User:Anastasia192/sandbox: Difference between revisions
Anastasia192 (talk | contribs) No edit summary |
Anastasia192 (talk | contribs) No edit summary |
||
Line 1: | Line 1: | ||
''UGBA 192AC 10/26/2016 Peer Review: Please find the description in italic of what I am going to add to Wikipedia.'' |
|||
''I am working on the Darknet and Dissidents articles. I was also planning to work on the Cryptocurrency tumbler article, but, unfortunately, I am not able to find sufficient information. I will appreciate any suggestions on other articles I can work on. Thanks.'' |
|||
[[Darknet]] |
[[Darknet]] |
||
''In the Darknet article I am going to add more description and history'' <ref>{{Cite web|url=http://eds.b.ebscohost.com/eds/pdfviewer/pdfviewer?sid=f56fd261-894f-4be3-9949-f00324beb482@sessionmgr101&vid=2&hid=126|title=THE DARKNET.: Start Your Search!|website=eds.b.ebscohost.com|access-date=2016-10-26}}</ref>''of the Darknet.'' <ref>{{Cite web|url=http://eds.b.ebscohost.com/eds/detail/detail?sid=390cc066-699e-4f33-860a-9d2dd97d9285@sessionmgr107&vid=0&hid=126&bdata=JnNpdGU9ZWRzLWxpdmU=#AN=117120750&db=edo|title=The 21st Century DarkNet Market: Lessons from the Fall of Silk Road: Start Your Search!|website=eds.b.ebscohost.com|access-date=2016-10-26}}</ref>''I will also add the list of current sponsors that provide funding for Tor, the major Darknet browser.'' |
''In the Darknet article I am going to add more description and history'' <ref>{{Cite web|url=http://eds.b.ebscohost.com/eds/pdfviewer/pdfviewer?sid=f56fd261-894f-4be3-9949-f00324beb482@sessionmgr101&vid=2&hid=126|title=THE DARKNET.: Start Your Search!|website=eds.b.ebscohost.com|access-date=2016-10-26}}</ref><ref>{{Cite journal|last=Mansfield-Devine|first=Steve|date=2009-12-01|title=Darknets|url=http://www.sciencedirect.com/science/article/pii/S1361372309701502|journal=Computer Fraud & Security|volume=2009|issue=12|pages=4–6|doi=10.1016/S1361-3723(09)70150-2}}</ref>''of the Darknet.'' <ref>{{Cite web|url=http://eds.b.ebscohost.com/eds/detail/detail?sid=390cc066-699e-4f33-860a-9d2dd97d9285@sessionmgr107&vid=0&hid=126&bdata=JnNpdGU9ZWRzLWxpdmU=#AN=117120750&db=edo|title=The 21st Century DarkNet Market: Lessons from the Fall of Silk Road: Start Your Search!|website=eds.b.ebscohost.com|access-date=2016-10-26}}</ref>''I will also add the list of current sponsors that provide funding for Tor, the major Darknet browser.'' |
||
I’ also planning to add a paragraph about concerns over the Darknet.<ref>{{Cite web|url=http://eds.a.ebscohost.com/eds/pdfviewer/pdfviewer?sid=57fc24ad-846c-440b-8d05-c992cabd3aca@sessionmgr4010&vid=1&hid=4211|title=EBSCO Publishing Service Selection Page|website=eds.a.ebscohost.com|access-date=2016-10-26}}</ref><ref>{{Cite web|url=http://eds.b.ebscohost.com/eds/detail/detail?sid=9e0fc185-fdd2-4765-b304-f82ebb90d749@sessionmgr103&vid=2&hid=126&bdata=JnNpdGU9ZWRzLWxpdmU=#AN=82671007&db=bth|title=The dark side of the Internet: Start Your Search!|website=eds.b.ebscohost.com|access-date=2016-10-26}}</ref> |
I’ also planning to add a paragraph about concerns over the Darknet.<ref>{{Cite web|url=http://eds.a.ebscohost.com/eds/pdfviewer/pdfviewer?sid=57fc24ad-846c-440b-8d05-c992cabd3aca@sessionmgr4010&vid=1&hid=4211|title=EBSCO Publishing Service Selection Page|website=eds.a.ebscohost.com|access-date=2016-10-26}}</ref><ref>{{Cite web|url=http://eds.b.ebscohost.com/eds/detail/detail?sid=9e0fc185-fdd2-4765-b304-f82ebb90d749@sessionmgr103&vid=2&hid=126&bdata=JnNpdGU9ZWRzLWxpdmU=#AN=82671007&db=bth|title=The dark side of the Internet: Start Your Search!|website=eds.b.ebscohost.com|access-date=2016-10-26}}</ref><ref>{{Cite web|url=http://eds.b.ebscohost.com/eds/detail/detail?sid=ad822f46-344d-47ac-8c12-09663ebad15f@sessionmgr103&vid=0&hid=127&bdata=JnNpdGU9ZWRzLWxpdmU=#AN=113873661&db=bth|title=A MARKETER'S GUIDE TO THE DARK WEB: Start Your Search!|website=eds.b.ebscohost.com|access-date=2016-10-27}}</ref> |
||
Search engines cannot locate Darknet websites, so users can only access sites by entering their exact address. Identities and locations of Darknet users stay anonymous and cannot be tracked. Additionally, communication between Darknet users is encrypted allowing users to talk, blog, and share files confidentially. [http://www.academia.edu/20813843/DARKNET_SOCIAL_MEDIA_AND_EXTREMISM_ADDRESSING_INDONESIAN_COUNTERTERRORISM_ON_THE_INTERNET] |
