Signature Redacted a Uthoree

Total Page:16

File Type:pdf, Size:1020Kb

Signature Redacted a Uthoree MASSACHUSETS INSTITUTE Internet as an object. OF TECHNOLOGY by JUL 2 6 2019 Kallirroi Retzepi LIBRARIES B.Eng., Swiss Federal Institute of Technology (2011) S.M., Swiss Federal Institute of Technology (2013) Submitted to the Program in Media Arts and Sciences, School of Architecture and Planning in partial fulfillment of the requirements for the degree of Master's in Media Arts and Sciences at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2019 @ Massachusetts Institute of Technology 2019. All rights reserved. Signature redacted A uthoree - --- --- - ............... :...... Program in Media Arts and Sciences, May 10, 2019 Signature redacted Certified by ...... .. .................... Andrew Lippman Associate Director & Senior Research Scientist, MIT Media Lab Thesis Supervisor Signature redacted Accepted by ...... / Professor Tod Machover Academic Head, Program in Media Arts and Sciences 2 Internet as an object. by Kallirroi Retzepi Submitted to the Program in Media Arts and Sciences,, School of Architecture and Planning on May 10, 2019, in partial fulfillment of the requirements for the degree of Master's in Media Arts and Sciences Abstract This thesis lies in the intersection of three avenues: physical non-screen interfaces, sto- rytelling promoting community connectedness and hyper-locality afforded by decentraliza- tion. The central question addressed is whether the design and underlying technology of entry points to a network change the way people interact with it and the experience they have. To explore this, I designed and engineered a set of playful physical objects which function as nodes of a hyper-local network. Information bestowed upon this network remains within these nodes, cryptographically secure, and accessible only to local commu- nity members who are aware of the network's existence and mode of operation. I success- fully deployed this network in four locations across the MIT campus, where members of the MIT community could record and listen to audio messages using the physical objects. Given the choice, people engaged with the decentralized, closed network more than they did with the control (open) one. The messages collected by the former had a more positive sentiment score and their language was more personal than the control. This work is in- dicative, but not definitive, evidence that the suggested decentralized and closed network fostered a more positive and expressive discourse than its control counterpart. Thesis Supervisor: Andrew Lippman Title: Associate Director & Senior Research Scientist, MIT Media Lab Internet as an object. by Kallirroi Retzepi This thesis has been reviewed and approved by the following committee members: Signature redacted Andrew Lippman............. Associate Director & Senior Research Scientist MIT Media Lab Signature redacted Judith Donath.. Advisor Berkman-Klein Center Harvard University Signature redacted Zach Lieberman ...... Visiting Professor MIT Media Lab Acknowledgements This is not my first degree, and maybe not my last. I came to the Lab because I was looking for a home that allowed me to think differently, to remain undecided and explore a million things at once. I was hoping that two years here would finally help me focus on a path, a career, a vocation of some sort...which of course did not happen - I am more distracted than ever! Oops~(vt/ But here's the thing: every time a chapter in my life closes I have the extreme luck to say: it is all about the people. And somehow I am convinced that this, in the short time we have to hang with each other on this planet, is the only thing that matters. I would not be here if it weren't for Interactive Things in Zurich, and the opportunity they gave me three years (already!) ago. I hold a very special place in my heart for all of you guys. Special thanks to Peter who taught me so much and Jeremy who asked me about the Media Lab on a bus ride to Munich. I would not have applied otherwise! Thank you to everyone who provided support and feedback for this work. Special thanks to Linda and Monica and the rest of the MAS women. You keep this place running! To my readers Zach and Judith, it has been such a pleasure to learn from you. This has been an intense journey, but I was blessed to have such wonderful companions on my side. Thank you so much to all the Viral team, our small family! To Ziv, Carmelo, Pedro and Woody, you have all made this journey special! Agnes, I would not possibly have done this without you...Thank you for the love, hugs, tears, memes, blob drawings, crazy dance moves, pots, books, electronics help, having my back in group meeting argu- ing matches! Pip, thank you for looking out for me, always willing to listen and having a right thing to say, and of course for knowing so much about design and art. Oceane, merci pour ton sourire, ton energie contaminante, ton enthusiasme pour tous et tout - et pour ton aide niveau circuits et Eagle! You are all such treasures! Au6m MOv yLa 1L a 7OUua(tLaac T T7(ag aTOU~tc yLt Tov a8ep60TYc, XOa TOV ca a ou Oa ctav -6ao Xapo6 evoc (xat neTuxvpvoc) govtTc cc0 MIT! Finally to Sam, who has been my everything. 