skip to main content
research-article

Demistifying the dark web

Published:11 July 2018Publication History
Skip Abstract Section

Abstract

Anonymity network overlays have a dark shroud of mystery. The "dark web" is known to everybody and nobody. But what is it, really?

References

  1. Chaum, D. L. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 2 {1981}, 84--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Rennhard, M., and Plattner, B. Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection. In Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society. ACM, New York, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Freedman, M. J., and Morris, R. Tarzan: A peer-to-peer anonymizing network layer. In Proceedings of the Ninth ACM conference on Computer and communications security. ACM, New York, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Demistifying the dark web

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image XRDS: Crossroads, The ACM Magazine for Students
              XRDS: Crossroads, The ACM Magazine for Students  Volume 24, Issue 4
              Pseudonimity and Anonymity
              Summer 2018
              52 pages
              ISSN:1528-4972
              EISSN:1528-4980
              DOI:10.1145/3239334
              Issue’s Table of Contents

              Copyright © 2018 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 11 July 2018

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Popular
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format