Search engines cannot locate Darknet websites, so users can only access sites by entering their exact address. Identities and locations of Darknet users stay anonymous and cannot be tracked. Additionally, communication between Darknet users is encrypted allowing users to talk, blog, and share files confidentially. [http://www.academia.edu/20813843/DARKNET_SOCIAL_MEDIA_AND_EXTREMISM_ADDRESSING_INDONESIAN_COUNTERTERRORISM_ON_THE_INTERNET] |
||
Line 22: | Line 26: | ||
* US Department of State Bureau of Democracy, Human Rights, and Labor (2013-2016) |
* US Department of State Bureau of Democracy, Human Rights, and Labor (2013-2016) |
||
* An anonymous North American ISP (2009-present) <ref>{{Cite web|url=https://www.torproject.org/about/sponsors.html.en|title=Tor: Sponsors|last=Inc.|first=The Tor Project,|website=www.torproject.org|access-date=2016-10-25}}</ref> |
* An anonymous North American ISP (2009-present) <ref>{{Cite web|url=https://www.torproject.org/about/sponsors.html.en|title=Tor: Sponsors|last=Inc.|first=The Tor Project,|website=www.torproject.org|access-date=2016-10-25}}</ref> |
||
How to Enter The Darknet <ref>{{Cite news|url=http://9net.ru/191-darknet-kak-voyti.html|title= |
How to Enter The Darknet <ref>{{Cite news|url=http://9net.ru/191-darknet-kak-voyti.html|title=How to Enter the Darknet|last=|first=|date=|work=|newspaper=Social Media News|access-date=2016-10-27|via=}}</ref> |
||
It is fairly simple to enter the Darknet. First of all, a new user needs to download the Tor browser. It is recommended to download the [[Tor]] browser from the official website. Otherwise, if the browser is downloaded from other sources, it may contain various viruses such as Trojan, which can compromise the browsing security. |
It is fairly simple to enter the Darknet. First of all, a new user needs to download the Tor browser. It is recommended to download the [[Tor]] browser from the official website. Otherwise, if the browser is downloaded from other sources, it may contain various viruses such as Trojan, which can compromise the browsing security. |
||
Line 28: | Line 32: | ||
The first time user must install the browser and choose between two options: just connect and configure the network settings. Users who only wish to join a blocked website should simply you select "connect". If a user is looking for anonymity, then they need to configure settings. |
The first time user must install the browser and choose between two options: just connect and configure the network settings. Users who only wish to join a blocked website should simply you select "connect". If a user is looking for anonymity, then they need to configure settings. |
||
While Tor operates similarly to regular browsers, it uses a more complicated scheme. In order to establish connection between the computer of a user and the targeted website, Tor sends the user’s data through a number of intermediaries called [[Relay|relays]]. This leads to a decreasing speed of browsing<ref>{{Cite news|url= |
While Tor operates similarly to regular browsers, it uses a more complicated scheme. In order to establish connection between the computer of a user and the targeted website, Tor sends the user’s data through a number of intermediaries called [[Relay|relays]]. This leads to a decreasing speed of browsing<ref>{{Cite news|url=http://jordan-wright.com/blog/2015/02/28/how-tor-works-part-one/|title=How Tor Works: Part One · Jordan Wright|newspaper=Jordan Wright|access-date=2016-10-27}}</ref>. |
||
[[Dissident|Dissidents]] <ref>{{Cite news|url=http://baltimorepostexaminer.com/dark-net-secret-basement-internet/2015/07/15|title=Dark Net: Secret basement of the Internet|newspaper=Your Site NAME Goes HERE|access-date=2016-10-27}}</ref><ref>{{Cite news|url=http://stories.avvo.com/consumer-protection/can-the-dark-net-be-policed-and-should-it-be.html|title=Can the 'Dark Net' be policed? Should it be? - AvvoStories|date=2015-11-25|newspaper=AvvoStories|language=en-US|access-date=2016-10-27}}</ref> |
|||
[[Dissident|Dissidents]] |
|||
