Dilemmas related to the functioning and growth of Darknet and the Onion Router network
Abstract
It is inevitable that the rules for using various sources of information in cyberspace keep changing. We are still searching for the best possible form. A form that would, on the one hand, provide us with reliable material, and on the other hand guarantee utmost security and ensure that our interests or any exchange of correspondence or opinion will not be seized by unauthorised individuals or even used against us. In order to meet such needs and expectations, Darknet has been created, in particular TOR network (The Onion Router). The starting point for this paper was the history and principles of TOR, as well as the issue of anonymity and payments with cryptocurrencies. In the further part of the article there is a discussion on the positive and negative opportunities that TOR offers. The paper ends with an indication of possible directions for further work and elaboration.
Downloads
References
Mazur M. Historia naturalna polskiego naukowca, PIW, Warsaw 1970, pp. 5-13.
Cezary Banasiński (scientific supervision), Marcin Rojszczak (scientific supervision), Cyberbezpieczeństwo, Wolters Kluwer, Warsaw 2020, pp.338-339.
Cook J., Tor Director Claims Some Government Agents Are Secretly Helping Him, Undermining Intelligence Operations, [w:] Buinsessinsider.com, 2014.
Russia offers $110,000 to crack Tor anonymous network, BBC.com, 2014.
Callanan C., Dries -Ziekenheiner H.,Escudero-Pascual A., Guerra R., Lepaing Over the Firwall: A Review of Censorship Circumvention Tools’, freedom House, 2011.
Wilde.O, The Critics as Artiists, 1981.
M. Bergman, The Deep Web: Surfacing Hidden Value, Journal of Electronic Publishing. 2001.
Devine J., Egger-Sider F. Beyond Google: The Invisible Web in the Academic Library, The Journal of Academic Librarianship. 2004, vol. 30.
https://2019.www.torproject.org/about/ overview.html.en#stayinganonymous
http://brasshorncommunications.uk/ projects/Onion3G/
Silk Road, największy sklep z narkotykami w Internecie zamknięty. FBI namierzyło i aresztowało jego twórcę, Niebezpiecznik. pl, 2013.
https://blog.chainalysis.com/2019-cryptocrime-reviewhttps://uploads
https://www.coindesk.com/tor-project-takes-cryptos-after-donors-request-new-options
Lewin K. Froniter in Group Dynamics, Human Relations 1947, vol. 1, no.2.
Halavis A. Wyszukiwarki internetowe a społeczeństwo, Wydawnictwo Naukowe PWN, Warszawa 2012, s. 81.
SecDev Foundation, Syrian Regime Tightens Access to Secure Online Communications, new.secdev-foundation.org, 2015.
https://www.fsf.org/news/2010-free-software-awards-announced
Bartlett, J. The Dark Net: Inside the Digital Underworld, 2014.
Leukfeldt E. R., Stol W. Cyber Safety: An Intruduction, Eleven International Publishing Hague 2012.
Roose K., Here Come The Fake Videos, Too, Nytimes.com, 2018.
Abstract views: 1036 PDF Downloads: 897
Copyright (c) 2020 Anna Nastuła
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).