Learning Tor and the Dark Web

Learning Tor and the Dark Web

English | MP4 | AVC 1280×720 | AAC 48KHz 2ch | 0h 56m | 153 MB

The dark web—a bastion of encrypted websites that can be visited and hosted anonymously—is home to criminals and privacy-minded citizens alike. In this course, learn about the social and technical underpinnings of the dark web, as well as how you can access and host websites that are hidden from prying eyes. Instructor Mike Chapple provides some history on the dark web and the Tor Browser, the basic software needed to access the dark web and browse the internet anonymously. He then goes over the basics of encryption and shines a light on the technical aspects of the Tor network, as well as how to use it to browse the standard Internet anonymously. Plus, get briefed on the potential vulnerabilities that users of anonymized networks should watch out for.

Topics include:

  • What is the dark web and who uses it?
  • The purpose of the Tor Browser
  • Cryptography and perfect forward secrecy
  • Installing the Tor Browser
  • Accessing the standard internet with the Tor Browser
  • Safeguarding privacy on Tor
  • The role of hidden servers on the dark web
  • Locating and accessing hidden websites
  • Vulnerabilities in Tor
Table of Contents

Introduction
1 Anonymous browsing with Tor
2 What you need to know

Welcome to the Dark Web
3 What is the dark web
4 Who uses the dark web
5 The history of Tor
6 The Tor Browser
7 Keeping it legal

Cryptographic Basics
8 Understanding encryption
9 Symmetric and asymmetric cryptography
10 Perfect forward secrecy

The Tor Network
11 Tor nodes
12 Directory servers
13 Relays and bridges

Browsing the Regular Web Anonymously
14 Installing Tor Browser
15 Routing traffic over the Tor network
16 Safeguarding privacy on Tor

Hidden Servers and the Dark Web
17 Hidden sites and two-way anonymity
18 Accessing hidden sites

Potential Vulnerabilities in Tor
19 Attacks against Tor
20 User behavior analysis
21 Passive traffic analysis
22 Circuit reconstruction
23 Circuit shaping

Conclusion
24 What’s next