Reputable News Site Now on the Dark Web

March 28, 2016

Does the presence of a major news site lend an air of legitimacy to the Dark Web? Wired announces, “ProPublica Launches the Dark Web’s First Major News Site.” Reporter Andy Greenberg tells us that ProPublica recently introduced a version of their site running on the Tor network. To understand why anyone would need such a high level of privacy just to read the news, imagine living under a censorship-happy government; ProPublica was inspired to launch the site while working on a report about Chinese online censorship.

Why not just navigate to ProPublica’s site through Tor? Greenberg explains the danger of malicious exit nodes:

“Of course, any privacy-conscious user can achieve a very similar level of anonymity by simply visiting ProPublica’s regular site through their Tor Browser. But as Tigas points out, that approach does leave the reader open to the risk of a malicious ‘exit node,’ the computer in Tor’s network of volunteer proxies that makes the final connection to the destination site. If the anonymous user connects to a part of ProPublica that isn’t SSL-encrypted—most of the site runs SSL, but not yet every page—then the malicious relay could read what the user is viewing. Or even on SSL-encrypted pages, the exit node could simply see that the user was visiting ProPublica. When a Tor user visits ProPublica’s Tor hidden service, by contrast—and the hidden service can only be accessed when the visitor runs Tor—the traffic stays under the cloak of Tor’s anonymity all the way to ProPublica’s server.”

The article does acknowledge that Deep Dot Web has been serving up news on the Dark Web for some time now. However, some believe this move from a reputable publisher is a game changer. ProPublica developer Mike Tigas stated:

“Personally I hope other people see that there are uses for hidden services that aren’t just hosting illegal sites. Having good examples of sites like ProPublica and Securedrop using hidden services shows that these things aren’t just for criminals.”

Will law-abiding, but privacy-loving, citizens soon flood the shadowy landscape of the Dark Web.

 

Cynthia Murrell, March 28, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Play Search the Game

March 25, 2016

Within the past few years, gamers have had the privilege to easily play brand new games as well as the old classics.  Nearly all of the games ever programmed are available through various channels from Steam, simulator, to system emulator.  While it is easy to locate a game if you know the name, main character, or even the gaming system, but with the thousands of games available maybe you want to save time and not have use a search engine.  Good news, everyone!

Sofotex, a free software download Web site, has a unique piece of freeware that you will probably want to download if you are a gamer. Igrulka is a search engine app programmed to search only games.  Here is the official description:

Igrulka is a unique software that helps you to search, find and play millions of games in the network.

“Once you download the installer, all you have to do is go to the download location on your computer and install the app.

Igrulka allows you to search for the games that you love either according to the categories they are in or by name. For example, you get games in the shooter, arcade, action, puzzle or racing games categories among many others.

If you would like to see more details about the available games, their names as well as their descriptions, all you have to do is hover over them using your mouse as shown below. Choose the game you want to play and click on it.”

According to the description, it looks like Igrulka searches through free games and perhaps the classics from systems.  In order to find out what Irgulka can do, download and play search results roulette.

 

Whitney Grace, March 25, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Bigger Picture Regarding Illegal Content Needed

March 25, 2016

Every once in awhile an article on the Dark Web comes along that takes a step back from the latest action on Tor and offers a deep-dive on the topic at large. Delving into the World of the Dark Web was recently published on Raconteur, for example. In this article, we learned the definition of darknets: networks only accessible through particular software, such as Tor, and trusted peer authorization. The article continues,

“The best known, and by far the most popular, darknet is the Onion Router (Tor), which was created by the US Naval Research Labs in the 90s as an enabler of secure communication and funded by the US Department of Defense. To navigate it you use the Tor browser, similar to Google Chrome or Internet Explorer apart from keeping the identity of the person doing the browsing a secret. Importantly, this secrecy also applies to what the user is looking at. It is because servers hosting websites on the Tor network, denoted by their .onion (dot onion) designation, are able to mask their location.”

Today, the Dark Web is publicly available to be used anonymously by anyone with darknet software and home to a fair amount of criminal activity. Researchers at King’s College London scraped the .onion sites and results suggested about 57 percent of Tor sites host illegal content. We wonder about the larger context; for example, what percent of sites viewed on mainstream internet browsers host illegal content?

 

Megan Feil, March 25, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

The Dark Web Cuts the Violence

March 23, 2016

Drug dealing is a shady business that takes place in a nefarious underground and runs discreetly under our noses.  Along with drug dealing comes a variety of violence involving guns, criminal offenses, and often death.   Countless people have lost their lives related to drug dealing, and that does not even include the people who overdosed.  Would you believe that the drug dealing violence is being curbed by the Dark Web?  TechDirt reveals, “How The Dark Net Is Making Drug Purchases Safer By Eliminating Associated Violence And Improving Quality.”

