Skip to content
Surf Wiki
Save to docs
technology/networking

From Surf Wiki (app.surf) — the open knowledge base

Darknet

Private network of connections between trusted peers

Darknet

Private network of connections between trusted peers

Surface web in relation to Deep web and Dark web

A darknet or dark net is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol. Two typical darknet types are social networks (usually used for file hosting with a peer-to-peer connection), and anonymity proxy networks such as Tor via an anonymized series of connections.

The term "darknet" was popularized by major news outlets and was associated with Tor Onion services when the infamous drug bazaar Silk Road used it, despite the terminology being unofficial. Technology such as Tor, I2P, and Freenet are intended to defend digital rights by providing security, anonymity, or censorship resistance and are used for both illegal and legitimate reasons. Anonymous communication between whistle-blowers, activists, journalists and news organisations is also facilitated by darknets through use of applications such as SecureDrop.

Terminology

Euler diagram of the deep web, the dark web, and the darknet

The term originally described computers on ARPANET that were hidden, programmed to receive messages but not respond to or acknowledge anything, thus remaining invisible and in the dark.

Since ARPANET, the usage of dark net has expanded to include friend-to-friend networks (usually used for file sharing with a peer-to-peer connection) and privacy networks such as Tor.{{cite journal |access-date=25 October 2011 |archive-date=16 May 2013 |archive-url=https://web.archive.org/web/20130516091538/http://jolt.richmond.edu/v16i4/article14.pdf |url-status=live |access-date=14 June 2015 |archive-url=https://web.archive.org/web/20160118085807/http://monicabarratt.net/?p=5999 |archive-date=18 January 2016 |url-status=dead

The term "darknet" is often used interchangeably with "dark web" because of the quantity of hidden services on Tor's darknet. Additionally, the term is often inaccurately used interchangeably with the deep web because of Tor's history as a platform that could not be search-indexed. Mixing uses of both these terms has been described as inaccurate, with some commentators recommending the terms be used in distinct fashions.

Origins

"Darknet" was coined in the 1970s to designate networks isolated from ARPANET (the government-founded military/academical network which evolved into the Internet), for security purposes. Darknet addresses could receive data from ARPANET but did not appear in the network lists and would not answer pings or other inquiries.

The term gained public acceptance following publication of "The Darknet and the Future of Content Distribution", a 2002 paper by Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman, four employees of Microsoft who argued the presence of the darknet was the primary hindrance to the development of workable digital rights management (DRM) technologies and made copyright infringement inevitable. This paper described "darknet" more generally as any type of parallel network that is encrypted or requires a specific protocol to allow a user to connect to it.

Sub-cultures

Journalist J. D. Lasica, in his 2005 book Darknet: Hollywood's War Against the Digital Generation, described the darknet's reach encompassing file sharing networks. Subsequently, in 2014, journalist Jamie Bartlett in his book The Dark Net used the term to describe a range of underground and emergent subcultures, including camgirls, cryptoanarchists, darknet drug markets, self harm communities, social media racists, and transhumanists.

Uses

Darknets in general may be used for various reasons, such as:

  • To better protect the privacy rights of citizens from targeted and mass surveillance
  • Computer crime (cracking, file corruption, etc.)
  • Protecting dissidents from political reprisal
  • File sharing (warez, personal files, pornography, confidential files, illegal or counterfeit software, etc.)
  • Sale of restricted goods on darknet markets
  • Whistleblowing and news leaks
  • Purchase or sale of illicit or illegal goods or services
  • Circumventing network censorship and content-filtering systems, or bypassing restrictive firewall policies

Software

All darknets require specific software installed or network configurations made to access them, such as Tor, which can be accessed via a customized browser from Vidalia (aka the Tor browser bundle), or alternatively via a proxy configured to perform the same function.

