You can use "the dark web" without ever interacting with bad content. There's many wholesome services you could use or create, from social media and news to religion and blogs to software forges and file sharing. The point is to protect the innocent's safety and freedom, or to simplify self hosting, especially home servers. I see no reason to fear it. More info can be found in my description if you feel like reading.
When using Tor to access onion services aka the dark web, it is: User -> User Guard -> User Middle -> User Middle -> Onion Middle -> Onion Middle -> Onion Guard -> Destination. No exit is used, and end to end encryption exists between the user's Tor client and the onion service's Tor client. 8/9
When using Tor to access the regular internet aka clearnet, it is: User -> Guard -> Middle -> Exit -> Destination. And while the exit is where Tor's encryption ends, that isn't where ALL encryption ends. Typically speaking, your data IS protected against the exit because encryption still exists between your browser and the website. 7/9
Dear Jeff, what subjects or topics a student needs to learn in order to understand these concepts of security in computers/network? Can you recommend some books or lectures to go through?
The actual program that connects to the Tor network is Core Tor (also called Tor client above). And that's what's handling encryption at the relay/network layer. 6/9
Thanks for that awesome presentation. You asked us to ask questions rather than going to dark web so, could you help with tool(s) for tracking stolen phone IMEI? pls.
Onion Routing as a concept was created in 1995 by David Goldschlag, Mike Reed, and Paul Syverson. Some test networks were built with this idea, but they soon faded out. The one that actually stuck around was Tor, which was started in 2002, created by Roger Dingledine, Nick Mathewson, and Paul Syverson. EFF was only a sponsor. Soon the project grew and in 2006 they founded a non-profit called The Tor Project, which is still the current organization today. 5/9
is a sandbox even that safe? if the attacker knows there are in a sandbox they can VLAN hop right ? and there are malware that know they are in a sandbox and have instruction not to deploy so they can remain legit. example the telephone hack that is going on right now
Nothing is ever 100% secure. It’s all about lowering the risk to whatever level you can tolerate and that’s different for different people. I did a video on Risk Analysis a few years ago that you can find here by searching the IBM Technology channel
FBI(s) have a flashlight and other tools for traveling into the dark areas. Well, they should go if need too. Don’t you think some regular people might get lost to get there?
The translation is a bit confusing but if you are asking if it is risky to access the dark web from home, the answer is yes. I don't recommend it for most people
My comment isn't public for some reason, so I will try splitting up each statement. The average internet user accesses both the surface and deep web regularly. And both of these categories contain legal and illegal content. 1/9
Why the hell do you explain the evils to public, it's like displaying " Smoking and drinking is injuries to health" after seeing this video only some people get curious about it and explore it, you are the primary responsibility for passing this info to their brain 🧠 as advice but each individual brain cognitive will process it different way. So better stop talking about such things and talk about how to create AI for IBM mainframe and give rebirth to mainframe that helps society 😊
Not talking about something doesn't make it cease to exist. People with a genuine interest in cybersecurity need to understand what this is and how it works. The bad guys already know it.
If indexed web sites' ip adresses stored in dns servers. What about onions? The interesting part how network works in tor. Made a bit search.as i understamd each node in tor network has part of adress
Very educative video.. thanks for widening the horizon..excellent presentation and oratory skills as usual. Kudos Jeff..
Thanks so much!
For majority of us private browsing is the dark web
This is a valuable introduction. I was told by my friends not to try otherwise i will get sucked in because of the dark stuff inside.
Probably good advice for most people to follow
You can use "the dark web" without ever interacting with bad content. There's many wholesome services you could use or create, from social media and news to religion and blogs to software forges and file sharing. The point is to protect the innocent's safety and freedom, or to simplify self hosting, especially home servers. I see no reason to fear it. More info can be found in my description if you feel like reading.
And that's how u gonna know what's on the dark side
You know what, Jeff you are great explaining concepts.
Thanks for sharing such information.
Thanks so much for the kind compliments!
When using Tor to access onion services aka the dark web, it is: User -> User Guard -> User Middle -> User Middle -> Onion Middle -> Onion Middle -> Onion Guard -> Destination. No exit is used, and end to end encryption exists between the user's Tor client and the onion service's Tor client. 8/9
Lests build a UA-cam there.❤
Great as always 🙌🏾
Thanks for saying so!
Lemme grab my hoodie before listening to this mind-blowing field.
😎
I doubt the percentages given. What is 5% or 95%? Amount of data or what?
Thank you Jeff from CuritibaBrazil.
Obrigado to you for watching!
