A dark net or darknet is an
overlay network
An overlay network is a computer network that is layered on top of another network.
Structure
Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through ...
within the
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
that can only be accessed with specific software, configurations, or authorization,
and often uses a unique customized
communication protocol
A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any kind of variation of a physical quantity. The protocol defines the rules, syntax, semantics and synchroniza ...
. Two typical darknet types are social networks (usually used for
file hosting
A file-hosting service, cloud-storage service, online file-storage provider, or cyberlocker is an internet hosting service specifically designed to host user files. It allows users to upload files that could be accessed over the internet afte ...
with a
peer-to-peer
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer ...
connection), and
anonymity proxy networks such as
Tor
Tor, TOR or ToR may refer to:
Places
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor River, Western New Guinea, Indonesia
Sc ...
via an anonymized series of connections.
The term "darknet" was popularized by major news outlets to associate with
Tor Onion services
Tor, TOR or ToR may refer to:
Places
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor River, Western New Guinea, Indonesia
Sc ...
, when the infamous drug bazaar
Silk Road used it, despite the terminology being unofficial. Technology such as
Tor
Tor, TOR or ToR may refer to:
Places
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor River, Western New Guinea, Indonesia
Sc ...
,
I2P
The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by using ...
, and
Freenet
Freenet is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web ...
was intended to defend digital rights by providing security, anonymity, or censorship resistance and is used for both illegal and legitimate reasons. Anonymous communication between
whistle-blowers
A whistleblower (also written as whistle-blower or whistle blower) is a person, often an employee, who reveals information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe or fraudulent. Whi ...
, activists, journalists and news organisations is also facilitated by darknets through use of applications such as
SecureDrop
SecureDrop is a free software platform for secure communication between journalists and sources (whistleblowers). It was originally designed and developed by Aaron Swartz and Kevin Poulsen under the name ''DeadDrop''. James Dolan also co-create ...
.
Terminology
The term originally described computers on
ARPANET
The Advanced Research Projects Agency Network (ARPANET) was the first wide-area packet-switched network with distributed control and one of the first networks to implement the TCP/IP protocol suite. Both technologies became the technical fou ...
that were hidden, programmed to receive messages but not respond to or acknowledge anything, thus remaining invisible, in the dark.
Since
ARPANET
The Advanced Research Projects Agency Network (ARPANET) was the first wide-area packet-switched network with distributed control and one of the first networks to implement the TCP/IP protocol suite. Both technologies became the technical fou ...
, the usage of dark net has expanded to include
friend-to-friend
A friend-to-friend (or F2F) computer network is a type of peer-to-peer network in which users only make direct connections with people they know. Passwords or digital signatures can be used for authentication.
Unlike other kinds of private P2P ...
networks (usually used for
file sharing
File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include r ...
with a
peer-to-peer
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer ...
connection) and
privacy networks such as Tor.
The reciprocal term for a darknet is a
clearnet or the
surface web when referring to content indexable by search engines.
The term "darknet" is often used
interchangeably with "
dark web" because of the quantity of
hidden services on
Tor
Tor, TOR or ToR may refer to:
Places
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor River, Western New Guinea, Indonesia
Sc ...
's darknet. Additionally, the term is often inaccurately used interchangeably with the
deep web
The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard web search-engine programs. This is in contrast to the "surface web", which is accessible to anyone using the Internet. Co ...
because of Tor's history as a platform that could not be search-indexed. Mixing uses of both these terms has been described as inaccurate, with some commentators recommending the terms be used in distinct fashions.
Origins
"Darknet" was coined in the 1970s to designate networks isolated from
ARPANET
The Advanced Research Projects Agency Network (ARPANET) was the first wide-area packet-switched network with distributed control and one of the first networks to implement the TCP/IP protocol suite. Both technologies became the technical fou ...
(the government-founded military/academical network which evolved into the
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
), for security purposes.
Darknet addresses could receive data from ARPANET but did not appear in the network lists and would not answer
pings or other inquiries.