''In the Dissidents article I am going to add a paragraph relevant to our class, "Dissidents and New Technologies”. I will talk about the usage of Darknet by |
''In the Dissidents article I am going to add a paragraph relevant to our class, "Dissidents and New Technologies”. I will talk about the usage of Darknet by modern dissidents.'' |
||
Dissidents and New Technologies<ref>{{Cite book|title=Internet Freedom Software and Illicit Activity|last=Romanosky|first=Sasha|publisher=RAND Corporation|year=2015|isbn=|location=|pages=|quote=|via=}}</ref> |
|||
Dissidents and New Technologies |
|||
People who want to challenge existing regimes and voice their opinion on a political situation oftentimes face tremendous risks. Therefore, this kind of people act as pioneers of establishing and implementing of new technologies that help them to protect their privacy. Being able to stay fully anonymous on the Internet is crucial for security and life of dissidents, so they are always looking for ways to improve these technologies. One of the latest tools that is being widely used by dissidents today is a Darknet browser Tor. <ref>{{Citation|last=Bartlett|first=Jamie|title=How the mysterious dark net is going mainstream|url=https://www.ted.com/talks/jamie_bartlett_how_the_mysterious_dark_net_is_going_mainstream?language=en|accessdate=2016-10-25}}</ref> |
People who want to challenge existing regimes and voice their opinion on a political situation oftentimes face tremendous risks. Therefore, this kind of people act as pioneers of establishing and implementing of new technologies that help them to protect their privacy. Being able to stay fully anonymous on the Internet is crucial for security and life of dissidents, so they are always looking for ways to improve these technologies. One of the latest tools that is being widely used by dissidents today is a Darknet browser Tor. <ref>{{Citation|last=Bartlett|first=Jamie|title=How the mysterious dark net is going mainstream|url=https://www.ted.com/talks/jamie_bartlett_how_the_mysterious_dark_net_is_going_mainstream?language=en|accessdate=2016-10-25}}</ref> |
Revision as of 06:48, 27 October 2016
UGBA 192AC 10/26/2016 Peer Review: Please find the description in italic of what I am going to add to Wikipedia.
I am working on the Darknet and Dissidents articles. I was also planning to work on the Cryptocurrency tumbler article, but, unfortunately, I am not able to find sufficient information. I will appreciate any suggestions on other articles I can work on. Thanks.
In the Darknet article I am going to add more description and history [1][2]of the Darknet. [3]I will also add the list of current sponsors that provide funding for Tor, the major Darknet browser.
I’ also planning to add a paragraph about concerns over the Darknet.[4][5][6]
Search engines cannot locate Darknet websites, so users can only access sites by entering their exact address. Identities and locations of Darknet users stay anonymous and cannot be tracked. Additionally, communication between Darknet users is encrypted allowing users to talk, blog, and share files confidentially. [1]
Origins
The Darknet was originally developer by the Naval Research Lab with a purpose of creating a secure network that can be used by government agencies. Most of the funding of the Darknet is provided by the Department of Defense and State Department. In 2013, Tor received $1.8 million in federal support.[7]
Current Tor sponsors include
- Individuals who use Tor
- Google Summer of Code (2007-2014 and 2016)
- Radio Free Asia (2012-2016)
- National Science Foundation joint with Princeton University (2012-2016)
- National Science Foundation via University of Minnesota (2013-2017)
- National Science Foundation joint with Georgetown (2015-2018)
- Fastly (2016)
- SRI International (2011-2016)
- US Department of State Bureau of Democracy, Human Rights, and Labor (2013-2016)
- An anonymous North American ISP (2009-present) [8]
How to Enter The Darknet [9]
It is fairly simple to enter the Darknet. First of all, a new user needs to download the Tor browser. It is recommended to download the Tor browser from the official website. Otherwise, if the browser is downloaded from other sources, it may contain various viruses such as Trojan, which can compromise the browsing security.
