Darknet: Difference between revisions
Deku-shrub (talk | contribs) |
removing "trusted", see Talk page>"2 different concepts"... |
||
Line 2: | Line 2: | ||
A '''darknet''' is [[overlay network]] inaccessible without specific software, configurations or authorization, often using non-standard [[Communications protocol|protocols]] and [[Port (computer networking)|ports]]. |
A '''darknet''' is [[overlay network]] inaccessible without specific software, configurations or authorization, often using non-standard [[Communications protocol|protocols]] and [[Port (computer networking)|ports]]. |
||
Two typical darknet types are [[friend-to-friend]]<ref name=Wood>{{cite journal |last=Wood |first=Jessica |title=The Darknet: A Digital Copyright Revolution |journal=Richmond Journal of Law and Technology |year=2010 |volume=16 |issue=4 |url=http://jolt.richmond.edu/v16i4/article14.pdf |accessdate=25 October 2011|pages=15–17}}</ref> networks (usually used for [[File sharing|file-sharing]] with a [[peer-to-peer network|peer-to-peer]] connection)<ref>{{Cite journal| last1=Mansfield-Devine | first1=Steve| title=Darknets| doi =10.1016/S1361-3723(09)70150-2 | journal=Computer Fraud & Security | volume = 2009 | issue=12 | pages=4–6 |date=December 2009}}</ref> and [[Anonymous P2P|anonymous peer-to-peer]] networks such as [[Tor (anonymity network)|Tor]] (via an anonymized series of connections). The reciprocal term for an encrypted darknet is [[clearnet (networking)|clearnet]].<ref>{{cite web|last1=Monica|title=A discussion about dark net terminology|url=http://monicabarratt.net/?p=5999|accessdate=4 June 2015}}</ref> |
|||
==Terminology== |
==Terminology== |
||
Line 30: | Line 30: | ||
* [[Tor (anonymity network)|Tor]] (The onion router) is an [[Internet anonymity|anonymity]] network that also features a darknet - its "[[Tor (anonymity network)#Hidden services|hidden services]]". It's the <!--best known/-->most popular instance of a darknet.<ref name=inta>{{cite web|title=Anticounterfeiting on the Dark Web - Distinctions between the Surface Web, Dark Web and Deep Web|url=http://www.inta.org/Advocacy/Documents/2015/ACC%20Dark%20Web%20Report.pdf|accessdate=1 June 2015|date=13 April 2015}}</ref><!--and often mistakenly equated with the darknet as a whole--> |
* [[Tor (anonymity network)|Tor]] (The onion router) is an [[Internet anonymity|anonymity]] network that also features a darknet - its "[[Tor (anonymity network)#Hidden services|hidden services]]". It's the <!--best known/-->most popular instance of a darknet.<ref name=inta>{{cite web|title=Anticounterfeiting on the Dark Web - Distinctions between the Surface Web, Dark Web and Deep Web|url=http://www.inta.org/Advocacy/Documents/2015/ACC%20Dark%20Web%20Report.pdf|accessdate=1 June 2015|date=13 April 2015}}</ref><!--and often mistakenly equated with the darknet as a whole--> |
||
* [[I2P]] (Invisible Internet Project) is another [[overlay network]] that features a darknet whose sites are called "[[Eepsite]]s". |
* [[I2P]] (Invisible Internet Project) is another [[overlay network]] that features a darknet whose sites are called "[[Eepsite]]s". |
||
* [[Freenet]] is a popular darknet ([[friend-to-friend]]) by default; since version 0.7 it can run as a "[[Anonymous P2P#Opennet and darknet network types|opennet]]" ( |
* [[Freenet]] is a popular darknet ([[friend-to-friend]]) by default; since version 0.7 it can run as a "[[Anonymous P2P#Opennet and darknet network types|opennet]]" (peer nodes are discovered automatically). |
||
* [[RetroShare]] can be run as a darknet ([[friend-to-friend]]) by default to perform anonymous file transfers if [[Distributed hash table|DHT]] and Discovery features are disabled. |
* [[RetroShare]] can be run as a darknet ([[friend-to-friend]]) by default to perform anonymous file transfers if [[Distributed hash table|DHT]] and Discovery features are disabled. |
||
* [[GNUnet]] is a<!--can be used as a--> darknet if the "[[Friend-to-friend|F2F]] [[network topology|(network) topology]]" option is enabled. |
* [[GNUnet]] is a<!--can be used as a--> darknet if the "[[Friend-to-friend|F2F]] [[network topology|(network) topology]]" option is enabled. |
Revision as of 08:05, 8 June 2015
A darknet is overlay network inaccessible without specific software, configurations or authorization, often using non-standard protocols and ports.
