Home » Articles

Articles

Drugs and weapons: what is sold on Russian dark web?

How are drugs and weapons sold? How much do they cost? How can you buy a safari to Donetsk People’s Republic (region of Ukraine)? We researched the Russian dark web and talked to its active users in order to answer these questions. Drugs The sale of Drugs is one of the main reasons for dark web popularity. A lot of ... Read More »

Research: Exploring the Regulation System and Market Culture of AlphaBay

Legal marketplaces are governed by federal state law, and market participants hold the right to resort to legal recourse whenever they might be faced with fraudulent behavior. Law enforcement promotes insurance, stability and transparency of commerce taking place across legal markets. Interestingly enough, illegal markets have to somehow emulate the main approaches adopted by legal markets to become successful and ... Read More »

Research: Most Studies that Examined the Structure of Darknet Communities Weren’t Accurate!

Throughout the past decade, the popularity of Darknet usage has been skyrocketing secondary to the public’s concern regarding their privacy and anonymity on the internet. Most research studies delving into the structural features of darknet communities during the past few years, concluded that most activities taking place in various darknet communities are more or less illegal. However, more recently, many ... Read More »

Using Bitcoin Transaction Analysis In Deanonymizing Users of Tor Hidden Services

Anonymity over the world wide web has never been a more critical issue. To achieve bulletproof anonymity, multiple solutions are being currently implemented by internet users all over the world. The most popular of which is the Tor network that represents the busiest anonymous communication network on the internet serving millions of users every day. Tor also enables webmasters to ... Read More »

An Overview of the Current Status of Linux’s Hyperledger Project

The Hyperledger project represents an initiative that was launched by the Linux Foundation in December 2015 to build an open source platform for the development of blockchains. The Hyperledger aims at establishing a proficient ecosystem throughout which coders and entrepreneurs can meet up and collaborate to build blockchains. So, Hyperledger is not a cryptocurrency; instead, it is a specialized hub ... Read More »

Op-Ed: PENISSMITH’s STATE of the DARKNET

PGP Signature from the author: [crayon-5a5a464c58291187370485/] Hello everyone. My name is Penissmith, and this is my second article for deepdotweb. I have been around darknet marketplaces for the last 5 years. It’s common knowledge now that I helped AlphaBay not only by serving as a ScamWatch member, but also helped as a moderator going by the name of Botah. Even ... Read More »

Best Ways Of Converting Bitcoin To Physical Money

In these exciting days, the Bitcoin price grows higher every week, and people are investing an increasing amount of money into cryptocurrencies. An important aspect of the swinging trend of crypto-money, is the trading activity. In simple words, trading is buying bitcoins when their price is low and selling them when it’s higher. Posed these conditions, it becomes of capital ... Read More »

Novel Defense Techniques To Secure Tor Communications – A Research Study

The Tor network depends mainly on resources, which are owned and managed by volunteers, to cater daily for millions of internet users seeking to maintain high levels of anonymity and privacy. As such, these resources have to be efficiently managed, by the Tor network, while also dealing with challenges facing its utility and robustness. A large percentage of the challenges ... Read More »

Tor (the myth and reality.PNG

An Overview of Sniper Attacks Against the Tor Network & Current Defenses

Wide scale internet censorship attempts by governments have catalyzed the creation of newer techniques to enhance the privacy of internet users and resist various censorship attempts. Tor represents the most widely used system for counteracting censorship and promoting the privacy of internet users. Currently, Tor serves hundreds of thousands of internet users all over the world and transfers approximately 3 ... Read More »

Utilizing the Blockchain Technology To Combat Global Software Piracy

Since the late 1970s, software piracy has grown into a serious problem negatively affecting software developers and undermining their ability to preserve the copyrights of their digital creations. The past 30 years have witnessed significant advancements in various computing technologies. However, developments and innovations in communications technologies have catalyzed software piracy, via provision of high speed delivery, mobility and portability ... Read More »

Messaging Apps Comparison

With the attack on privacy in todays world, having a means of secure messaging is more imperative than ever and within the world of the dark net and drugs this couldn’t be more true. Everyday it feels like big brothers shadowy talons are clawing us in and taking away more of our civil liberties and freedoms but with this has ... Read More »

Using a Large Scale Darknet To Identify Botnet Related Activities

The consequences of a wide array of malware programs, which are present today, have led to perilous incidents that induced serious damage not only to users’ assets, but also to the internet’s infrastructure. This is notably the case with botnets, which represent networks of compromised machines that are remotely controlled by botmasters to perform various forms of nefarious activities. By ... Read More »

Safe Messaging Options for Linux and Android

We live in an ever-changing technological world, and with all the constant revelations of government snooping upon private communications such as our texts, phone calls, and instant messenger chats, one thing that many people who want to keep their communications private can learn from is safe, encrypted messenger applications. Some mobile systems and applications come with end-to-end encryption, such as ... Read More »