SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
Cuartero, John Brian D.

DARKNET: THE OTHER SIDE
 A place in the internet where people can

be anonymous and hidden from the usual
search engines.
The Internet
 The Visible
 This is what most people visit and use.

 Example of these websites are:
 Facebook, Google, Yahoo, Twitter, etc.

 The Invisible
 Information that are not for public consumption
 Websites that hide from authority (Illegal Markets)
The Internet Iceberg
 The invisible web

does not
necessarily mean
that it is
something bad.
 There are just
cases that it is
used for a purpose
that is not ethical
or moral
The Bad Side of the Darknet
 There are sites

like Silk Road that
sell drugs,
weaponry and
other things that
are not available
normally since
they are
dangerous for the
society.
Effects on e-commerce
 There might be a small effect on e-commerce

knowing that legal businesses won’t need to
go in the deep web to sell.
 The only businesses that go underground are

those who need to hide something or illegal.
What will happen in the next
2 years?
 The founder of Silk Road was just recently

caught. There might be an increase in
aggressiveness shutting down these hidden
illegal websites.
 Simultaneously, other people who actively

use the deep web for illegal activities will try
to open up new markets and at the same time
The e-commerce boom
 Business transactions online will become more
normal and people will become less concerned in

putting up their information in the internet
because the generation who consumes products
have more knowledge regarding technology and
basically the norm.
 Traditional businesses will have to add an online
facility to cope up with the competitors that
utilize the opportunities that is the web
availability or presence of a product.

Mais conteúdo relacionado

Mais procurados

Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Lawblaine_5
 
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan HeuerYour Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan HeuerUnivention GmbH
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpumajcullishpum
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social MediaDaliahSaper
 
Misuse of internet - ppt
Misuse of internet - pptMisuse of internet - ppt
Misuse of internet - pptJincy24
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcRay Brannon
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual PropertyPrimumMarketing
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacyopeyemiatilola1992
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)kmcintire84
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevarajessica97
 
Online Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent ItOnline Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent Itbglover136
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismREVULN
 
Gloria flores
Gloria floresGloria flores
Gloria floresyaya700
 

Mais procurados (20)

Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Law
 
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan HeuerYour Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
Your Guide to Digital Selfdefense - Pernille Tranberg und Steffan Heuer
 
2008 07-20 Google China.turnoy
2008 07-20 Google China.turnoy2008 07-20 Google China.turnoy
2008 07-20 Google China.turnoy
 
Darkside
DarksideDarkside
Darkside
 
Online defamation
Online defamationOnline defamation
Online defamation
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Misuse of internet - ppt
Misuse of internet - pptMisuse of internet - ppt
Misuse of internet - ppt
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual Property
 
Forbidden Fruit
Forbidden FruitForbidden Fruit
Forbidden Fruit
 
Allan Watt
Allan WattAllan Watt
Allan Watt
 
Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)
 
Jessica guevara
Jessica guevaraJessica guevara
Jessica guevara
 
Blog Law
Blog LawBlog Law
Blog Law
 
SOPA
SOPASOPA
SOPA
 
Online Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent ItOnline Identity Theft & How To Prevent It
Online Identity Theft & How To Prevent It
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
Gloria flores
Gloria floresGloria flores
Gloria flores
 

Destaque (10)

Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
日本刀
日本刀日本刀
日本刀
 
Drugs & tthe Dark Net
Drugs & tthe Dark NetDrugs & tthe Dark Net
Drugs & tthe Dark Net
 
Darknet (ec)
Darknet (ec) Darknet (ec)
Darknet (ec)
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Darknet
DarknetDarknet
Darknet
 
Deep web
Deep webDeep web
Deep web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Ceramic Bearing ppt
Ceramic Bearing pptCeramic Bearing ppt
Ceramic Bearing ppt
 
Deep Web
Deep WebDeep Web
Deep Web
 

Semelhante a Darknet: The Other Side

ABOUT DARK WEB
ABOUT DARK WEB ABOUT DARK WEB
ABOUT DARK WEB VenkatVs7
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeOllieShoresna
 
Legal, Ethical and Societal Issues in Media and Information
Legal, Ethical and Societal Issues in Media and Information Legal, Ethical and Societal Issues in Media and Information
Legal, Ethical and Societal Issues in Media and Information AshleyPlays1
 
Smart Crawler, For Efficient Harvesting Deep Web...
Smart Crawler, For Efficient Harvesting Deep Web...Smart Crawler, For Efficient Harvesting Deep Web...
Smart Crawler, For Efficient Harvesting Deep Web...Jessica Rinehart
 
