Tor Browser and The Dark Web Ghoutham Manokar Liability This - - PowerPoint PPT Presentation

tor browser and the dark web
SMART_READER_LITE
LIVE PREVIEW

Tor Browser and The Dark Web Ghoutham Manokar Liability This - - PowerPoint PPT Presentation

Tor Browser and The Dark Web Ghoutham Manokar Liability This presentation was made for informational and educational purposes only. Ghoutham does not make any representation with respect to the accuracy, applicability, or completeness of the


slide-1
SLIDE 1

Tor Browser and The Dark Web

Ghoutham Manokar

slide-2
SLIDE 2

Liability

This presentation was made for informational and educational purposes

  • nly. Ghoutham does not make any representation with respect to the

accuracy, applicability, or completeness of the Presentation. Ghoutham does not warrant the performance, effectiveness or applicability of any sites or software listed or linked to in any of the Presentation sources. Please adhere your local state and federal laws.

slide-3
SLIDE 3

“Tor is the strongest tool for privacy and freedom online. It is free and open source software maintained by the Tor Project and a community of volunteers worldwide.”

  • torproject.org
slide-4
SLIDE 4

What is Tor? ????????

slide-5
SLIDE 5

What is Tor?

slide-6
SLIDE 6

What is Tor? LAYERS

slide-7
SLIDE 7

Limitations of Tor

slide-8
SLIDE 8

Limitations of Tor

slide-9
SLIDE 9

Plugins

slide-10
SLIDE 10

Limitations of Tor (Summary)

  • Exit Node data is unencrypted
  • Very Slow
  • Not all PC traffic is encrypted
  • ISPs can see Tor usage
  • Plugins can leak IP address
slide-11
SLIDE 11

Limitations of Tor (Summary)

  • Exit Node data is unencrypted
  • Very Slow
  • Not all PC traffic is encrypted
  • ISPs can see Tor usage
  • Plugins can leak IP address
slide-12
SLIDE 12

How to be safe(ish) with Tor

1.Don’t send anything personally identifiable

  • 2. Do not use Tor Browser in Fullscreen
  • 3. Do not use Bitcoin!
slide-13
SLIDE 13

Limitations of Tor (Summary)

  • Exit Node data is unencrypted
  • Very Slow
  • Not all PC traffic is encrypted
  • ISPs can see Tor usage
  • Plugins can leak IP address
slide-14
SLIDE 14
slide-15
SLIDE 15
slide-16
SLIDE 16

Limitations of Tor (Summary)

  • Exit Node data is unencrypted
  • Very Slow
  • Not all PC traffic is encrypted
  • ISPs can see Tor usage
  • Plugins can leak IP address
slide-17
SLIDE 17

Tips for Choosing a VPN

1.No Free VPNs 2.Payment through crypto, gift cards or cash

  • 3. No US Jurisdiction (Switzerland,

4.No Logs kept 5.Number of unique IPs and servers

Ghoutham’s Recommendation:

NordVPN

*Refer to liability disclaimer before use

slide-18
SLIDE 18

Limitations of Tor (Summary)

  • Exit Node data is unencrypted
  • Very Slow
  • Not all PC traffic is encrypted
  • ISPs can see Tor usage
  • Plugins can leak IP address
slide-19
SLIDE 19
slide-20
SLIDE 20
slide-21
SLIDE 21

Ethical analysis

slide-22
SLIDE 22

INELASTICITY AND ECONOMICS

$$$

slide-23
SLIDE 23

Producer Surplus Consumer Surplus

slide-24
SLIDE 24

Producer Surplus Consumer Surplus

slide-25
SLIDE 25

Act Utilitarian

Cost of Buying Drugs Locally = Price + Increase in local crime + Risk Cost of Dark Web Drugs = ½(Price) + Increase in worldwide crime + Risk + Wait Local Crime Increase > Worldwide crime increase Cost of Deep Web Drugs < Cost of Buying Drugs Locally

slide-26
SLIDE 26

Kant

  • Direct line from Supplier to consumers
  • No Local Drug Dealers (less crime)
  • No Cartels (less violence)
  • Drugs would not be cut (less deaths)
  • Lower Prices for everyone