Product Code Database
Example Keywords: kindle -pokimon $54
   » » Wiki: Darknet
Tag Wiki 'Darknet'.
Tag

A darknet or dark net is an within the that can only be accessed with specific software, configurations, or authorization,

(2025). 9781786302021, John Wiley & Sons.
and often uses a unique customized communication protocol. Two typical darknet types are social networks (usually used for with a connection), and such as Tor via an anonymized series of connections.
(2025). 9798561755668, Pothi.

The term "darknet" was popularized by major news outlets and was associated with Tor Onion services when the infamous drug bazaar Silk Road used it,

(2025). 9781349485666, Palgrave Macmillan.
despite the terminology being unofficial. Technology such as Tor, I2P, and are intended to defend digital rights by providing security, anonymity, or censorship resistance and are used for both illegal and legitimate reasons. Anonymous communication between , activists, journalists and news organisations is also facilitated by darknets through use of applications such as .


Terminology
The term originally described computers on that were hidden, programmed to receive messages but not respond to or acknowledge anything, thus remaining invisible and in the dark.

Since , the usage of dark net has expanded to include networks (usually used for with a connection) and networks such as Tor. The reciprocal term for a darknet is a clearnet or the when referring to content indexable by search engines.

The term "darknet" is often used with "" because of the quantity of hidden services on Tor's darknet. Additionally, the term is often inaccurately used interchangeably with the because of Tor's history as a platform that could not be search-indexed. Mixing uses of both these terms has been described as inaccurate, with some commentators recommending the terms be used in distinct fashions.


Origins
"Darknet" was coined in the 1970s to designate networks isolated from (the government-founded military/academical network which evolved into the ), for security purposes. Darknet addresses could receive data from ARPANET but did not appear in the network lists and would not answer pings or other inquiries.

The term gained public acceptance following publication of "The Darknet and the Future of Content Distribution", a 2002 paper by , Paul England, Marcus Peinado, and Bryan Willman, four employees of who argued the presence of the darknet was the primary hindrance to the development of workable digital rights management (DRM) technologies and made copyright infringement inevitable. This paper described "darknet" more generally as any type of parallel network that is encrypted or requires a specific protocol to allow a user to connect to it.


Sub-cultures
Journalist J. D. Lasica, in his 2005 book Darknet: Hollywood's War Against the Digital Generation, described the darknet's reach encompassing file sharing networks.
(2025). 9780471683346, J. Wiley & Sons. .
Subsequently, in 2014, journalist Jamie Bartlett in his book The Dark Net used the term to describe a range of underground and emergent , including , , , communities, racists, and .


Uses
Darknets in general may be used for various reasons, such as:
  • To better protect the rights of citizens from targeted and mass surveillance
  • (cracking, file corruption, etc.)
  • Protecting from political reprisal
  • (, personal files, pornography, confidential files, illegal or counterfeit software, etc.)
  • Sale of restricted goods on
  • and
  • Purchase or sale of illicit or illegal goods or services
  • Circumventing network censorship and content-filtering systems, or bypassing restrictive firewall policies


Software
All darknets require specific software installed or network configurations made to access them, such as Tor, which can be accessed via a customized browser from Vidalia (aka the Tor browser bundle), or alternatively via a configured to perform the same function.


Active
Tor is the most popular instance of a darknet, and it is often mistakenly thought to be the only online tool that facilitates access to darknets. illustrating the average number of Tor users per day between August 2012 and July 2013]]Alphabetical list:

  • is a decentralized friend-to-friend network built using and software routers.
  • Decentralized network 42 (not for anonymity but research purposes).
  • is a popular DHT file hosting darknet platform. It supports and opennet modes.
  • can be utilized as a darknet
    (2025). 9783540206101, Springer-Verlag (Heidelberg). .
    if the " " option is enabled.
    (2025). 9783642353628, Springer (Heidelberg).
  • I2P (Invisible Internet Project) is an proxy network that features hidden services called "".
  • IPFS has a browser extension that may backup popular webpages.
  • is a messenger communication and file transfer platform. It may be used as a darknet if DHT and Discovery features are disabled.
  • Riffle is a government, client-server darknet system that simultaneously provides secure anonymity (as long as at least one server remains uncompromised), efficient computation, and minimal bandwidth burden.
  • Secure Scuttlebutt is a peer-to peer communication protocol, mesh network, and self-hosted social media ecosystem
  • is used to publish distributed forums over the anonymous networks of I2P, Tor and Freenet.
  • Tor (The onion router) is an anonymity network that also features a darknet – via its onion services.
  • is an anonymous BitTorrent client with built in search engine, and non-web, worldwide publishing through channels.
  • is a federated system of personal servers in a peer-to-peer overlay network.
  • is a DHT Web 2.0 hosting with Tor users.


No longer supported


Defunct


See also

Page 1 of 1
1
Page 1 of 1
1

Account

Social:
Pages:  ..   .. 
Items:  .. 

Navigation

General: Atom Feed Atom Feed  .. 
Help:  ..   .. 
Category:  ..   .. 
Media:  ..   .. 
Posts:  ..   ..   .. 

Statistics

Page:  .. 
Summary:  .. 
1 Tags
10/10 Page Rank
5 Page Refs
1s Time