Active

Tor is the most popular instance of a darknet, and it is often mistakenly thought to be the only online tool that facilitates access to darknets. [[File:Geographies of Tor.png|thumb|A [[cartogram]] illustrating the average number of Tor users per day in 2015]]Alphabetical list:

  • anoNet is a decentralized friend-to-friend network built using VPN and software BGP routers.
  • Decentralized network 42 (not for anonymity but research purposes).
  • Freenet is a popular DHT file hosting darknet platform. It supports friend-to-friend and opennet modes.
  • GNUnet can be utilized as a darknet if the "F2F (network) topology" option is enabled.
  • I2P (Invisible Internet Project) is an overlay proxy network that features hidden services called "Eepsites".
  • IPFS has a browser extension that may backup popular webpages.
  • RetroShare is a friend-to-friend messenger communication and file transfer platform. It may be used as a darknet if DHT and Discovery features are disabled.
  • Riffle is a government, client-server darknet system that simultaneously provides secure anonymity (as long as at least one server remains uncompromised), efficient computation, and minimal bandwidth burden.
  • Secure Scuttlebutt is a peer-to peer communication protocol, mesh network, and self-hosted social media ecosystem.
  • Syndie is software used to publish distributed forums over the anonymous networks of I2P, Tor and Freenet.
  • Tor (The onion router) is an anonymity network that also features a darknet – via its onion services.
  • Tribler is an anonymous BitTorrent client with built in search engine, and non-web, worldwide publishing through channels.
  • Urbit is a federated system of personal servers in a peer-to-peer overlay network.
  • Zeronet is a DHT Web 2.0 hosting with Tor users.

No longer supported

  • StealthNet (discontinued)
  • WASTE

Defunct

  • AllPeers
  • Turtle F2F

References

References

  1. Gayard, Laurent. (2018). "Darknet: Geopolitics and Uses". [[Wiley (publisher).
  2. (July 2010). "The Darknet: A Digital Copyright Revolution". Richmond Journal of Law & Technology.
  3. (1 December 2009). "Darknets". Computer Fraud & Security.
  4. Pradhan, Sayam. (2020). "The Darkest Web: The Dark Side of the Internet". Pothi.
  5. Martin, James. (2014). "Drugs on the Dark Net: How Cryptomarkets are Transforming the Global Trade in Illicit Drugs". Palgrave Macmillan.
  6. "SecureDrop". Freedom of the Press Foundation.
  7. (2010-08-12). "Darknet.se - About darknet".
  8. "Clearing Up Confusion – Deep Web vs. Dark Web". BrightPlanet.
  9. (25 May 2014). "Going Dark: The Internet Behind The Internet".
  10. (19 November 2014). "Hacker Lexicon: What Is the Dark Web?".
  11. (18 November 2002). "The Darknet and the Future of Content Distribution". [[Microsoft.
  12. Lasica, J. D.. (2005). "Darknets: Hollywood's War Against the Digital Generation". J. Wiley & Sons.
  13. (28 August 2014). "The Dark Net: Inside the Digital Underworld by Jamie Bartlett, book review".
  14. Taylor, Harriet. (19 May 2016). "Hit men, drugs and malicious teens: the darknet is going mainstream".
  15. "Who uses Tor?". Tor Project.
  16. (13 April 2015). "Anticounterfeiting on the Dark Web – Distinctions between the Surface Web, Dark Web and Deep Web".
  17. (2003). "Privacy Enhancing Technologies Third International Workshop (PET 2003)". Springer-Verlag (Heidelberg).
  18. (2012). "Cyberspace Safety and Security: 4th International Symposium : Proceedings (CSS 2012)". Springer (Heidelberg).
  19. Young Hyun Kwon. (20 May 2015). "Riffle: An Efficient Communication System with Strong Anonymity".
  20. Larry Hardesty, MIT News Office. (11 July 2016). "How to stay anonymous online".
Info: Wikipedia Source

This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page.

Want to explore this topic further?

Ask Mako anything about Darknet — get instant answers, deeper analysis, and related topics.

Research with Mako

Free with your Surf account

Content sourced from Wikipedia, available under CC BY-SA 4.0.

This content may have been generated or modified by AI. CloudSurf Software LLC is not responsible for the accuracy, completeness, or reliability of AI-generated content. Always verify important information from primary sources.

Report