Darknet

from Wikipedia, the free encyclopedia

The Anonymous - or Guy Fawkes - Mask is one of the symbols of the Darknet.

Darknet ( English for "Dark Power") in describing computer science , a peer-to-peer - overlay network , establish its participants their interconnections manually. This concept is in contrast to conventional peer-to-peer networks, in which the connections to the clients of strangers are usually initiated automatically and arbitrarily. As a result, a Darknet offers a higher level of security, since an attacker cannot easily access the network - or, ideally, he does not know anything about the existence of the network.

overview

The data is often transmitted and stored in encrypted form. Their uses range from normal data exchange between private individuals to small file sharing networks for music and films to networking critics of the regime. In order to counter the accusation of use, for example to violate copyright law through music exchange, Darknet operators emphasize that freedom of expression , especially in censored countries like China, can be strengthened through such networks.

Difference from the deep web

The Darknet describes a closed network and contains closed websites which can only be found via the Tor Browser and which are not indexed in normal search engines.

The deep web, on the other hand, only describes a closed part of the Internet, which can be accessed from all browsers, but only accessible to some users. An example of this are bank networks.

Working method

The entry into the Darknet with the Tor Browser .
(Video length: 2:08 min)

If the network is used for file sharing , Darknet is a type of friend-to-friend network (F2F). Most file-sharing programs are not darknets, as the nodes (peers) can communicate with every other node (public, unchecked peers) in the network.

A friend-to-friend network differs from a Darknet in that a friend-to-friend network also supports forwarding files to the friends of the friends, but the friends' IP addresses are not visible to the friends. An F2F network must therefore be organized decentrally (you know the IP addresses of the friends, but not their friends), a darknet can also be organized centrally (that is, a hub with all friends could also be a darknet; here, however, you know all the IP addresses of all).

A well-known darknet software is WASTE from Nullsoft . A real F2F network can be set up via the instant messenger Turtle F2F , which also allows file sharing via the giFT client . As a participant - unlike WASTE in broadcasting mode - you don't know the friends of your friends. A turtle network is thus founded in Turtle, in which only connections can be established that come from verified friends. However, Turtle does not seem to be further developed, but similar approaches are also being pursued by RetroShare , HybridShare , OnShare, ExoSee, GigaTribe or Gazzera.

Freenet , a network for the anonymous and censorship-free exchange of information, is working from version 0.7 onwards to create a global darknet that can have millions of participants. Such an atypical Darknet should be possible through an application of the small world phenomenon .

Concept history

As early as the 1970s, the term Darknet was used to denote networks isolated from ARPANET and further popularized by the article The Darknet and the Future of Content Distribution from 2002. Four Microsoft employees argue that the presence of darknets is the main obstacle in the development of functioning digital rights management techniques .

reception

Due to the properties of the Darknet, considerable opportunities for criminal activities, such as illegal drug or arms trafficking , are seen. Relevant criminal investigations have recently been carried out more intensively. A study by the British think tank International Institute for Strategic Studies published at the beginning of February 2016 classified 57 percent of 5205 active sites on the Darknet as "illegal" in terms of content. However, over a third of the offers would be used legally, including onion services such as those from Facebook or Mailbox.org . Constanze Kurz , spokeswoman for the Chaos Computer Club (CCC), criticized the one-sided view of the mass media on the Darknet on netzpolitik.org ; so would "encrypted networks just by journalists, human rights organizations, of whistleblowers or people who need to be protected for other reasons, is used." The CCC spokesman Linus Neumann said: "The darknet is the Internet, how to actually want it would. A network without censorship and surveillance, with all its advantages and disadvantages ”. The debate about darknet crime in Germany also shows that people live in a relatively free society. "In a country like China you end up on the darknet faster because you have to protect your communication more strongly." The managing director of the human rights organization Reporters Without Borders (ROG), Christian Mihr, refers to communication via darknet in countries like Syria or Iran. However, the Darknet in particular would also be relevant for Germany, since "here too [...] the Internet is being monitored more and more". With increasing surveillance, "the number of those who learn to appreciate the anonymity of Darknets" increases. "One has a right to" anonymous communication "and equating crime and Darknet is" extremely dangerous ".

The Darknet is also of particular importance for whistleblowers . In this regard, important newspapers such as the New York Times have already set up pages on the Darknet in order to be able to receive confidential information anonymously.