6 Contents 1 Context 9 2 Existing work 13 3 System description 17 4 Evaluation 27 5 Discussion 33 6 Closing thoughts 39 7 8 Chapter 1 Context I remember a time when the adepts of the internet believed that it would bring about a new universal culture for the whole of humankind. This did not happen, because the internet makes information about the various cultures of the world universally available, but not the cultures themselves. Boris Groys "Towards a New Universalism" e-flux #86 [1] "Community Memory" 1was the world's first public computerized bulletin board system. It was created by Efrem Lipkin, Mark Szpakowski, and Lee Felsenstein and set up at the entrance to Leopold's Records in Berkeley California. Anyone could "Add" a message, attach keywords to it, and "Find" messages. Having to walk up to Leopold's Records to query the community's wisdom probably sounds like a joke to the people who live there now, and to most of us in the developed world. The Internet, the World Wide Web and the overarching technological ecosystem in which they are embedded have evolved in a frantic pace, and as every fast-paced change, it comes with benefits and costs. I will focus my critique from this point on in the following characteristics that are being normalized in existing and nascent information networks: " ubiquitous computing [2] has been translated into ubiquitous screen time [3] [4] [5] * corporate dominance of the tech giants, ranging from controlling Internet traffic [6] or undersea cables [7] to establishing contracts with the Pentagon [8] has led to unprecedented centralization of human and material resources 1https://people.well.com/user/szpak/cm/ 9 eh creation and autoates ctImad moe crat amos fo ei ud t c M CMul ammiusumameous adr G.i.vo onlin un6iv ers -acitBtd USIP eieveOU IMhi P I- M.,M of W"0 -5q "-A 51 AXAO 5WarawJ70 wTlkS A&OC IMFOaMaTmsmm Wwwd. 4w by Nmi I, A (NM t om ant toT . GOT TO is opouinl.Aster toeg ent u l c i aO.n w e r o In 1 th d x oW t. ac txsm f t0htO d c e by cha tawesia.lT ho aim onh alsowe1d. am)~aoam'N K125 .'a.',,ead...&.'.'g~~ ~~ -01111 DOM BWAT.....uZCOhAomlZ how0" . easily c lows bw te h iOWtizd itauserslalsocane be alterd ae by Ar :O m.... P_ 1. itAB~h f AW P~, Akm Mass" ANg og 89 t i n t e e b aslwnessintoOit o orce %theio nework's scopew wand( scle u t m a c in? nume of connec- Ioned d es that colcieypror nato.Temain ass~aaumpiozu mkeixta ItheconextofhisdoumentheterJnetw r X2is usedtoEscrUVibeanensembleOWT ofKA fetedbakoo pu ftetonconecedodethtclletielperoranctO.TheminassumpZO. adito mdu)ditry, ton PmtDakeisthat. consanty saing th thr ndoeno engal atxst withou thaemothe.aa. The atf.in curaiost ha rve hs hss stus a sa eark bypreentig isel Giveteakveroner"WhatiosaboutowheInfatIvewaewraditsaComuieceastwoartsofacntatfeedbackitMeopyon Faeonlinu"Wat'ivers arc hit ecd?"be contanlysalopinthothernonennotbeingabltexisltwithouttheoithser.osades (similar to what a gamut ofmmoder browser extensionsbdo.[14] [15] GvthemaincurositytativesabothistheisithuCnivretworkyrchcesIetingitselfi iffeorntcaestt eforagindhongtenltfpepl'snt hvetiosihiInoretounse Itht itisepfultidtfysmedtteinpinsrfaymfschnetwork" showo esrieanwneutilieo thnemnwhatacosshouldexpect.S noewasinhemichaneutok'sbeiorca byhetgimesphentoniote nto(.hw trbdsinbulinsonessionnttoeorbybrteor esimicnn(o lartwhatagamu m)tofrnrwseretesiionsdo[14][15])wllalohage Infath eanetworkcpandiscaldeanoeanhtoaeutsoacetinmconsatfebclopne *thetypeofmat edciumstextual~ditorypecmixoe) y nwih ewr' bhvoa (switerakseveryone"Wamtnew"whieracbooksks"Watsony ormind?"5] 10 e the content the network is prone to creating (visual, auditory) " the nature of the protocol that underlies information sharing " the location and ownership of the data that circulates in the network (whether it re- sides on a local machine or a distant server) * the transparency with which the network is perceived to function " the playfulness of the network " the regulation the network is subject to The effectiveness for ameliorating the informational landscape using some of the above pressure points, or variations of them, has already been explored by scientists and policy makers. A recent study [16] showed significant reductions in loneliness and depression af- ter limiting the time spent on social media to 30 minutes per day. The rise of decentralized technologies, from the blockchain to the decentralized Web, as I will detail in the following section, are an answer to the hyper-centralizing tendencies of Big Tech. In terms of regula- tion, there starts to be an open conversation about revising anti-trust laws to be effective in the era of platform capitalism and digital labor [17] [18]. Increasingly more and more coun- tries pass legislation [19] [20] that fines the spread of misinformation, since the promises made by the social media giants (that their sophisticated Al will effectively moderate the content being shared) fall short.