When using Tor to access the regular internet aka clearnet, it is: User -> Guard -> Middle -> Exit -> Destination. And while the exit is where Tor's encryption ends, that isn't where ALL encryption ends. Typically speaking, your data IS protected against the exit because encryption still exists between your browser and the website. 7/9
Dear Jeff, what subjects or topics a student needs to learn in order to understand these concepts of security in computers/network? Can you recommend some books or lectures to go through?
having knowledge of something is sometimes dangerous
definitely, but so is ignorance
No.
Next: Tails OS. Please.
The actual program that connects to the Tor network is Core Tor (also called Tor client above). And that's what's handling encryption at the relay/network layer. 6/9
Informative video
Glad you liked it!
It contains a lot of misinformation, as explained by my comments.
Thanks for that awesome presentation. You asked us to ask questions rather than going to dark web so, could you help with tool(s) for tracking stolen phone IMEI? pls.
I'm glad you liked it. I'd recommend working with your mobile service carrier for IMEI tracing.
You also can't just go on tor and search like normal browser, you need to have specific info about sites first
good point
He already said that in the beginning.
Great presentation. Thank You so much. 🙏
So glad you liked it!
Onion Routing as a concept was created in 1995 by David Goldschlag, Mike Reed, and Paul Syverson. Some test networks were built with this idea, but they soon faded out. The one that actually stuck around was Tor, which was started in 2002, created by Roger Dingledine, Nick Mathewson, and Paul Syverson. EFF was only a sponsor. Soon the project grew and in 2006 they founded a non-profit called The Tor Project, which is still the current organization today. 5/9
Although the concept is nicely explained, Dark Web is not just the Tor, there are many networks such as T2P, Freenet, Zeronet, etc.
I2P not T2P. Zeronet is dead, there's Zeronet Conservancy, but that is also minimally active.
is a sandbox even that safe? if the attacker knows there are in a sandbox they can VLAN hop right ? and there are malware that know they are in a sandbox and have instruction not to deploy so they can remain legit. example the telephone hack that is going on right now
Nothing is ever 100% secure. It’s all about lowering the risk to whatever level you can tolerate and that’s different for different people. I did a video on Risk Analysis a few years ago that you can find here by searching the IBM Technology channel
VPNs wouldn't add end to end encryption between you and the destination site, unless your destination is the provider of the VPN. 9/9
is it legal to look at scary gore link on the dark web just to be curious?
I'm not a lawyer and the laws are different in different places so it's probably best I not comment because I'd be out of my depth
@@jeffcrume then you wasted your 1min of your life commenting here
FBI(s) have a flashlight and other tools for traveling into the dark areas. Well, they should go if need too. Don’t you think some regular people might get lost to get there?
I agree. That's why I said in the video that I don't really recommend it.
Don't Go There. Let me tell you how to Go There.
AWESOME.EARTHLINGS ENJOY. EARTHLINGS BE INSPIRED.THANKS FOR EXPLAINING 😎😂🖖✌👽😱
The dark web is where the dark sith is
Kya dark web se Ghar ke liye online kuch kaam mistake hai
The translation is a bit confusing but if you are asking if it is risky to access the dark web from home, the answer is yes. I don't recommend it for most people
My comment isn't public for some reason, so I will try splitting up each statement. The average internet user accesses both the surface and deep web regularly. And both of these categories contain legal and illegal content. 1/9
The dark web isn't inherently a part of the deep web, search engines can and do index public sites. 2/9
How to go to dark web.
I provide a guide in my description you could use.
👍
Why the hell do you explain the evils to public, it's like displaying " Smoking and drinking is injuries to health" after seeing this video only some people get curious about it and explore it, you are the primary responsibility for passing this info to their brain 🧠 as advice but each individual brain cognitive will process it different way. So better stop talking about such things and talk about how to create AI for IBM mainframe and give rebirth to mainframe that helps society 😊
Not talking about something doesn't make it cease to exist. People with a genuine interest in cybersecurity need to understand what this is and how it works. The bad guys already know it.
@jeffcrume 👍 convincing reply. If you know how LLM & human brain work, then definitely you passed a bad dataset for training public Brain 🧠 .
Thank you sir for making this video. How can you defend a system if you don't understand how the system works?@@jeffcrume
Have a good bandwidth before using it
why?
I don't know if that will help much because the latency comes from the TOR nodes and your bandwidth just affects your path to the first of these
If indexed web sites' ip adresses stored in dns servers. What about onions? The interesting part how network works in tor.
Made a bit search.as i understamd each node in tor network has part of adress
Jeff Crume! Enough said. Take 🗒️
You're very kind