The Darkweb Flashcards

1
Q

Traffic Analysis

A

A method of identifying locations and identities of traffic sources of interest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tor Network

A

A secure network which utilises strong encryption to exchange important information. It is accessed through the Tor browser, which then transports data through thousands of node machines in a circular path known as a circuit. Before data exchange, the sender provides their public key in exchange for the public key of each node on the circuit. At each hop, the destination node encrypts a combination of a session key and its public key using the senders public key. The sender can then decrypt this using their private key to obtain every public and session key in the circuit. Now sending actual data, each node stores the address of the node before it, uses its private key to decrypt and obtain the next node, then forwards it to this address. For the reply, symmetric encryption is used at each hop using the session keys priorly encrypted at each node.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Directory Node (Tor)

A

A node which stores a list of all other nodes on the Tor network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Guard Node (Tor)

A

The first node accessed on the Tor network when requesting a site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Exit Node (Tor)

A

The last node accessed on the Tor network when requesting a site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Relay Node (Tor)

A

A node accessed on the Tor network when requesting a site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Onion Routing

A

The use of multiple layers of encryption containing more encrypted data within to transmit data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Surface Web

A

The fraction of the world wide web easily available to the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Deep Web

A

The background data in the world wide web, often used by the surface web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Darknet

A

A section of the world wide web that cannot be accessed by web browsers. It functions via Tor and often facilitates malicious services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hidden Services

A

A service accessed on the Darknet which provides secure online communication, malware and hacking information, databases of personal or sensitive information, and certain financial, musical, and news-based services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Onion Addresses

A

Addresses used to access a web page on the Onion browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Darknet Marketplace

A

A virtual shop used for exchange of illegal or controversial services and items such as firearms, false identities, malware, and drugs. Exchanges utilise Bitcoin and Tor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Silk Road

A

A former successful Darknet marketplace with illustrated and categorised but often illegal products. It was taken down in 2013, and its creator Ulbricht was jailed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Deanonymisation

A

The use of methods to identify users and the location of services. In a Tor network, traffic analysis, perhaps using AI, can be used to achieve this, although the data being exchanged cannot be decrypted. Bitcoin users can also be deanonymized with immense difficulty using traffic analysis across a peer-to-peer network. Bitcoin researchers have created multiple new methods to prevent deanonymisation however, including single-use addresses, multi-signature Bitcoins, and bitcoin tumblers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bitcoin Tumbler

A

A process where groups of Bitcoin transactions are mixed and redistributed amongst multiple users, so that no transaction can be linked to one user.

17
Q

Key Escrow

A

A process where buyers transfer funds through a trusted third party when purchasing encryption keys. Duplicate keys are created during this process for law enforcement agencies or governments. Key escrow has never been made a requirement in the US or UK.

18
Q

Key Recovery

A

The recovery of a key from a trusted third party.

19
Q
A