Two typical darknet types are friend-to-friend[1] networks (usually used for file-sharing with a peer-to-peer connection)[2] and anonymous peer-to-peer networks such as Tor (via an anonymized series of connections). The reciprocal term for an encrypted darknet is clearnet.[3]
Terminology
Originally coined in the 1970s to designate networks which were isolated from ARPANET (which evolved into the Internet) for security purposes,[4] darknets were able to receive data from ARPANET but had addresses which did not appear in the network lists and would not answer pings or other inquiries.
The term gained public acceptance following publication of "The Darknet and the Future of Content Distribution",[5] a 2002 paper by Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman, four employees of Microsoft who argued that the presence of the darknet was the primary hindrance to the development of workable DRM technologies and inevitability of copyright infringement.
Journalist J. D. Lasica in his 2005 book Darknet: Hollywood's War Against the Digital Generation describes the darknet's reach encompassing file sharing networks.[6] Years later in 2014, journalist Jamie Bartlett in his book The Dark Net would use it as a term to describe a range of underground and emergent sub cultures, including social media racists, cam girls, self harm communities, darknet drug markets, cryptoanarchists and transhumanists.[7]
As of 2015, 'The Darknet' is often used interchangeably with 'The Dark Web' due to the quantity of hidden services on Tor's darknet. The term is often confusingly[8] used interchangeably with the The Deep Web due to how Tor historically could not be search indexed. Mixing uses of these terms has been described as both inaccurate,[9] recommending the terms be used in distinct fashions.[10][11]
Uses
Darknets in generally may be used for various reasons, such as:
- To better protect privacy from targeted and Mass surveillance
- Protecting dissidents from political reprisal
- Whistleblowing and news leaks
- Computer crime
- Buy restricted goods on darknet markets
- File sharing
Software
All darknets require specific software installed or network configurations made to access them, such as Tor which can be accessed via a customised browser from Vidalia, aka the Tor browser bundle or alternatively via a proxy server configured to perform the same function.
Active
- Tor (The onion router) is an anonymity network that also features a darknet - its "hidden services". It's the most popular instance of a darknet.[12]
- I2P (Invisible Internet Project) is another overlay network that features a darknet whose sites are called "Eepsites".
- Freenet is a popular darknet (friend-to-friend) by default; since version 0.7 it can run as a "opennet" (peer nodes are discovered automatically).
- RetroShare can be run as a darknet (friend-to-friend) by default to perform anonymous file transfers if DHT and Discovery features are disabled.
- GNUnet is a darknet if the "F2F (network) topology" option is enabled.
- Syndie is software used to publish distributed forums over the anonymous networks of I2P, Tor and Freenet.
- OneSwarm can be run as a darknet for friend-to-friend file-sharing.
- Tribler can be run as a darknet for file-sharing.
Defunct
See also
References
- ^ Wood, Jessica (2010). "The Darknet: A Digital Copyright Revolution" (PDF). Richmond Journal of Law and Technology. 16 (4): 15–17. Retrieved 25 October 2011.
- ^ Mansfield-Devine, Steve (December 2009). "Darknets". Computer Fraud & Security. 2009 (12): 4–6. doi:10.1016/S1361-3723(09)70150-2.
- ^ Monica. "A discussion about dark net terminology". Retrieved 4 June 2015.
- ^ "Om Darknet". Archived from the original on 25 March 2015. Retrieved 11 March 2012.
- ^ Biddle, Peter; England, Paul; Peinado, Marcus; Willman, Bryan (18 November 2002). The Darknet and the Future of Content Distribution (PDF). ACM Workshop on Digital Rights Management. Washington, D.C.: Microsoft Corporation. Retrieved 10 October 2012.
- ^ Lasica, J. D. (2005). Darknets: Hollywood's War Against the Digital Generation. Hoboken, NJ: J. Wiley & Sons. ISBN 0-471-68334-5.
- ^ Ian, Burrell (28 August 2014). "The Dark Net:Inside the Digital Underworld by Jamie Bartlett, book review". Retrieved 3 June 2015.
- ^ Solomon, Jane (6 May 2015). "The Deep Web vs. The Dark Web". Retrieved 26 May 2015.
- ^ "Clearing Up Confusion – Deep Web vs. Dark Web". BrightPlanet.
- ^ NPR Staff (25 May 2014). "Going Dark: The Internet Behind The Internet". Retrieved 29 May 2015.
- ^ Greenberg, Andy (19 November 2014). "Hacker Lexicon: What Is the Dark Web?". Retrieved 6 June 2015.
- ^ "Anticounterfeiting on the Dark Web - Distinctions between the Surface Web, Dark Web and Deep Web" (PDF). 13 April 2015. Retrieved 1 June 2015.
External links
- Boutin, Paul (January 28, 2004). "See You on the Darknet". Slate.
- "File-sharing 'darknet' unveiled". BBC News. August 16, 2006.
- Darknet 101 - introduction for non technical people