.
The darknets which constitute the dark web include small, friend-to-friend peer-to-peer networks, as well as large, popular networks such as Tor, Freenet, I2P, and Riffle operated by public organizations and individuals. Users of the dark web refer to the regular web as Clearnet due to its unencrypted nature. The Tor dark web or onionland uses the traffic anonymization technique of onion routing under the network's top-level domain suffix .onion.
WHAT IS THE PURPOSE OF THE USE OF DARK WEB
The dark web has often been confused with the deep web, the parts of the web not indexed (searchable) by search engines. The term dark web first emerged in 2009; however, it is unknown when the actual dark web first emerged. Many internet users only use the surface web, data that can be accessed by a typical web browser. The dark web forms a small part of the deep web, but requires custom software in order to access its content. This confusion dates back to at least 2009. Since then, especially in reporting on Silk Road, the two terms have often been conflated, despite recommendations that they should be distinguished.
The dark web, also known as darknet websites, are accessible only through networks such as Tor ("The Onion Routing" project) that are created specifically for the dark web.Tor browser and Tor-accessible sites are widely used among the darknet users and can be identified by the domain ".onion". Tor browsers create encrypted entry points and pathways for the user, allowing their dark web searches and actions to be anonymous.
Identities and locations of darknet users stay anonymous and cannot be tracked due to the layered encryption system. The darknet encryption technology routes users' data through a large number of intermediate servers, which protects the users' identity and guarantees anonymity. The transmitted information can be decrypted only by a subsequent node in the scheme, which leads to the exit node. The complicated system makes it almost impossible to reproduce the node path and decrypt the information layer by layer. Due to the high level of encryption, websites are not able to track geolocation and IP of their users, and users are not able to get this information about the host. Thus, communication between darknet users is highly encrypted allowing users to talk, blog, and share files confidentially.
Bitcoin services
Bitcoin is one of the main cryptocurrencies used in dark web marketplaces due to the flexibility and relative anonymity of the currency. With Bitcoin, people can hide their intentions as well as their identity. A common approach was to use a digital currency exchanger service which converted Bitcoin into an online game currency (such as gold coins in World of Warcraft) that will later be converted back into fiat currency. Bitcoin services such as tumblers are often available on Tor, and some – such as Grams – offer darknet market integration. A research study undertaken by Jean-Loup Richet, a research fellow at ESSEC, and carried out with the United Nations Office on Drugs and Crime, highlighted new trends in the use of Bitcoin tumblers for money laundering purposes.
Due to its relevance in the digital world, Bitcoin has become a popular product for users to scam companies with. Cybercriminal groups such as DDOS"4" have led to over 140 cyberattacks on companies since the emergence of Bitcoins in 2014. These attacks have led to the formation of other cybercriminal groups as well as Cyber Extortion.
Hacking groups and services
Many hackers sell their services either individually or as a part of groups. Such groups include xDedic, hackforum, Trojanforge, Mazafaka, dark0de and the TheRealDeal darknet market. Some have been known to track and extort apparent pedophiles. Cyber crimes and hacking services for financial institutions and banks have also been offered over the dark web. Attempts to monitor this activity have been made through various government and private organizations, and an examination of the tools used can be found in the Procedia Computer Science journal.Use of Internet-scale DNS distributed reflection denial of service (DRDoS) attacks have also been made through leveraging the dark web. There are many scam .onion sites also present which end up giving tools for download that are infected with trojan horses or backdoors.
Illegal pornography
The type of content that has the most popularity on the dark web is illegal pornography—more specifically, child pornography. About 80% of its web traffic is related to accessing child pornography despite it being difficult to find even on the dark web. A website called Lolita City, that has since been taken down, contained over 100 GB of child pornographic media and had about 15,000 members.