The first time user must install the browser and choose between two options: just connect and configure the network settings. Users who only wish to join a blocked website should simply you select "connect". If a user is looking for anonymity, then they need to configure settings.
While Tor operates similarly to regular browsers, it uses a more complicated scheme. In order to establish connection between the computer of a user and the targeted website, Tor sends the user’s data through a number of intermediaries called relays. This leads to a decreasing speed of browsing[10].
In the Dissidents article I am going to add a paragraph relevant to our class, "Dissidents and New Technologies”. I will talk about the usage of Darknet by modern dissidents.
Dissidents and New Technologies[13]
People who want to challenge existing regimes and voice their opinion on a political situation oftentimes face tremendous risks. Therefore, this kind of people act as pioneers of establishing and implementing of new technologies that help them to protect their privacy. Being able to stay fully anonymous on the Internet is crucial for security and life of dissidents, so they are always looking for ways to improve these technologies. One of the latest tools that is being widely used by dissidents today is a Darknet browser Tor. [14]
Nima Fatemi was one of the first Darknet adopters among dissidents. Due to the risk of being detected, Fatemi started using Tor to anonymously upload photos and news of the current situation in Iran. Anonymity provided by Tor enabled Fatemi to share true pictures of what was happening in his country with the rest of the world. Moreover, Fatemi provided workshops for other Iranian dissidents teaching them how to use Tor and spread their network. [15]
This is a user sandbox of Anastasia192. You can use it for testing or practicing edits. This is not the sandbox where you should draft your assigned article for a dashboard.wikiedu.org course. To find the right sandbox for your assignment, visit your Dashboard course page and follow the Sandbox Draft link for your assigned article in the My Articles section. |
- ^ "THE DARKNET.: Start Your Search!". eds.b.ebscohost.com. Retrieved 2016-10-26.
- ^ Mansfield-Devine, Steve (2009-12-01). "Darknets". Computer Fraud & Security. 2009 (12): 4–6. doi:10.1016/S1361-3723(09)70150-2.
- ^ "The 21st Century DarkNet Market: Lessons from the Fall of Silk Road: Start Your Search!". eds.b.ebscohost.com. Retrieved 2016-10-26.
- ^ "EBSCO Publishing Service Selection Page". eds.a.ebscohost.com. Retrieved 2016-10-26.
- ^ "The dark side of the Internet: Start Your Search!". eds.b.ebscohost.com. Retrieved 2016-10-26.
- ^ "A MARKETER'S GUIDE TO THE DARK WEB: Start Your Search!". eds.b.ebscohost.com. Retrieved 2016-10-27.
- ^ Minárik, Tomáš; Osula, Anna-Maria (2016-02-01). "Tor does not stink: Use and abuse of the Tor anonymity network from the perspective of law". Computer Law & Security Review. 32 (1): 111–127. doi:10.1016/j.clsr.2015.12.002.
- ^ Inc., The Tor Project,. "Tor: Sponsors". www.torproject.org. Retrieved 2016-10-25.
{{cite web}}
:|last=
has generic name (help)CS1 maint: extra punctuation (link) CS1 maint: multiple names: authors list (link) - ^ "How to Enter the Darknet". Social Media News. Retrieved 2016-10-27.
- ^ "How Tor Works: Part One · Jordan Wright". Jordan Wright. Retrieved 2016-10-27.
- ^ "Dark Net: Secret basement of the Internet". Your Site NAME Goes HERE. Retrieved 2016-10-27.
- ^ "Can the 'Dark Net' be policed? Should it be? - AvvoStories". AvvoStories. 2015-11-25. Retrieved 2016-10-27.
- ^ Romanosky, Sasha (2015). Internet Freedom Software and Illicit Activity. RAND Corporation.
- ^ Bartlett, Jamie, How the mysterious dark net is going mainstream, retrieved 2016-10-25
- ^ "Bookmarkable URL intermediate page". eds.b.ebscohost.com. Retrieved 2016-10-25.