An example would be TOR and the .onion domains. Google them. I use TOR but I haven't gone beyond using it as a browser, which I love. I've learned more about who's tracking my activities by using that browser than I ever knew about. There are a lot of sites these days using geotracking in their websites. That's pretty frightening to me, thinking that I'm browsing a site, just looking around, only to find out they are geotracking me and trying to figure out where I live. That's just creepy. I'm looking at funny dog videos and you're geo locating me? Why? For what purpose?
Lasers : Trotec Speedy 300 75W, Trotec Speedy 300 80W, Galvo Fiber Laser 20W
Printers : Mimaki UJF-6042 UV Flatbed Printer , HP Designjet L26500 61" Wide Format Latex Printer, Summa S140-T 48" Vinyl Plotter
Router : ShopBot 48" x 96" CNC Router Rotary Engravers : (2) Xenetech XOT 16 x 25 Rotary Engravers
Real name Steve but that name was taken on the forum. Used Middle name. Call me Steve or Scott, doesn't matter.
I'd tweak this a bit... you're either wrong (about the lack of virii on your system) or your wrong (about going to the dark areas of the internet). Personally, I'd go with choice "you're wrong".
If virii only stayed in the dark corners of the internet, only the dirty birdies would be infected. Even Google gets virii in its ads from time to time, so you could potentially pick one up surfing these very fora...
Hi-Tec Designs, LLC -- Owner (and self-proclaimed LED guru )
Trotec 80W Speedy 300 laser w/everything
CAMaster Stinger CNC (25" x 36" x 5")
USCutter 24" LaserPoint Vinyl Cutter
Jet JWBS-18QT-3 18", 3HP bandsaw
Robust Beauty 25"x52" wood lathe w/everything
Jet BD-920W 9"x20" metal lathe
Delta 18-900L 18" drill press
Flame Polisher (ooooh, FIRE!)
Freeware: InkScape, Paint.NET, DoubleCAD XT
Paidware: Wacom Intuos4 (Large), CorelDRAW X5
I meant I'm not running an active scanner on a daily basis. I've definitely ran malwarebytes (and other virus/spyware programs) to show people that I don't have anything. The only thing I run is Adblock on Firefox.
Lasers : Trotec Speedy 300 75W, Trotec Speedy 300 80W, Galvo Fiber Laser 20W
Printers : Mimaki UJF-6042 UV Flatbed Printer , HP Designjet L26500 61" Wide Format Latex Printer, Summa S140-T 48" Vinyl Plotter
Router : ShopBot 48" x 96" CNC Router Rotary Engravers : (2) Xenetech XOT 16 x 25 Rotary Engravers
Real name Steve but that name was taken on the forum. Used Middle name. Call me Steve or Scott, doesn't matter.
May not keep them from encrypting your drive... but think about it a bit. They have enough access to your machine, to encrypt or decrypt at will. What makes anyone think they don't also have access to your, oh say, passwords, and any other personal data you may have on your machine.
At least it may help the many other issues you may end up with!
Modern encryption should be relatively transparent.
I expect that they would simply provide you with a decryption key which you can use to decrypt, even if they no longer have access to your machine. In fact, they never needed access to your machine, they simply needed you to run the "bad program" even if you were not connected. It can then encrypt your machine automatically until you enter a key provided by them.
This makes me wonder about one of the potential downsides to encrypting a disk. If the login password is changed without the account owner's permission or were corrupted, wouldn't the effect would be about like cryptolocker - the contents of the disk are inaccessable? It's possible for an administrator to reset a forgotten or corrupted user password. Will that also decrypt the encrypted disk, or is the original password required? I don't know. If it were possible to reset the account password and unlock the disk, that seems like it'd reduces the benefit of protecting disk contents on a stolen machine for example. It's easy enough to crack or reset admin passwords.
I think that the primary reason for encrypting a drive is to protect the data at rest. For example, if my drive fails, I don't worry about sending it back for a warranty replacement. If the computer is running, AND if I am using the disk, then the drive is in a state that anyone using the machine can see the data (well at least mostly). I encrypt my USB key, so, if I drop the key, the data is not accessible to others. On the other hand, I must choose my encryption method such that if I visit you and want to pull something, then we can access the USB key.
On the other hand, if the drive fails, it makes it more difficult for me to recover data from the drive.
I disagree with Mr. Shepherd on his definition of the dark net (well, I kind of do, and he has WAY more experience on this than I).
First, understand that the definition is a bit fuzzy and there is some variance as to what is understood by it. The people that I deal with loosely define it as "IP addresses that are not discoverable by normal means".
http://searchnetworking.techtarget.c...nition/darknet
For example, I stand up a web site with an accessible IP address, and I do not link to it. How do you find it? I am now part of the dark net. It is generally assumed that much that happens on the dark net is shady / illegal; for example, selling drugs, trading illegal pictures, or pirating software.
How do you find these places? Probably in chat rooms and similar, but I have neither the time nor inclination to attempt to figure that out. The place you would find the addresses would be related to what was at the address.
That brings us to what Mr. Shepherd posted. He mentions TOR. TOR provides a means of browsing the internet while hiding your identity. It works mostly, but is slower and there are a bunch of gotchas for which you must be careful.
I am not familiar with the .onion domains (http://en.wikipedia.org/wiki/.onion) but the fact that Mr. Shepherd mentions them is pretty clear proof that he has more familiarity with this than I.
I assume that they use .onion domain because it uses onion routing.... and I need to run...
Andrew, I'm no expert on the "dark web" by any means. I do remember when the internet started and Alt sites were the only real internet. I remember logging into remote computers at Rutgers and the things I read, I wish I hadn't ever read.
I don't know about publishing sites using the IP addresses as you mentioned, I just barely know about the .onion sites, only because of my growing interest in what's being gathered when we surf. Apparently the .onion sites, promoted from the TOR project, you can publish anonymous sites, which I would assume is were some things not ready for prime time are posted. I don't know, I haven't ventured into that arena.
I do remember when the internet was free and private. No matter what you did, nothing was tracked. I remember remote logging into a lot of computers in the early days, some, maybe not to legally, but in those days, it was easy to use passwords like anonymous and you could get in. Never did one worry about getting a visit from the FBI. Do that now, and you might end up in prison
TOR, like you said, really isn't anything other than an browser that seeks to protect one's privacy. Where you go from there is the key. There's stuff like silk road, where a LOT of illegal activity goes on, as well as the government shutting it down when they can.
While I don't know a lot about it, I'd say the silk road area is part of the dark internet, along with sites using the techniques you mentioned, as well as the .onion sites. I'm sure there's a lot more, but it's not something I go to or use, so my knowledge is based solely on reading bits and pieces from tech sites over time.
Lasers : Trotec Speedy 300 75W, Trotec Speedy 300 80W, Galvo Fiber Laser 20W
Printers : Mimaki UJF-6042 UV Flatbed Printer , HP Designjet L26500 61" Wide Format Latex Printer, Summa S140-T 48" Vinyl Plotter
Router : ShopBot 48" x 96" CNC Router Rotary Engravers : (2) Xenetech XOT 16 x 25 Rotary Engravers
Real name Steve but that name was taken on the forum. Used Middle name. Call me Steve or Scott, doesn't matter.