Darknet

In computing, darknet is the term used to describe any encrypted internet network accessible only through advanced protocols that provide user anonymity. It is frequently characterized as the part of the internet that cannot be reached with normal search engines or standard web browsers, as content on darknet-hosted websites is not indexed in a manner that allows it to be found using conventional methods. In many cases, users access darknet content through specialized web browsers with sophisticated privacy features.

An alternate form of darknet networking is known as friend-to-friend (F2F) networking. This option allows two or more people who know one another to establish a secure, password-protected, or encrypted network connection that is available uniquely to them. F2F networking facilitates secure and private internet-based communication.

Overview

While the terms deep web, dark web, and darknet are often used interchangeably, there are significant distinctions between them. These distinctions are often explained using the so-called iceberg analogy. The surface-level internet, which is accessible with standard search engines and web browsers, is like the tip of an iceberg—the part that is visible above water.

The deep web, meanwhile, is like the part of the iceberg that lies just below the surface of the water. It includes anything that cannot be indexed by standard search engines. However, conventional web browsers are still capable of accessing some forms of unindexed deep web content, so long as users already know where to find it.

The dark web represents the deepest underwater depths to which the iceberg reaches. Dark web content has intentionally been hidden and can only be accessed with web browsers that use a series of secure relays that mask users' internet protocol (IP) addresses, thus preventing them from being identified. The term darknet refers to any network used to deliver dark web content to internet users, or to any type of encrypted, password-protected, or otherwise private network connection that only a limited number of specifically authorized individuals can join or use.

One of the most popular tools used to connect to darknet networks is a specialized privacy browser known as Tor, which operates with the help of volunteers who allow their servers to be used to route darknet traffic. Tor facilitates indirect internet connections by routing users through a series of network protocols known as tunnels, which make it extremely difficult for a user's actual IP address to be tracked. Thus, individuals using such privacy browsers cannot be accurately identified with existing internet traffic analysis methods or networking surveillance tools. This technique is known as onion routing, and Tor's name is derived from an acronym that stands for The Onion Router.

Darknet connections are often used to circumvent censorship and internet surveillance, enabling users to access content that is blocked by governments, private companies, or other organizations. It also allows users with privacy concerns to communicate with one another without fear of being monitored. However, darknet technologies also facilitate cybercriminal activities, allowing for the illicit exchange of black market goods and services, as well as illegal internet content such as graphic violence and pornography.

Bibliography

Bartlett, Jamie. The Dark Net: Inside the Digital Underworld. Melville House, 2015.

"Clearing Up Confusion—Deep Web vs. Dark Web." BrightPlanet, 27 Mar. 2014, brightplanet.com/2014/03/clearing-confusion-deep-web-vs-dark-web/. Accessed 20 Nov. 2017.

Cleary, Brenna. "What Is the Dark Web and How Do You Access It?" Norton, 14 May 2024, us.norton.com/blog/how-to/what-is-the-dark-web. Accessed 7 Nov. 2024.

"File-Sharing 'Darknet' Unveiled." BBC, 16 Aug. 2006, news.bbc.co.uk/2/hi/technology/4798059.stm. Accessed 20 Nov. 2017.

Hudson, Alexander. "The Dark Net - Five Thins You Need to Know." College of Policing, 31 May 2022, www.college.police.uk/article/dark-net-five-things-you-need-know. Accessed 7 Nov. 2024.

Percy, Benjamin. The Dark Net. Hachette UK, 2017.

Reilly, Claire. "Darknet 101: Your Guide to the Badlands of the Internet." CNET, 4 July 2017, www.cnet.com/news/darknet-dark-web-101-your-guide-to-the-badlands-of-the-internet-tor-bitcoin/. Accessed 20 Nov. 2017.

Senker, Cath. Cybercrime & the Dark Net: Revealing the Hidden Underworld of the Internet. Arcturus Publishing, 2016.

Taylor, Harriet. "Hit Men, Drugs, and Malicious Teens: The Darknet Is Going Mainstream." CNBC, 19 May 2016, www.cnbc.com/2016/05/18/hit-men-drugs-and-malicious-teens-the-darknet-is-going-mainstream.html. Accessed 20 Nov. 2017.

"Tor Project—Overview." Tor, www.torproject.org/about/overview.html.en. Accessed 20 Nov. 2017.

"What Is the Difference between Deep Web, Darknet, and Dark Web?" Fossbytes, 11 Feb. 2017, fossbytes.com/difference-deep-web-darknet-dark-web/. Accessed 20 Nov. 2017.

Wood, Jessica A. "The Darknet: A Digital Copyright Revolution." Richmond Journal of Law and Technology, vol. 16, no. 4, 2010, pp. 1–60.