The Telegram Messenger belongs to the Darknet due to its features with encryption and after the ban on territories of different countries. Due to the anonymity, it contains encrypted channels for selling banned substances, recruiting various organizations and coordinating anti-government measures.

See also

A map showing the average usage of the Tor network in 2012/2013. Source: University of Oxford

literature

General overview

  • Jamie Bartlett: The Dark Net: Inside the Digital Underworld. Melville House, Brooklyn / London 2015, ISBN 978-1-61219-521-6 .
  • Cornelius Granig: Darknet: The world in the shadow of computer crime. Verlag Kremayr & Scheriau, Vienna 2019, ISBN 978-3-218-01157-0 .
  • Otto Hostettler: Darknet. The shadow world of the internet. NZZ Libro / FAZ, Zurich 2017, ISBN 978-3-03810-257-1 .
  • Stefan Mey: Darknet. Guns, drugs, whistleblowers. How the digital underworld works. CH Beck Verlag, Munich 2017, ISBN 978-3-406-71383-5 .

Handling

  • Peter Loshin: Anonymous on the Internet with Tor and Tails. Franzis Verlag, Haar near Munich 2015, ISBN 978-3-645-60416-1 .

Lexicon entries and studies

  • Darknet . In: Federal Center for Political Education (Ed.): From Politics and Contemporary History . tape 67 , no. 46-47 . Federal Agency for Civic Education, Bonn 10 November 2017 ( online ).
  • Daniel Moore, Thomas Rid : Cryptopolitics and the Darknet. In: Survival. 58, 2016, p. 7, doi : 10.1080 / 00396338.2016.1142085
  • The Darknet - a shelter for politically persecuted people or a playground for criminals? In: Dr. jur. Matthias Brauer (Ed.): Student work as part of a focus seminar in the summer semester 2018 at the Ernst-Moritz-Arndt University of Greifswald . Greifswald ( online [PDF]).

Web links

Wiktionary: Darknet  - explanations of meanings, word origins, synonyms, translations

Individual evidence

  1. Jessica Wood: A Digital Copyright Revolution . In: Richmond Journal of Law and Technology . 16, No. 4, 2010. Retrieved October 25, 2011.
  2. JD Lasica: Darknets: Hollywood's War Against the Digital Generation . J. Wiley & Sons, Hoboken, NJ 2005, ISBN 0-471-68334-5 .
  3. Difference DEEP Web - DARK Web? In: WWInterface. September 16, 2017, accessed on December 17, 2019 (German).
  4. About Darknet ( Memento from March 25, 2015 in the Internet Archive )
  5. Peter Biddle, Paul England, Marcus Peinado, Bryan Willman: The Darknet and the Future of Content Distribution . In: ACM Workshop on Digital Rights Management. Microsoft Corporation .
  6. Drugs, weapons, counterfeit money: Investigators unearth criminals on the Darknet. In: n-tv.de. February 29, 2016. Retrieved July 26, 2016 .
  7. The Dark Web is overflowing with illegal offers , Süddeutsche Zeitung of February 2, 2016, accessed on July 30, 2016
  8. ^ The darkness online - Cryptopolitics and the Darknet , Daniel Moore & Thomas Rid in Survival: Global Politics and Strategy, 2016
  9. Drugs, porn and violence: The Darknet really is that criminal , chip.de from February 5, 2016, accessed on July 29, 2016
  10. Constanze: Comment: Is the evil in the world creeping out of the nasty "Darknet"? In: netzpolitik.org. July 25, 2016. Retrieved July 26, 2016 .
  11. Crime on the net: The Darknet is better than its reputation , Spiegel Online from July 30, 2016, accessed on the same day
  12. The Darknet - a shelter for the politically persecuted or a playground for criminals? , Ed .: Dr. jur. Matthias Brauer, accessed August 22, 2018
  13. DividedBy0: EU Parliament Committee Proposes Requiring End-to-End Encryption for All Communications. (No longer available online.) In: Deep Dot Web . June 17, 2017, archived from the original on August 3, 2018 ; accessed on October 29, 2018 (English).
  14. netstalkers: ДАРКНЕТ ПЕРЕЕХАЛ В ТЕЛЕГРАМ [netstalkers]. September 7, 2017, Retrieved October 29, 2018 (Russian).
  15. Опасный Telegram: закрытость мессенждера на руку террористам и наркоторговцам. Retrieved October 29, 2018 (Russian).