There is regular law enforcement action against sites distributing child pornography – often via compromising the site and tracking users' IP addresses. In 2015, the FBI investigated and took down a website called Playpen. At the time, Playpen was the largest child pornography website on the dark web with over 200,000 members. Sites use complex systems of guides, forums and community regulation. Other content includes sexualised torture and killing of animals and revenge porn. In May 2021, German police said that they had dismantled one of the world's biggest child pornography networks on the dark web known as Boystown, the website had over 400,000 registered users. Four people had been detained in raids, including a man from Paraguay, on suspicion of running the network. Europol said several pedophile chat sites were also taken down in the German-led intelligence operation.
Terrorism
Terrorist organizations took to the internet as early as the 1990s; however, the birth of the dark web attracted these organizations due to the anonymity, lack of regulation, social interaction, and easy accessibility. These groups have been taking advantage of the chat platforms within the dark web to inspire terrorist attacks. Groups have even posted "How To" guides, teaching people how to become and hide their identities as terrorists.
The dark web became a forum for terrorist propaganda, guiding information, and most importantly, funding. With the introduction of Bitcoin, an anonymous transactions were created which allowed for anonymous donations and funding. By accepting Bitcoin, terrorists were now able to fund money to purchase weaponry. In 2018, an individual named Ahmed Sarsur was charged for attempting to purchase explosives and hire snipers to aid Syrian terrorists, as well as attempting to provide them financial support, all through the dark web.
There are at least some real and fraudulent websites claiming to be used by ISIL (ISIS), including a fake one seized in Operation Onymous. With the increase of technology, it has allowed cyber terrorists to flourish by attacking the weaknesses of the technology.In the wake of the November 2015 Paris attacks, an actual such site was hacked by an Anonymous-affiliated hacker group, GhostSec, and replaced with an advert for Prozac. The Rawti Shax Islamist group was found to be operating on the dark web at one time.
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
========SOCIAL MEDIA========
Within the dark web, there exists emerging social media platforms similar to those on the World Wide Web, this is known as the Dark Web Social Network (DWSN). The DWSN works a like a regular social networking site where members can have customizable pages, have friends, like posts, and blog in forums. Facebook and other traditional social media platforms have begun to make dark-web versions of their websites to address problems associated with the traditional platforms and to continue their service in all areas of the World Wide Web. Unlike Facebook, the privacy policy of the DWSN requires that members are to reveal absolutely no personal information and remain anonymous.
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
-----Policing the dark web------
There have been arguments that the dark web promotes civil liberties, like "free speech, privacy, anonymity". Some prosecutors and government agencies are concerned that it is a haven for criminal activity.The deep and dark web are applications of integral internet features to provide privacy and anonymity. Policing involves targeting specific activities of the private web deemed illegal or subject to internet censorship.
When investigating online suspects, police typically use the IP (Internet Protocol) address of the individual; however, due to Tor browsers creating anonymity, this becomes an impossible tactic.As a result, law enforcement has employed many other tactics in order to identify and arrest those engaging in illegal activity on the dark web.OSINT, or Open Source Intelligence, are data collection tools that legally collect information from public sources. OSINT tools can be dark web specific to help officers find bits of information that would lead them to gaining more knowledge about interactions going on in the dark web.
In 2015 it was announced that Interpol now offers a dedicated dark web training program featuring technical information on Tor, cybersecurity and simulated darknet market takedowns. In October 2013 the UK's National Crime Agency and GCHQ announced the formation of a "Joint Operations Cell" to focus on cybercrime. In November 2015 this team would be tasked with tackling child exploitation on the dark web as well as other cybercrime.
In March 2017 the Congressional Research Service released an extensive report on the dark web, noting the changing dynamic of how information is accessed and presented on it; characterized by the unknown, it is of increasing interest to researchers, law enforcement, and policymakers. In August 2017, according to reportage, cybersecurity firms which specialize in monitoring and researching the dark web on behalf of banks and retailers routinely share their findings with the FBI and with other law enforcement agencies "when possible and necessary" regarding illegal content. The Russian-speaking underground offering a crime-as-a-service model is regarded as being particularly robust.