Recommended publications
  • PDF FACULTAD DE BELLAS ARTES Archivo Digital: Descarga Y Online ISBN 978-950-34-1541-2 Decana Secretaria De 1
    1º Encuentro de las cátedras de Lenguaje Visual 2B, Patrimonio Cultural e Historia de las Artes Visuales IX 1º Encuentro de las cátedras de Lenguaje Visual 2B, Patrimonio Cultural e Historia de las Artes Visuales IX 1º Encuentro de las cátedras de Lenguaje Visual 2B, Patrimonio Cultural e Historia de las Artes Visuales IX Diciembre de 2016 Visualidades contemporáneas: patrimonio, exposiciones y dispositivos / Mariel Ciafardo... [et al.]. - 1a ed. - La Plata : Universidad Nacional de La Plata. Facultad de Bellas Artes, 2017. Libro digital, PDF FACULTAD DE BELLAS ARTES Archivo Digital: descarga y online ISBN 978-950-34-1541-2 Decana Secretaria de 1. Patrimonio. 2. Historia del Arte. I. Ciafardo, Mariel Prof. Mariel Ciafardo Publicaciones y Posgrado CDD 709 Prof. María Elena Larrègle Vicedecana Prof. Cristina Terzaghi Secretaria de Extensión Prof. María Victoria Mc Coubrey Secretaria de Decanato Prof. Paula Sigismondo Secretario de Relaciones Institucionales Secretaria de Asuntos Académicos DI Eduardo Pascal Prof. Santiago Romé Secretario de Cultura Jefa del Departamento Lic. Carlos Coppa de Estudios Históricos y Sociales Lic. Paola Sabrina Belén Secretario de Producción y Comunicación Secretario de Planificación, Prof. Martín Barrios Infraestructura y Finanzas DCV Juan Pablo Fernández Secretario de Asuntos Estudiantiles Prof. Esteban Conde Ferreira Secretaria de Ciencia y Técnica Lic. Silvia García Secretario de Programas Externos DCV Fermín González Laría COMITÉ ORGANIZADOR Lic. Liliana Conles Prof. Sergio Moyinedo Prof. Mariel Ciafardo Lic. Paola Sabrina Belén Lic. Natalia Giglietti Mg. Francisco Lemus Diseño Prof. Marina Panfili DCV Diego R. Ibañez Roka Edición de contenido Lic. Natalia Giglietti Mg. Francisco Lemus Obra de tapa Cristina Schiavi, Nocturno, 2013, acrílico sobre mdf, 135 x 135 cm, Colección Malba-Fundación Costantini.
