User:FoordH/sandbox

The original article, without student edits, may be found at Wikipedia page: Darknet.

A darknet (or dark net) is an overlay network that can only be accessed with specific software, configurations, or authorization, often using non-standard communications protocols and ports. Two typical darknet types are friend-to-friend networks (usually used for file sharing with a peer-to-peer connection) and anonymity networks such as Tor via an anonymized series of connections.

The reciprocal term for an encrypted darknet is clearnet or Surface_web when referring to search engine indexable content.

, "The Darknet" is often used interchangeably with "The Dark Web" due to the quantity of hidden services on Tor's darknet. Often conflated with Deep Web search,[2][3]  the Dark Web is the World Wide Web content that exists on darknets, overlay networks which use the public Internet but which require specific software, configurations or authorization to access.[4]  The Dark Web forms part of the Deep Web, the part of the Web not indexed bysearch engines.

Origins
Originally coined in the 1970s to designate networks which were isolated from ARPANET (which evolved into the Internet) for security purposes, darknets were able to receive data from ARPANET but had addresses which did not appear in the network lists and would not answer pings or other inquiries by/from external servers.

The term gained public acceptance following publication of "The Darknet and the Future of Content Distribution", a 2002 paper by Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman, four Microsoft employees who argued that the presence of the darknet was the primary hindrance to the development of workable DRM technologies and hastened the inevitability of copyright infringement.

Sub-cultures
Journalist J._D._Lasica in his 2005 book Darknet: Hollywood's War Against the Digital Generation describes the darknet's reach encompassing file sharing networks. Consequently, in 2014, journalist Jamie Bartlett in his book The Dark Net would use it as a term to describe a range of underground and emergent sub cultures, including
 * Social media racists
 * Camgirls
 * Self Harm communities
 * Darknet drug markets
 * Cryptoanarchists
 * Transhumanists.

Characteristics
According to Aked, Bolan and Brand, the five distinguishing characteristics that separate a Darknet from a Clearnet or from falling under the same categorization as the Deep Web or the Dark Web are as follows:

Encryption
All data found on the darknet is encrypted, meaning that all data is channeled through different algorithms pre-transmission, adding extra processing load to the destination’s infrastructure. As Darknet participants form part of the routing infrastructure, the extra processing required to encrypt the data stream is shared amongst all participants.

Anonymity
IP addresses and their respective ISP's are logged by the computer system through which they are accessed and are accessible by the government, law enforcement, and even businesses willing to pay for customer demographic information. To prevent this, on the darknet each data stream is encrypted and routed in such a way that the source and destination of the request cannot be determined outside of user or program error.

Applications
Unlike Clearnets,which host multiple portals for information transfer, darknets must run external software to be able to tap into the darknet and gain access to file-sharing capabilities, transfers etc. This software then directs data through to a specific conduit, leading the information through one specific medium into the Darknet network.

Routing
For Darknet traffic, the path that data takes is designed to be untraceable. The route may be based on a number of factors including link stability, latency and bandwidth, but will change frequently and randomly to ensure that analysis cannot determine either the source or destination of the request, assuring the anonymity of both source and destination of the data.

Visibility
Unexplained surpluses of usage or storage may suggest that something is amiss in typical network traffic analysis if the user/IP address is hidden or operating on a hidden network overlay, however unless individual participants are identified as the source of bandwidth usage or using non-standard ports on a regular basis, there is very little to incriminate or indicate specific users of the Darknet, or view their activities if it cannot be proven they are illegal in nature.

Uses
Darknets in general may be used for various reasons, such as:
 * To better protect the privacy rights of citizens from targeted and Mass_surveillance
 * Circumventing national or government instituted firewalls (E.g. the Great Firewall of China)
 * Protecting dissidents from political reprisal
 * Whistleblowing and news leaks
 * Computer crime (hacking, file corruption etc)
 * Sale of restricted goods on Darknet_markets
 * File sharing (pornography, confidential files, illegal or counterfeit software etc.)
 * DDos (Distributed Denial of Service) attacks; see below for example

Examples

 * Political Activism (positive); see Arab Spring (2011)
 * Political Terrorism (negative); ISIS members using memes & internet virality tricks to spread propaganda and illegal content (I.e. using popular hashtags, usings cats in propaganda videos)
 * Whistle Blowing & News Leaks; see Julian_Assange and/or WikiLeaks, Edward_Snowden,
 * Black Markets (i.e. sales of goods banned by NAFTA or illegal goods incl. poached animals or parts thereof, drugs, weapons etc.)
 * Human Trafficking
 * Pornography
 * Live Streaming
 * DDos attacks such as those recorded by EU Interpol and iOCTA in 2015 where employees were tricked into transferring money to fraudulent 'senior management' representatives via this specific network hack.

