Skip to main content

The Dark Web Apart from Tor

The Dark Web Apart from Tor

The dark web, a subset of the broader Deep Web, is comprised of online content that is not indexed by conventional search engines and requires specialized software or permissions to access. While Tor (The Onion Router) is perhaps the most recognized darknet, there are numerous other anonymity networks, each with its own distinct features and user base (Figueras-Martín, Magán-Carrión, & Boubeta-Puig, 2022).

Tor, with its onion routing system, is renowned for its ability to enable users to access websites in the dark web anonymously. However, its popularity has also attracted attention from search engines, which often block access to Tor's onion services. To circumvent these restrictions, services like Tor2web have emerged, allowing users to access Tor onion services without using the Tor Browser (Tor2web, n.d).

Aside from Tor, other darknets include I2P, Freenet, ZeroNet, GNUnet, Retroshare, Urbit, and Tribler. Unlike Tor, many of these networks operate as decentralized peer-to-peer (P2P) networks, providing user anonymity through distributed architectures (Hoang et al., 2018).

I2P, for instance, facilitates anonymous torrenting through its I2PSnark plugin, along with email and messaging clients, and websites known as "eepsites" (Hatta, 2018). Similarly, Freenet (Hyphanet) offers decentralized email, messaging, file sharing, and social networking, with sites referred to as "freesites" (Magán-Carrión et al., 2021). Hyphanet describes itself as a peer-to-peer platform for censorship-resistant and privacy-respecting publishing and communication (Jones, 2018).

ZeroNet, which utilizes Bitcoin cryptography and the BitTorrent network, is notable for its decentralized apps and email clients, and can be used in conjunction with Tor for enhanced anonymity (Pudalov, 2023). While each darknet differs in its architecture and functionality, their common goal is to provide a platform for secure and anonymous online communication and content sharing.

In conclusion, while Tor remains a prominent darknet, there exists a diverse ecosystem of alternative anonymity networks, each catering to specific user needs and preferences. As the demand for privacy and security in online interactions continues to grow, these darknets play a vital role in ensuring user anonymity and freedom of expression. However, it's essential to acknowledge that the dark web is not without its challenges and risks. It serves as a breeding ground for illegal activities, including but not limited to, illicit drug trafficking, weapons trading, cybercrime services, and child exploitation. Therefore, while these anonymity networks provide valuable tools for protecting privacy and promoting free speech, they also present significant ethical and legal concerns that must be addressed to mitigate their misuse and negative impact on society.


Reference:

Jones, A. (2018, March 1). Introduction To Freenet. Retrieved from https://www.youtube.com/watch?v=zu9gM3_gIfM

Figueras-Martín, E., Magán-Carrión, R., & Boubeta-Puig, J. (2022, June 14). Drawing the web structure and content analysis beyond the Tor darknet: Freenet as a case of study. Journal of Information Security and Applications, 68, Article 103229.


Hatta, M. (2018, October 29). How to set up untraceable websites (eepsites) on I2P. Retrieved from https://mhatta.medium.com/how-to-set-up-untraceable-websites-eepsites-on-i2p-1fe26069271d


Hoang, N. P., Kintis, P., Antonakakis, M., & Polychronakis, M. (2018, October). An Empirical Study of the I2P Anonymity Network and its Censorship Resistance. In Proceedings of the Internet Measurement Conference 2018 (IMC '18) (pp. 379–392). https://doi.org/10.1145/3278532.3278565


Magán-Carrión, R., Abellán-Galera, A., Maciá-Fernández, G., & García-Teodoro, P. (2021, July 20). Unveiling the I2P web structure: A connectivity analysis. Computer Networks, 194, Article 108158.


Pudalov, E. (2023). What other dark webs are there besides Tor? Retrieved from https://www.quora.com/What-other-dark-webs-are-there-besides-Tor/answer/Eric-Pudalov


Tor2web. (n.d). Tor2web: Browse the Tor Onion Services. Retrieved from https://www.tor2web.org/


Comments

Popular posts from this blog

Scientific Management

  Scientific Management Scientific management is a management theory that analyzes workflows to improve economic efficiency, especially labor productivity. It implies the use of scientific methods in making decisions and acting on organizational problems and situations. This management theory, developed by Frederick Winslow Taylor, was popular in the 1880s and 1890s in U.S. manufacturing industries. While the terms “scientific management” and “Taylorism” are often treated as synonymous, a more accurate view is that Taylorism is the first form of scientific management. Taylorism is sometimes called the “classical perspective,” meaning that it is still observed for its influence but no longer practiced exclusively. Scientific management was best known from 1910 to 1920, but in the 1920s, competing management theories and methods emerged, rendering scientific management largely obsolete by the 1930s. However, many of the themes of scientific management are still seen in industrial eng...

Laws Against Rape in Nigeria

The good book says, “where there is no law, there is no offence” .  In criminal law, there is a principle called Nullum crimen sine lege (Latin for "no crime without law."). It says that a person cannot or should not face criminal punishment except for an act that is criminalized by law before he/she committed it (okay, I promise this is the only legal jargon you’ll see in this article).  Amidst growing and disturbing reports of rape and other sexual and gender-based violence, especially against women and children in Nigeria, there is also growing interest in provisions of the law that provide protection to women and victims of gender-based violence. In contribution to the global awareness campaign for the protection of women from gender-based violence, it is an asset to be knowledgeable on the existing legal framework for protecting the rights of victims and survivors in search of justice. This article also serves as a warning to potential offenders, of the punishment tha...