The term gained public acceptance following publication of "The Darknet and the Future of
Content Distribution", a 2002 paper by
Peter Biddle
Peter Nicholas Biddle (born December 22, 1966) is a software evangelist from the United States. His primary fields of interest include content distribution, secure computing, and encryption.
Career
Biddle joined Microsoft in 1990 as a Support ...
, Paul England, Marcus Peinado, and Bryan Willman, four employees of
Microsoft
Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washin ...
who argued the presence of the darknet was the primary hindrance to the development of workable
digital rights management (DRM) technologies and made
copyright infringement
Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, s ...
inevitable. This paper described "darknet" more generally as any type of parallel network that is encrypted or requires a specific protocol to allow a user to connect to it.
Sub-cultures
Journalist
J. D. Lasica
Joseph Daniel Lasica is an American entrepreneur, public speaker and journalist. He is the author of ''Darknet: Hollywood's War Against the Digital Generation'' () (2005), a book about the copyright wars and the future of media.
Early years
Las ...
, in his 2005 book ''Darknet: Hollywood's War Against the Digital Generation'', described the darknet's reach encompassing file sharing networks. Subsequently, in 2014, journalist
Jamie Bartlett
James Bartlett (9 July 1966 – 23 May 2022) was a British-born South African actor best known for his role as the wicked puppet master, David Genaro, in '' Rhythm City'' and his theatre work.
Career Television
Bartlett was a well-known South ...
in his book ''The Dark Net'' used the term to describe a range of underground and emergent
subcultures, including
camgirl
A webcam model (colloquially, camgirl, camboy, or cammodel) is a video performer who streams on the Internet with a live webcam broadcast. A webcam model often performs erotic acts online, such as stripping, masturbation, or sex acts in exchan ...
s,
cryptoanarchists,
darknet drug markets,
self harm
Self-harm is intentional behavior that is considered harmful to oneself. This is most commonly regarded as direct injury of one's own skin tissues usually without a suicidal intention. Other terms such as cutting, self-injury and self-mutilatio ...
communities,
social media
Social media are interactive media technologies that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks. While challenges to the definition of ''social medi ...
racists, and
transhumanists
Transhumanism is a philosophical and intellectual movement which advocates the enhancement of the human condition by developing and making widely available sophisticated technologies that can greatly enhance longevity and cognition.
Transhuma ...
.
Uses
Darknets in general may be used for various reasons, such as:
* To better protect the
privacy rights of citizens from
targeted and
mass
Mass is an intrinsic property of a body. It was traditionally believed to be related to the quantity of matter in a physical body, until the discovery of the atom and particle physics. It was found that different atoms and different eleme ...
surveillance
*
Computer crime (cracking, file corruption, etc.)
* Protecting
dissident
A dissident is a person who actively challenges an established political or religious system, doctrine, belief, policy, or institution. In a religious context, the word has been used since the 18th century, and in the political sense since the 20th ...
s from political reprisal
*
File sharing
File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include r ...
(
warez
Warez is a common computing and broader cultural term referring to pirated software (i.e. illegally copied, often after deactivation of anti-piracy measures) that is distributed via the Internet. Warez is used most commonly as a noun, a plural ...
, personal files, pornography, confidential files, illegal or counterfeit software, etc.)
* Sale of restricted goods on
darknet markets
*
Whistleblowing
A whistleblower (also written as whistle-blower or whistle blower) is a person, often an employee, who reveals information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe or fraudulent. Whi ...
and
news leak
A news leak is the unsanctioned release of confidential information to news media. It can also be the premature publication of information by a news outlet, of information that it has agreed not to release before a specified time, in violation of ...
s
* Purchase or sale of illicit or illegal goods or services
*
Circumventing network censorship and
content-filtering systems, or bypassing restrictive
firewall
Firewall may refer to:
* Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts
* Firewall (construction), a barrier inside a building, designed to limit the spr ...
policies
Software
All darknets require specific software installed or network configurations made to access them, such as
Tor
Tor, TOR or ToR may refer to:
Places
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor River, Western New Guinea, Indonesia
Sc ...
