Dilemmas related to the functioning and growth of Darknet and the Onion Router network

Keywords: TORnetwork, Darknet, cybersecurity, privacy, cyberspace, Bitcoin


It is inevitable that the rules for using various sources of information in cyberspace keep changing. We are still searching for the best possible form. A form that would, on the one hand, provide us with reliable material, and on the other hand guarantee utmost security and ensure that our interests or any exchange of correspondence or opinion will not be seized by unauthorised individuals or even used against us. In order to meet such needs and expectations, Darknet has been created, in particular TOR network (The Onion Router). The starting point for this paper was the history and principles of TOR, as well as the issue of anonymity and payments with cryptocurrencies. In the further part of the article there is a discussion on the positive and negative opportunities that TOR offers. The paper ends with an indication of possible directions for further work and elaboration.


Download data is not yet available.

Author Biography

Anna Nastuła, Wojskowa Akademia Techniczna

Doctoral on the Faculty of Security Studies, Warsaw, Poland, Master degree (in law)


Mazur M. Historia naturalna polskiego naukowca, PIW, Warsaw 1970, pp. 5-13.

Cezary Banasiński (scientific supervision), Marcin Rojszczak (scientific supervision), Cyberbezpieczeństwo, Wolters Kluwer, Warsaw 2020, pp.338-339.

Cook J., Tor Director Claims Some Government Agents Are Secretly Helping Him, Undermining Intelligence Operations, [w:] Buinsessinsider.com, 2014.

Russia offers $110,000 to crack Tor anonymous network, BBC.com, 2014.

Callanan C., Dries -Ziekenheiner H.,Escudero-Pascual A., Guerra R., Lepaing Over the Firwall: A Review of Censorship Circumvention Tools’, freedom House, 2011.

Wilde.O, The Critics as Artiists, 1981.

M. Bergman, The Deep Web: Surfacing Hidden Value, Journal of Electronic Publishing. 2001.

Devine J., Egger-Sider F. Beyond Google: The Invisible Web in the Academic Library, The Journal of Academic Librarianship. 2004, vol. 30.

https://2019.www.torproject.org/about/ overview.html.en#stayinganonymous

http://brasshorncommunications.uk/ projects/Onion3G/

Silk Road, największy sklep z narkotykami w Internecie zamknięty. FBI namierzyło i aresztowało jego twórcę, Niebezpiecznik. pl, 2013.



Lewin K. Froniter in Group Dynamics, Human Relations 1947, vol. 1, no.2.

Halavis A. Wyszukiwarki internetowe a społeczeństwo, Wydawnictwo Naukowe PWN, Warszawa 2012, s. 81.

SecDev Foundation, Syrian Regime Tightens Access to Secure Online Communications, new.secdev-foundation.org, 2015.


Bartlett, J. The Dark Net: Inside the Digital Underworld, 2014.

Leukfeldt E. R., Stol W. Cyber Safety: An Intruduction, Eleven International Publishing Hague 2012.

Roose K., Here Come The Fake Videos, Too, Nytimes.com, 2018.

Abstract views: 1084
PDF Downloads: 935
How to Cite
Nastuła, A. (2020). Dilemmas related to the functioning and growth of Darknet and the Onion Router network. Social Development and Security, 10(2), 3-10. https://doi.org/10.33445/sds.2020.10.2.1