Note: Some anonymous portals for free speech exist on the Clearnet, such as the New Yorker's Strongbox, which allows for completely anonymous citizen reporting Software All darknets require specific software installed or network configurations made to access them, such as Tor, which can be accessed via a customized browser from Vidalia, aka the Tor browser bundle. Alternatively, the darknet can be accessed via a proxy server configured to perform the same function.

The use of spoofed IP packets to confuse analysis engines reporting network traffic is a growing concern in the attempt to maintain total anonymity, however only 1.26% of darknet traffic can currently be attributed to spoof packets making further data analysis of little statistical significance.

Active Servers

 * Tor (The onion router) is an anonymity network that also features a darknet - its "hidden services". It is the most popular instance of a darknet.
 * I2P (Invisible Internet Project) is another overlay network that features a darknet whose sites are called "Eepsites".
 * Freenet is a popular darknet (friend-to-friend) by default; since version 0.7 it can run as a "opennet" (peer nodes are discovered automatically).
 * RetroShare can be run as a darknet (friend-to-friend) by default to perform anonymous file transfers if DHT and Discovery features are disabled.
 * GNUnet is a darknet if the "F2F (network) topology" option is enabled.
 * Zeronet is Open_source_software aimed to build an internet-like computer network of peer-to-peer users of Tor.
 * Syndie is Software used to publish distributed forums over the anonymous networks of I2P, Tor and Freenet.
 * OneSwarm can be run as a darknet for Friend-to-friend file-sharing.
 * Tribler can be run as a darknet for file-sharing.

Defunct/Deactivated Servers

 * AllPeers
 * AnoNet
 * Turtle_F2F
 * WASTE

Buying & Selling (Marketplaces)
One of the major draws of the Darknet is its ability to facilitate 'invisible transactions', ones that do not show up on a credit card as what they really are - only appearing as an online payment made to a generic online currency generator (E.g. bitcoin). Using a hidden VPN, this makes the sale virtually invisible to anyone without the knowledge of exactly what networks have been re-routed or overridden by Tor or another proxy server. This includes names, addresses, credit card information, geographical location and information regarding the product/service sold.

Marketplaces
Silk Road: Founded in 2011 by Ross William Ullbricht, is famous for being the first darknet black market. In October of 2013, the website was shut down by the Federal Bureau of Investigations (FBI) and multiple charges were laid against Ullbricht who was ultimately convicted on all seven charges and sentenced to life in prison.

Silk Road 2.0: Former administrators of the original Silk Road reactivated the site from November 6, 2013 to November 6, 2014, when it was infiltrated and shut down as part of the FBI's 'Operation Onymous'.

Bitcoin
Given that servers like Tor and the darknet are built on the concept of anonymity, a form of crypto-currency is therefore required to complete financial transactions without revealing personal details or leaving trails as would be the case with credit cards etc. Bitcoin is the currency of choice for the Darknet and can be used to buy anything on the dark market, from hitman services, to illegal drugs, site access codes and hacked Paypal accounts.

Safecoin
Safecoin works with users who receive credit for services/resources offered through a network node on their computer. It is the official crypto-currency of The SAFE Network, which is is a fledgling privacy network integrated with cloud services.SAFE stands for 'Secure Access for Everyone'.

Namecoin
"These websites cannot be censored the way a government or Internet service provider can censor a regular website by blocking access to it, because the location is not a static address on a single computer, but instead is distributed across the network."

References in Media & Popular Culture
The Darknet is a common trope in many television shows and media programs that focus on crime and/or technology, and often serves as the antagonist in the popular 'man vs. machine' trope where the protagonists are tortured by being forced to watch terrible things happening on the other end of the computer connection in real time, but are helpless to stop them, given the anonymity of the Darknet and the vast reach of the Deepweb.

Some examples of shows that have shown or featured the Darknet as a major plotline include: Criminal Minds

Law & Order: SVU Darknet Files (cancelled) See also  Crypto-anarchism  Private P2P  Internet_privacy  Virtual_private_network (VPN)
 * Sneakernet