    [Show full text]
  • ARK​ ​​Whitepaper
    ARK Whitepaper ​ ​​ A Platform for Consumer Adoption ​ ​ ​ ​ ​ ​ ​ ​ v.1.0.3 The ARK Crew ARK Whitepaper v.1.0.3 ​ ​ ​ ​ ​ ​ ​ ​ Table Of Contents ​ ​ ​ ​ Overview………………………………………………………………...……………………………….……………….………………………………………………………….….3 ​ Purpose of this Whitepaper………………………………………………………………………………………………………………………..….……….3 ​ ​ ​ ​ ​ ​ ​ Why?…………………………………………………………………………………………………………………….…………………………………………………….…………..4 ​ ​ ARK…………………………………………………………………………………………………….……………….…………………………………………………………………..5 ​ ​ ARK IS………………………………………………………………………………………………....……………….………………………………………………………………..5 ​ ​ ​ ​ ARK: Technical Details……………………………………….…….…..…………………………...……………….………………...…………………………...6 ​ ​ ​ ​ ​ ​ - Delegated Proof of Stake…………………………….……………...………………………….……………………………………….………...…...6 ​ ​​ ​ ​ ​ ​ ​ ​ ​ - Hierarchical Deterministic (HD) Wallets ​ ​​ ​ ​ ​ ​ ​ ​ (BIP32)…………………………………………………….....…………………..…..8 ​ - Fees……………………………………………………………………………………………………………….……………….…...………………………………..……...8 ​ ​​ ​ - ARK Delegates and Delegate Voting.…………………………………………………………………………………...………………….9 ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ - Bridged Blockchains (SmartBridges)....................………………………………………………………………….………...…….10 ​ ​​ ​ ​ ​ ​ ​ - POST ARK-TEC Token Distribution …………………..…………………………………….………………….………..……..…..……….11 ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ - Testnet Release……………………………………………….…………………………………………………………………….………...….....12 ​ ​ ​ And Beyond?…………………………………………………………………….………...……………………………………….………………………...……….…12 ​ ​ ​ ​ Addendum 1: ARK IS…(Cont.)...……..……..…………....…..………...………………………………………...………………………......……12
    [Show full text]
  • A Framework for Identifying Host-Based Artifacts in Dark Web Investigations
    Dakota State University Beadle Scholar Masters Theses & Doctoral Dissertations Fall 11-2020 A Framework for Identifying Host-based Artifacts in Dark Web Investigations Arica Kulm Dakota State University Follow this and additional works at: https://scholar.dsu.edu/theses Part of the Databases and Information Systems Commons, Information Security Commons, and the Systems Architecture Commons Recommended Citation Kulm, Arica, "A Framework for Identifying Host-based Artifacts in Dark Web Investigations" (2020). Masters Theses & Doctoral Dissertations. 357. https://scholar.dsu.edu/theses/357 This Dissertation is brought to you for free and open access by Beadle Scholar. It has been accepted for inclusion in Masters Theses & Doctoral Dissertations by an authorized administrator of Beadle Scholar. For more information, please contact [email protected]. A FRAMEWORK FOR IDENTIFYING HOST-BASED ARTIFACTS IN DARK WEB INVESTIGATIONS A dissertation submitted to Dakota State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Cyber Defense November 2020 By Arica Kulm Dissertation Committee: Dr. Ashley Podhradsky Dr. Kevin Streff Dr. Omar El-Gayar Cynthia Hetherington Trevor Jones ii DISSERTATION APPROVAL FORM This dissertation is approved as a credible and independent investigation by a candidate for the Doctor of Philosophy in Cyber Defense degree and is acceptable for meeting the dissertation requirements for this degree. Acceptance of this dissertation does not imply that the conclusions reached by the candidate are necessarily the conclusions of the major department or university. Student Name: Arica Kulm Dissertation Title: A Framework for Identifying Host-based Artifacts in Dark Web Investigations Dissertation Chair: Date: 11/12/20 Committee member: Date: 11/12/2020 Committee member: Date: Committee member: Date: Committee member: Date: iii ACKNOWLEDGMENT First, I would like to thank Dr.