, which can be accessed via a customized browser from
Vidalia (aka the Tor browser bundle), or alternatively via a
proxy
Proxy may refer to:
* Proxy or agent (law), a substitute authorized to act for another entity or a document which authorizes the agent so to act
* Proxy (climate), a measured variable used to infer the value of a variable of interest in climate ...
configured to perform the same function.
Active
Tor is the most popular instance of a darknet, often mistakenly equated with darknet in general.
Alphabetical list:
*
anoNet is a decentralized friend-to-friend network built using
VPN
A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
and software
BGP
Border Gateway Protocol (BGP) is a standardized exterior gateway protocol designed to exchange routing and reachability information among autonomous systems (AS) on the Internet. BGP is classified as a path-vector routing protocol, and it mak ...
routers.
*
BitTorrent is a high performance semi-decentralized peer-to-peer communication
protocol
Protocol may refer to:
Sociology and politics
* Protocol (politics), a formal agreement between nation states
* Protocol (diplomacy), the etiquette of diplomacy and affairs of state
* Etiquette, a code of personal behavior
Science and technolog ...
.
*
Decentralized network 42 (not for anonymity but research purposes).
*
Freenet
Freenet is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web ...
is a popular
DHT file hosting darknet platform. It supports
friend-to-friend
A friend-to-friend (or F2F) computer network is a type of peer-to-peer network in which users only make direct connections with people they know. Passwords or digital signatures can be used for authentication.
Unlike other kinds of private P2P ...
and
opennet modes.
*
GNUnet
GNUnet is a software framework for decentralized, peer-to-peer networking and an official GNU package. The framework offers link encryption, peer discovery, resource allocation, communication over many transports (such as TCP, UDP, HTTP ...
can be utilized as a darknet if the "
F2F (network) topology" option is enabled.
*
I2P
The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by using ...
(Invisible Internet Project) is an
overlay
Overlay may refer to:
Computers
*Overlay network, a computer network which is built on top of another network
*Hardware overlay, one type of video overlay that uses memory dedicated to the application
*Another term for exec, replacing one process ...
proxy network that features hidden services called "
Eepsite
The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by usin ...
s".
*
IPFS
The InterPlanetary File System (IPFS) is a protocol, hypermedia and file sharing peer-to-peer network for storing and sharing data in a distributed file system. IPFS uses content-addressing to uniquely identify each file in a global namespac ...
has a browser extension that may backup popular webpages.
*
RetroShare
Retroshare is a free and open-source peer-to-peer communication and file sharing app based on a friend-to-friend network built by GNU Privacy Guard (GPG). Optionally, peers may exchange certificates and IP addresses to their friends and vice ...
is a
friend-to-friend
A friend-to-friend (or F2F) computer network is a type of peer-to-peer network in which users only make direct connections with people they know. Passwords or digital signatures can be used for authentication.
Unlike other kinds of private P2P ...
messenger communication and file transfer platform. It may be used as a darknet if
DHT and Discovery features are disabled.
*
Riffle
A riffle is a shallow landform in a flowing channel. Colloquially, it is a shallow place in a river where water flows quickly past rocks. However, in geology a riffle has specific characteristics.
Topographic, sedimentary and hydraulic indica ...
is a government, client-server darknet system that simultaneously provides secure anonymity (as long as at least one server remains uncompromised), efficient computation, and minimal bandwidth burden.
*
Secure Scuttlebutt
Secure Scuttlebutt (SSB) is a peer-to peer communication protocol, mesh network, and self-hosted social media ecosystem. Each user hosts their own content and the content of the peers they follow, which provides fault tolerance and eventual ...
is a peer-to peer communication protocol, mesh network, and self-hosted social media ecosystem
*
Syndie
Syndie is an open-source cross-platform computer application to syndicate (re-publish) data (mainly forums) over a variety of anonymous and non-anonymous computer networks.
