Questions tagged [darknet]

A darknet is an anonymizing network where connections are made only between trusted peers which are using non-standard protocols and ports.

A darknet is an anonymizing network where connections are made only between trusted peers which are using non-standard protocols and ports.

25 questions
26
votes
1 answer

What are darknets, and how can they be used to provide security and anonymity in network communication?

One of the major problems with the internet is that it's difficult to stay anonymous while retaining the ability to communicate with a large number of people. While encryption can be done effectively at the application level to prevent eavesdropping…
Tom Marthenal
  • 3,272
  • 4
  • 22
  • 26
11
votes
1 answer

Why can't search engines reach the dark web?

Why can't search engines such as Google, Yahoo and Bing reach dark web and archive its content to display it in their results?
Petr
  • 665
  • 6
  • 12
4
votes
1 answer

How Honeypot and Greynet are different?

From what I have read about Greynet is, when we are talking about greynet, we are simply placing darknet inside network to monitor if someone is performing network scanning inside our network. These are the photos that I found for Greynet…
Riley Willow
  • 1,129
  • 9
  • 10
3
votes
3 answers

Using Tor from behind a Proxy (like Burp Suite)

I am interested in exploring a bit of the darknet, and I was wondering about the feasibility of running a Tor exit node from behind a local proxy like Burp Suite so that I could ID the destination URLs and look for hidden services, this could let me…
BSpiros
  • 175
  • 2
  • 7
3
votes
1 answer

Avoiding Dark Web monitoring detection

At our company, we offer security services to our clients. One of the things that management has pushed down to us is the need for dark web monitoring. Because I am in the business meetings as well, management has come to this conclusion because…
pm1391
  • 1,427
  • 2
  • 7
  • 19
3
votes
0 answers

Is there a secure, anonymous peer to peer matching solution?

I am newbie so please pardon my naivete. I was wondering if there is any cryptographic procedure that allows for peer to peer matching. Perhaps to illustrate my question I will use an example. Say I am in a country where marijuana is banned. I…
2
votes
1 answer

Do I REALLY need to change my email password when idnotify.com Dark Web Monitoring recommends?

I occasionally get alerts from idnotify.com Dark Web Monitoring, such as this one: 08/31/2019 COMPROMISED EMAIL ADDRESS Email Addresses: Jt***an@gmail.com Date Found: 08/26/2019 Password ************************* Potential Site…
Ryan
  • 315
  • 4
  • 13
2
votes
1 answer

Why is the data from a Tor exit node not encrypted?

Tor works in such a way that the data is encrypted by the three nodes. I.e., the entry node, relay and the exit node. But why is it not encrypted from the exit node to the destination server? Is this for speed? Or is it because it's not necessary as…
PSN
  • 133
  • 7
2
votes
2 answers

Proper precautions when studying darknet malware activity

I would like to get more into studying black market internet activities related to malware. I often see specific malware or kits for sale or ddos services, etc. How do researchers go about studying these things without having to illegally purchase…
1
vote
1 answer

Are darknets in the internet like Tor and i2p similar to darknets implemented for security like the CAIDA network telescope?

I am planning to implement a darknet in an organizational network to work alongside Snort to detect malicious scanning activities in the network like the CAIDA network telescope/Internet Motion Sensor. I am a little confused with the darknets like…
rajumon
  • 11
  • 1
1
vote
1 answer

Legal purposes and advantages for Dark Web

I would like to explore the dark web just to experience and understand it, but I'm not really sure what to "do" once I'm there and I don't want to run into anything illegal. What does the dark web offer that the "regular" web doesn't in such a…
SomeGuy
  • 730
  • 3
  • 18
1
vote
1 answer

Does my host machine stay completely safe if I'm browsing the dark web using virtual box or vmware on bridge network connection?

I'm just asking if my host machine stays safe when browsing the dark web darknet using Tor on a virtual machine with bridge connection through the host machine ? Since the virtual machine will be using the same RAM with host machine, can a virus…
1
vote
3 answers

How to block I2P and Freenet to my network?

I am trying to find a way to block I2P and Freenet darknets in a corporate network. Does anyone know a way to block them (on firewall)? Do I need to close particular ports or block entry nodes (like Tor)?
Kajua
  • 19
  • 2
0
votes
2 answers

How did piratebay.se search engine get in Chrome as an "other search engine"

I have an IT client with a user who had piratebay.se/... listed within his Chrome's (v39, 64-bit, OS X, 10.10.1) "Other Search Engine" section. I know a user could manually add it and suspect the piratebay.se website could have offered to add it…
user27014
0
votes
2 answers

How are data breach lists sourced and distributed?

I understand at an elementary level how data breaches tend to be distributed, starting with friends of the attacker/discoverer and then being distributed via forums, paste bins, etc. However I was wondering is there a common location/forum/method…
Rivesticles
  • 644
  • 3
  • 13
1
2