The Dark Web is the Internet’s underbelly, where stolen information and sex trafficking victims are sold, terrorists mingle, and, of course, drugs are peddled.  Who would have thought that the Dark Web would actually provide a beneficial service to society by sending drug dealers online and taking them off the streets?  With the drug dealers goes the associated violence.  There also appears to be a system of checks and balances, where drug users can leave feedback a la eBay.  It pushes the drug quality up as well, but is that a good or bad thing?

“The new report comes from the European Monitoring Centre for Drugs and Drug Addiction, which is funded by the European Union, and, as usual, is accompanied by an official comment from the relevant EU commissioner. Unfortunately, Dimitris Avramopoulos, the European Commissioner for Migration, Home Affairs and Citizenship, trots out the usual unthinking reaction to drug sales that has made the long-running and totally futile “war on drugs” one of the most destructive and counterproductive policies ever devised:

‘We should stop the abuse of the Internet by those wanting to turn it into a drug market. Technology is offering fresh opportunities for law enforcement to tackle online drug markets and reduce threats to public health. Let us seize these opportunities to attack the problem head-on and reduce drug supply online.’”

The war on drugs is a futile fight, but illegal substances do not benefit anyone.  While it is a boon to society for the crime to be taken off the streets, take into consideration that the Dark Web is also a breeding ground for crimes arguably worse than drug dealing.

 

Whitney Grace, March 23, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Change Is Hard, Especially in the User Interface

March 22, 2016

One of the most annoying things in life is when you go to the grocery store and notice they have rearranged the entire place since your last visit.  I always ask myself the question, “Why grocery store people did you do this to me?”  Part of the reason is to improve the shopping experience and product exposure, while the other half is to screw with customers (I cannot confirm the latter).  According to the Fuzzy Notepad with its Pokémon Evee mascot the post titled “We Have Always Been At War With UI” explains that programmers and users have always been at war with each other when it comes to the user interface.

Face it, Web sites (and other areas of life) need to change to maintain their relevancy.  The biggest problem related to UI changes is the roll out of said changes.  The post points out that users get confused and spend hours trying to understand the change.  Sometimes the change is announced, other times it is only applied to a certain number of users.

The post lists several changes to UI and how they were handled, describing how they were handled and also the programming.  One constant thread runs through the post is that users simply hate change, but the inevitable question of, “Why?” pops up.

“Ah, but why? I think too many developers trot this line out as an excuse to ignore all criticism of a change, which is very unhealthy. Complaints will always taper off over time, but that doesn’t mean people are happy, just that they’ve gone hoarse. Or, worse, they’ve quietly left, and your graphs won’t tell you why. People aren’t like computers and may not react instantly to change; they may stew for a while and drift away, or they may join a mass exodus when a suitable replacement comes along.”

Big data can measure anything and everything, but the data can be interpreted for or against the changes.  Even worse is that the analysts may not know what exactly they need to measure.  What can be done to avoid total confusion about changes is to have a plan, let users know in advance, and even create tutorial about how to use the changes.  Worse comes to worse, it can be changed back and then we move on.

 

Whitney Grace, March 22, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Infonomics and the Big Data Market Publishers Need to Consider

March 22, 2016

The article on Beyond the Book titled Data Not Content Is Now Publishers’ Product floats a new buzzword in its discussion of the future of information: infonomics, or the study of creation and consumption of information. The article compares information to petroleum as the resource that will cause quite a stir in this century. Grace Hong, Vice-President of Strategic Markets & Development for Wolters Kluwer’s Tax & Accounting, weighs in,

“When it comes to big data – and especially when we think about organizations like traditional publishing organizations – data in and of itself is not valuable.  It’s really about the insights and the problems that you’re able to solve,”  Hong tells CCC’s Chris Kenneally. “From a product standpoint and from a customer standpoint, it’s about asking the right questions and then really deeply understanding how this information can provide value to the customer, not only just mining the data that currently exists.”

Hong points out that the data itself is useless unless it has been produced correctly. That means asking the right questions and using the best technology available to find meaning in the massive collections of information possible to collect. Hong suggests that it is time for publishers to seize on the market created by Big Data.

 

Chelsea Kerwin, March 22, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

For Sale: Your Bank Information

March 21, 2016

One of the common commodities for sale on the Dark Web is bank, credit card, social security numbers, and other personal information.  This information can sell for a few bucks to hundreds of dollars depending on the quality and quantity of the information.   In order to buy personal information, usually the interested parties must journey to the Dark Web, but the International Business Times tells us that “Confidential Bank Details Available For Sale On Easily Found Web Site”  is for sale on the general Web and the information is being sold for as little as a couple pounds (or dollars for the US folks).  The Web site had a pretty simple set up, interested parties register, and then they have access to the stolen information for sale.

Keith Vaz, chairman of the home affairs select committee, wants the National Crime Agency (NCA) to use its power and fulfill its purpose to shut the Web site down.