Syndie is capable of reaching archives situated in the following anony ...
is
software
Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work.
...
used to publish
distributed Distribution may refer to:
Mathematics
*Distribution (mathematics), generalized functions used to formulate solutions of partial differential equations
*Probability distribution, the probability of a particular value or value range of a varia ...
forums over the anonymous networks of I2P, Tor and Freenet.
*
Tor
Tor, TOR or ToR may refer to:
Places
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor River, Western New Guinea, Indonesia
Sc ...
(The onion router) is an
anonymity network that also features a darknet – via its
onion services
Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting of more than seven thousand relays, to conc ...
.
*
Tribler
Tribler is an open source decentralized BitTorrent client which allows anonymous peer-to-peer by default. Tribler is based on the BitTorrent protocol and uses an overlay network for content searching.
Due to this overlay network, Tribler doe ...
is an anonymous BitTorrent client with built in search engine, and non-
web, worldwide publishing through channels.
*
Urbit
Urbit is a decentralized personal server platform. The platform seeks to deconstruct the client-server model in favour of a federated network of personal servers in a peer-to-peer network with a consistent digital identity.
Overview
The Urb ...
is a federated system of personal servers in a peer-to-peer overlay network.
*
Zeronet
ZeroNet is a decentralized web-like network of peer-to-peer users, created by Tamas Kocsis in 2015, programming for the network was based in Budapest, Hungary; is built in Python; and is fully open source. Instead of having an IP address, site ...
is a
DHT Web 2.0 hosting with
Tor
Tor, TOR or ToR may refer to:
Places
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor River, Western New Guinea, Indonesia
Sc ...
users.
No longer supported
*
StealthNet
StealthNet is an anonymous P2P file sharing software based on the original RShare client, and has been enhanced. It was first named 'RShare CE' (RShare Community Edition). It use the same network and protocols as RShare.
In 2011 a fork named ...
(discontinued)
*
WASTE
Waste (or wastes) are unwanted or unusable materials. Waste is any substance discarded after primary use, or is worthless, defective and of no use. A by-product, by contrast is a joint product of relatively minor economic value. A waste prod ...
Defunct
*
AllPeers
AllPeers was a free software browser extension for Mozilla Firefox.
On March 2, 2008, AllPeers announced the end of the service.
The extension allowed building a social network and sharing files on a P2P basis. It used a darknet style of peer- ...
*
Turtle F2F
Turtle was a free anonymous peer-to-peer network project being developed at the Vrije Universiteit in Amsterdam, involving professor Andrew Tanenbaum. It is not developed anymore. Like other anonymous P2P software, it allows users to share files ...
See also
*
Crypto-anarchism
Crypto-anarchism or cyberanarchism is a political ideology focusing on protection of privacy, political freedom, and economic freedom, the adherents of which use cryptographic software for confidentiality and security while sending and receiving ...
*
Cryptocurrency
*
Darknet market
*
Dark web
*
Deep web
The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard web search-engine programs. This is in contrast to the "surface web", which is accessible to anyone using the Internet. Co ...
*
Private peer-to-peer
Private peer-to-peer (P2P) systems are peer-to-peer (P2P) systems that allow only mutually trusted peers to participate. This can be achieved by using a central server such as a Direct Connect hub to authenticate clients. Alternatively, users can ...
(P2P)
*
Sneakernet
Sneakernet, also called sneaker net, is an informal term for the transfer of electronic information by physically moving media such as magnetic tape, floppy disks, optical discs, USB flash drives or external hard drives between computers, rather ...
*
Virtual private network (VPN)
References
{{DEFAULTSORT:Darknet (networking)
File sharing
Virtual private networks
Darknet markets
Cyberspace
Internet culture
Internet terminology
Dark web
Network architecture
Distributed computing architecture
1970s neologisms
*
Internet architecture