background preloader

Veille technologique - Deep WEB

Facebook Twitter

Veille de BTS SIO 2éme année touchant les droits sur la vie privée et le réseau.

Tor and HTTPS. Click the "Tor" button to see what data is visible to eavesdroppers when you're using Tor. The button will turn green to indicate that Tor is on.Click the "HTTPS" button to see what data is visible to eavesdroppers when you're using HTTPS. The button will turn green to indicate that HTTPS is on.When both buttons are green, you see the data that is visible to eavesdroppers when you are using both tools.When both buttons are grey, you see the data that is visible to eavesdroppers when you don't use either tool.Potentially visible data includes: the site you are visiting (SITE.COM), your username and password (USER/PW), the data you are transmitting (DATA), your IP address (LOCATION), and whether or not you are using Tor (TOR).

Almost Everyone Involved in Developing Tor was (or is) Funded by the US Government. “The United States government can’t simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, “Oh, it’s another CIA agent.” If those are the only people using the network.” —Roger Dingledine, co-founder of the Tor Network, 2004 In early July, hacker Jacob Appelbaum and two other security experts published a blockbuster story in conjunction with the German press. They had obtained leaked top secret NSA documents and source code showing that the surveillance agency had targeted and potentially penetrated the Tor Network, a widely used privacy tool considered to be the holy grail of online anonymity.

Internet privacy activists and organizations reacted to the news with shock. But the German exposé showed Tor providing the opposite of anonymity: it singled out users for total NSA surveillance, potentially sucking up and recording everything they did online. “A branch of the U.S. NSA? Brief history of Tor. Onion Routing: Our Sponsors. This research was supported in part at NRL's Center for High Assurance Computer Systems (CHACS) by: Office of Naval Research (ONR), Basic R&D work in addition to support for the coding of all generation systems (0,1, and 2).

Support for deployment of generation 2 (Tor) testbed and open source development site. Defense Advanced Research Projects Agency (DARPA), High Confidence Networking Program, and Fault Tolerant Networks Program Support for system performance assessments and system improvements. Support for robustness, survivability, traffic management, and congestion control.

NRL 6.2 Initiatives General Onion Routing development, Operation of the generations 0 and 1 Testbed Onion Routing Networks. Design and development of Location Hidden Services. Historical page reflecting as of 2005, not regularly maintained. Planète terre / La face cachée du web. Darknet, la face cachée du web. Si vous vous intéressez au web et à son environnement, alors le web profond est un domaine qui devrait attirer votre curiosité. Le Darknet est un sujet complexe et à ne pas mettre entre toutes les mains vu la présence de contenu plus qu’illicite… Quand vous naviguez sur le web vous n’avez en faite accès qu’à une partie infime d’Internet avec les moteurs de recherche comme Google ou Yahoo. Ceux sont des sites web cryptés et l’ont en compte 500 fois plus que que sur le web traditionnel. Il existe donc un Internet parallèle sans aucune limite appelé Le Darknet pour les plus anglophones.

C’est donc des pages qui ne sont pas indexées et consultables via un navigateur traditionnel, raison pour laquelle elles ne sont pas présentes sur nos moteurs de recherche, mais vous ne pouvez pas non plus accéder à ces pages avec un navigateur web comme Chrome puisque ces pages du Darknet se termine en .onion. Pourquoi le Darknet a-t-il été créé ? Les dérives du Darknet Comment aller sur le Darknet ?