“A statement from the NCA said: “We do not routinely confirm or deny investigations nor comment on individual sites. The NCA, alongside UK and international law enforcement partners and the private sector, are working to identify and as appropriate disrupt websites selling compromised card data. We will work closely with partners of the newly established Home Office Joint Fraud Task Force to strengthen the response.”

Online scams are getting worse and more powerful in stealing people’s information.  Overall, British citizens lost a total of 670 million pounds (or $972 million).  The government, however, believes the total losses are more in the range of 27 billion pounds (or $39.17 billion).

Scams are getting worse, because the criminals behind them are getting smarter and know how to get around security defenses.  Users need to wise up and learn about the Dark Web, take better steps to protect their information, and educate themselves on how to recognize scams.

 

Whitney Grace, March 21, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Sci Hub May Be Relegated to Dark Web Only

March 18, 2016

Academics are not done with innovating when it comes to the dissemination of free knowledge. Science Alert recently published Researcher illegally shares millions of science papers free online to spread knowledge. The article details Sci-Hub, an online service opened up by a researcher in Russia offers free access to more than 48 million journal articles, which is almost every peer-reviewed paper in existence. Additionally, it describes how Elsevier has sued Sci-Hub. The article summarizes how Sci-Hub works,

“The site works in two stages. First of all when you search for a paper, Sci-Hub tries to immediately download it from fellow pirate database LibGen. If that doesn’t work, Sci-Hub is able to bypass journal paywalls thanks to a range of access keys that have been donated by anonymous academics (thank you, science spies). This means that Sci-Hub can instantly access any paper published by the big guys, including JSTOR, Springer, Sage, and Elsevier, and deliver it to you for free within seconds. The site then automatically sends a copy of that paper to LibGen, to help share the love.”

What is fascinating about this case is that whether Elsevier or Sci-Hub wins, there may still be a means for Sci-Hub to continue offering unlimited journal access. As other articles on this subject have alluded, the founder of Sci-Hub sees its relegation to the Dark Web as its worst-case scenario.

 

Megan Feil, March 18, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

Google Decides to Be Nice to

March 18, 2016

Google is a renowned company for its technological endeavors, beautiful office campuses, smart employees, and how it is a company full of self-absorbed and competitive people.  While Google might have a lot of perks, it also has its dark side.  According to Quartz, Google wanted to build a more productive team so they launched Project Aristotle to analyze how and they found, “After Years Of Intensive Analysis, Google Discovers The Key To Good Teamwork Is being Nice.”

Project Aristotle studied hundreds of employees in different departments and analyzed their data.  They wanted to find a “magic formula,” but it all beats down to one of the things taught in kindergarten: be nice.

“Google’s data-driven approach ended up highlighting what leaders in the business world have known for a while; the best teams respect one another’s emotions and are mindful that all members should contribute to the conversation equally. It has less to do with who is in a team, and more with how a team’s members interact with one another.”

Team members who understand, respect, and allow each other to contribute to conversation equally.  It is a basic human tenant and even one of the better ways to manage a relationship, according to marriage therapists around the world.  Another result of the project is dubbed “psychological safety,” where team members create an environment with the established belief they can take risks and share ideas without ridicule.

Will psychological safety be a new buzzword since Google has “discovered” that being nice works so well?  The term has been around for a while, at least since 1999.

Google’s research yields a business practice that other companies have adopted: Costco, Trader Joes, Pixar, Sassie, and others to name a few.  Yet why is it so hard to be nice?

 

Whitney Grace, March 18, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Tails Increases Ease of Online Anonymity

March 17, 2016

The interest in browsing the internet anonymously does not appear to be fading. Softpedia recently posted Debian Makes It a Lot Easier for Users to Install the Tails Anonymous Live CD. Called the “amnesic incognito live system”, Tails is a GNU/Linux Live CD distribution which is based on the Debian operating system and allows your online activities to remain anonymous. Tails is driven by Tor and provides its users access to the anonymous Tor network. The article tells us,

Now, we all know how to write a Live ISO image on a USB key or a CD disc, right? But what you probably don’t know is that there’s an app for that, called Tails Installer, which the skilled Debian Privacy Tools maintainers team included in Debian repos. “The previous process for getting started with Tails was very complex and was problematic for less tech-savvy users,” developers explained. “It required starting Tails three times, and copying the full ISO image onto a USB stick twice before having a fully functional Tails USB stick with persistence enabled.”

As the article points out, Tails has a stamp of approval from Edward Snowden. It seems like before Debian, it would have been quite the stretch for many users to even consider adopting the use of Tails. However, using a Linux-based operating system, the pre-requisite for Tails, may also be a hurdle preventing wide-scale adoption. Time will tell.

 

Megan Feil, March 17, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

« Previous PageNext Page »

  • Archives

  • Recent Posts

  • Meta