Invasion Of Privacy Analysis
Invasion Of Privacy AnalysisInvasion Of Privacy Analysis
Invasion Of Privacy AnalysisJill Lyons
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetPaul Elliott
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 
Dark Net
Dark NetDark Net
Dark NetRiya V
 
Understanding The Basis Of The Dark Web
Understanding The Basis Of The Dark WebUnderstanding The Basis Of The Dark Web
Understanding The Basis Of The Dark WebCarolina Fox
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webPaul Brooks
 
The Importance Of Invasion Of Privacy
The Importance Of Invasion Of PrivacyThe Importance Of Invasion Of Privacy
The Importance Of Invasion Of PrivacyStacey Cruz
 
Do not put too much information pdf
Do not put too much information pdfDo not put too much information pdf
Do not put too much information pdfShangli Jiang
 
Fallacies Of Internet Censorship Essay
Fallacies Of Internet Censorship EssayFallacies Of Internet Censorship Essay
Fallacies Of Internet Censorship EssayLisa Fields
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 

Semelhante a Darknet: The Other Side (20)

Deep web
Deep webDeep web
Deep web
 
ABOUT DARK WEB
ABOUT DARK WEB ABOUT DARK WEB
ABOUT DARK WEB
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Deep web
Deep webDeep web
Deep web
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic Se
 
Legal, Ethical and Societal Issues in Media and Information
Legal, Ethical and Societal Issues in Media and Information Legal, Ethical and Societal Issues in Media and Information
Legal, Ethical and Societal Issues in Media and Information
 
Software Piracy Essay
Software Piracy EssaySoftware Piracy Essay
Software Piracy Essay
 
Smart Crawler, For Efficient Harvesting Deep Web...
Smart Crawler, For Efficient Harvesting Deep Web...Smart Crawler, For Efficient Harvesting Deep Web...
Smart Crawler, For Efficient Harvesting Deep Web...
 
Invasion Of Privacy Analysis
Invasion Of Privacy AnalysisInvasion Of Privacy Analysis
Invasion Of Privacy Analysis
 
DCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_NetDCB1309 - F2_Dark_Net
DCB1309 - F2_Dark_Net
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Dark Net
Dark NetDark Net
Dark Net
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Understanding The Basis Of The Dark Web
Understanding The Basis Of The Dark WebUnderstanding The Basis Of The Dark Web
Understanding The Basis Of The Dark Web
 
Mensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark webMensworldhq.com what happens on the dark web
Mensworldhq.com what happens on the dark web
 
The Importance Of Invasion Of Privacy
The Importance Of Invasion Of PrivacyThe Importance Of Invasion Of Privacy
The Importance Of Invasion Of Privacy
 
Online Piracy Essay
Online Piracy EssayOnline Piracy Essay
Online Piracy Essay
 
Do not put too much information pdf
Do not put too much information pdfDo not put too much information pdf
Do not put too much information pdf
 
Fallacies Of Internet Censorship Essay
Fallacies Of Internet Censorship EssayFallacies Of Internet Censorship Essay
Fallacies Of Internet Censorship Essay
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 

Último

Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 

Último (20)

20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 

Darknet: The Other Side

  • 1. Cuartero, John Brian D. DARKNET: THE OTHER SIDE
  • 2.  A place in the internet where people can be anonymous and hidden from the usual search engines.
  • 3. The Internet  The Visible  This is what most people visit and use.  Example of these websites are:  Facebook, Google, Yahoo, Twitter, etc.  The Invisible  Information that are not for public consumption  Websites that hide from authority (Illegal Markets)
  • 4. The Internet Iceberg  The invisible web does not necessarily mean that it is something bad.  There are just cases that it is used for a purpose that is not ethical or moral
  • 5. The Bad Side of the Darknet  There are sites like Silk Road that sell drugs, weaponry and other things that are not available normally since they are dangerous for the society.
  • 6. Effects on e-commerce  There might be a small effect on e-commerce knowing that legal businesses won’t need to go in the deep web to sell.  The only businesses that go underground are those who need to hide something or illegal.
  • 7. What will happen in the next 2 years?  The founder of Silk Road was just recently caught. There might be an increase in aggressiveness shutting down these hidden illegal websites.  Simultaneously, other people who actively use the deep web for illegal activities will try to open up new markets and at the same time
  • 8. The e-commerce boom  Business transactions online will become more normal and people will become less concerned in putting up their information in the internet because the generation who consumes products have more knowledge regarding technology and basically the norm.  Traditional businesses will have to add an online facility to cope up with the competitors that utilize the opportunities that is the web availability or presence of a product.

Notas do Editor

  1. http://www.theguardian.com/society/2013/oct/06/dark-net-drugs