    [Show full text]
  • Zeronet Presentation
    ZeroNet Decentralized web platform using Bitcoin cryptography and BitTorrent network. ABOUT ZERONET Why? Current features We believe in open, free, and ◦ Real-time updated sites uncensored network and communication. ◦ Namecoin .bit domain support ◦ No hosting costs ◦ Multi-user sites Sites are served by visitors. ◦ Password less, Bitcoin's BIP32- ◦ Impossible to shut down based authorization It's nowhere because it's ◦ Built-in SQL server with P2P data everywhere. synchronization ◦ No single point of failure ◦ Tor network support Site remains online so long as at least 1 peer serving it. ◦ Works in any browser/OS ◦ Fast and works offline You can access the site even if your internet is unavailable. HOW DOES IT WORK? THE BASICS OF ASYMMETRIC CRYPTOGRAPHY When you create a new site you get two keys: Private key Public key 5JNiiGspzqt8sC8FM54FMr53U9XvLVh8Waz6YYDK69gG6hso9xu 16YsjZK9nweXyy3vNQQPKT8tfjCNjEX9JM ◦ Only you have it ◦ This is your site address ◦ Allows you to sign new content for ◦ Using this anyone can verify if the your site. file is created by the site owner. ◦ No central registry ◦ Every downloaded file is verified, It never leaves your computer. makes it safe from malicious code inserts or any modifications. ◦ Impossible to modify your site without it. MORE INFO ABOUT CRYPTOGRAPHY OF ZERONET ◦ ZeroNet uses the same elliptic curve based encryption as in your Bitcoin wallet. ◦ You can accept payments directly to your site address. ◦ Using the current fastest supercomputer, it would take around 1 billion years to "hack" a private key. WHAT HAPPENS WHEN YOU VISIT A ZERONET SITE? WHAT HAPPENS WHEN YOU VISIT A ZERONET SITE? (1/2) 1 Gathering visitors IP addresses: Please send some IP addresses for site 1EU1tbG9oC1A8jz2ouVwGZyQ5asrNsE4Vr OK, Here are some: 12.34.56.78:13433, 42.42.42.42:13411, ..
    [Show full text]
  • The Book of Swarm Storage and Communication Infrastructure for Self-Sovereign Digital Society Back-End Stack for the Decentralised Web
    the book of Swarm storage and communication infrastructure for self-sovereign digital society back-end stack for the decentralised web Viktor Trón v1.0 pre-release 7 - worked on November 17, 2020 the swarm is headed toward us Satoshi Nakamoto ii CONTENTS Prolegomena xi Acknowledgments xii i prelude 1 the evolution2 1.1 Historical context 2 1.1.1 Web 1.02 1.1.2 Web 2.03 1.1.3 Peer-to-peer networks 6 1.1.4 The economics of BitTorrent and its limits 7 1.1.5 Towards Web 3.08 1.2 Fair data economy 12 1.2.1 The current state of the data economy 12 1.2.2 The current state and issues of data sovereignty 13 1.2.3 Towards self-sovereign data 15 1.2.4 Artificial intelligence and self-sovereign data 16 1.2.5 Collective information 17 1.3 The vision 18 1.3.1 Values 18 1.3.2 Design principles 19 1.3.3 Objectives 19 1.3.4 Impact areas 20 1.3.5 The future 21 ii design and architecture 2 network 25 2.1 Topology and routing 25 2.1.1 Requirements for underlay network 25 2.1.2 Overlay addressing 26 2.1.3 Kademlia routing 27 2.1.4 Bootstrapping and maintaining Kademlia topology 32 2.2 Swarm storage 35 2.2.1 Distributed immutable store for chunks 35 2.2.2 Content addressed chunks 38 2.2.3 Single-owner chunks 41 2.2.4 Chunk encryption 42 2.2.5 Redundancy by replication 43 2.3 Push and pull: chunk retrieval and syncing 47 iii 2.3.1 Retrieval 47 2.3.2 Push syncing 51 2.3.3 Pull syncing 53 2.3.4 Light nodes 55 3 incentives 57 3.1 Sharing bandwidth 58 3.1.1 Incentives for serving and relaying 58 3.1.2 Pricing protocol for chunk retrieval 59 3.1.3 Incentivising push-syncing
    [Show full text]
  • An Architecture for Client Virtualization: a Case Study
    Computer Networks 100 (2016) 75–89 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet An architecture for client virtualization: A case study ∗ Syed Arefinul Haque a, Salekul Islam a, , Md. Jahidul Islam a, Jean-Charles Grégoire b a United International University, Dhaka, Bangladesh b INRS-EMT, Montréal, Canada a r t i c l e i n f o a b s t r a c t Article history: As edge clouds become more widespread, it is important to study their impact on tradi- Received 30 November 2015 tional application architectures, most importantly the separation of the data and control Revised 17 February 2016 planes of traditional clients. We explore such impact using the virtualization of a Peer- Accepted 18 February 2016 to-Peer (P2P) client as a case study. In this model, an end user accesses and controls the Available online 26 February 2016 virtual P2P client application using a web browser and all P2P application-related control Keywords: messages originate and terminate from the virtual P2P client deployed inside the remote Edge cloud server. The web browser running on the user device only manages download and upload of P2P the P2P data packets. BitTorrent, as it is the most widely deployed P2P platform, is used to BitTorrent validate the feasibility and study the performance of our approach. We introduce a proto- Virtual client type that has been deployed in public cloud infrastructures. We present simulation results Cloud-based server which show clear improvements in the use of user resources. Based on this experience we Web-RTC derive lessons on the challenges and benefits from such edge cloud-based deployments.
