'Deep Web' and the challenge to National Security

arnabmit

Homo Communis Indus
Senior Member
Joined
Dec 25, 2012
Messages
6,242
Likes
7,522
Country flag

swatantra

New Member
Joined
Sep 10, 2014
Messages
3
Likes
1
you can access deep web using TOR program. It is being said that more than 70% web locates in deep web(not accessed or indexed by search engines like:google, yahoo, baidu etc.)
lot of criminal activity is being conducted without any censorship which includes banned drug sale and human trafficking, and some also has newly born extremist organisation, bounty hunters to kill gov officers.
 

fyodor

Regular Member
Joined
Apr 18, 2014
Messages
436
Likes
936
Country flag
the arrival of bitcoin has made illegal funding even more possible but that's not a fault of bitcoin per se, just like nuclear tech cannot be blamed for nuclear bombs
 

arnabmit

Homo Communis Indus
Senior Member
Joined
Dec 25, 2012
Messages
6,242
Likes
7,522
Country flag
Can anyone explain why deep web is not traceable? Logically all digital communication must leave behind some footprints. From what I understood, it masks the communication channel to bounce the signal multiple times along multiple TOR servers. If that is so, a heuristic algorithm needs to be strong & dynamic enough to sniff out patterns and encryption.

India might need to invest in multiple cloud supercomputers running into several exaflops. This is bonafide cyber security threat!

you can access deep web using TOR program. It is being said that more than 70% web locates in deep web(not accessed or indexed by search engines like:google, yahoo, baidu etc.)
lot of criminal activity is being conducted without any censorship which includes banned drug sale and human trafficking, and some also has newly born extremist organisation, bounty hunters to kill gov officers.
 

swatantra

New Member
Joined
Sep 10, 2014
Messages
3
Likes
1
Can anyone explain why deep web is not traceable? Logically all digital communication must leave behind some footprints. From what I understood, it masks the communication channel to bounce the signal multiple times along multiple TOR servers. If that is so, a heuristic algorithm needs to be strong & dynamic enough to sniff out patterns and encryption.

India might need to invest in multiple cloud supercomputers running into several exaflops. This is bonafide cyber security threat!
Exaflops has not been achieved by any country, but yes we can do petaflops. One bet is that developing quantum computers can sniff out any communication encryption, but requires lot of funds and knowledge resource, which we currently are deprived from.

NSA plans to infiltrate TOR servers by making a honeypot web.
 

Latest Replies

Global Defence

New threads

Articles

Top