    [Show full text]
  • Zeronet Browser Bundle
    IJSRD - International Journal for Scientific Research & Development| Vol. 5, Issue 03, 2017 | ISSN (online): 2321-0613 ZeroNet Browser Bundle Amol Kulkarni1 Abhishek Bagde2 Bhagyesh Dhatrak3 Akshay Tiwari4 Saguna Ingle5 1,2,3,4,5Department of Computer Engineering 1,2,3,4,5Ramrao Adik Institute of Technology, Nerul, India Abstract— The Internet is the global system of interconnected computer network that links billions of devices worldwide. It III. OBJECTIVE OF THE STUDY is a network of networks that consist of millions of private, Following are the objectives that were considered during the public academic business and government network of local development of this project: and global scope, linked by a broad array of electronics Easy access of a free peer to peer network. wireless and optical networking technologies. ZeroNet is a Reducing configuration steps for accessing ZeroNet. new emerging overlay network that could provide alternative to the existing centralized system. ZeroNet provides open free Making ZeroNet available to majority of the masses. and uncensored service using bitcoin cryptography and BitTorrent network. In ZeroNet content is distributed directly IV. PROPOSED METHODOLOGY to other visitor without any central server. It is decentralized From analysis we can say that current browsers do not satisfy web platform using Bitcoin cryptography and BitTorrent the exact requirement of access to ZeroNet sites. Also, it network. Currently while using ZeroNet protocol through solely depends on the active user to Configure their browser. existing browser user has to go through long and tedious Our proposed ZeroNet Browser overcomes these limitations process which could discourage a user to opt for ZeroNet in of content based filtering such as the ability to provide day to day use.
    [Show full text]
  • Convergence-2020.Pdf
    A universal architecture to anonymize any application or protocol and turn it into an independent decentralized p2p network inside browsers and servers, with browsers acting as servers CONVERGENCE 1. Description This proposal is a complete redesign of our initial Convergence proposal from 2015 (http://www.peersm.com/Convergence.pdf ) which was intended as a research study for an EU call By “Convergence” in this proposal we don’t refer to a specific network or node but to methods using the Convergence principles 1.1 Background and rationale The initial Convergence proposal was written based on the observation that we must invent one network/system per need if we want to evade big data centralization and protect privacy/anonymity: to browse, to chat, to email, to exchange files, to do social networking or cooperative work, to do crypto currency, to protect the users from their connected objects, to handle peer identities. So it did envision the support of any type of applications and protocols on top of a secure anonymization system, inside browsers and servers The first part is very exactly what IPFS did, including the crypto currency concept in our proposal to sustain the network (Filecoin) But IPFS is not at all designed for privacy, the IPFS team knows that they will have to address the issue but it’s not even part of their roadmap And IPFS adoption is not for all protocols, many other networks will not use it and lack privacy too That’s why we are proposing the Convergence concepts, which are still very up to date, with a major novelty:
    [Show full text]
  • Unveiling the I2P Web Structure: a Connectivity Analysis
    Unveiling the I2P web structure: a connectivity analysis Roberto Magan-Carri´ on,´ Alberto Abellan-Galera,´ Gabriel Macia-Fern´ andez´ and Pedro Garc´ıa-Teodoro Network Engineering & Security Group Dpt. of Signal Theory, Telematics and Communications - CITIC University of Granada - Spain Email: [email protected], [email protected], [email protected], [email protected] Abstract—Web is a primary and essential service to share the literature have analyzed the content and services offered information among users and organizations at present all over through this kind of technologies [6], [7], [2], as well as the world. Despite the current significance of such a kind of other relevant aspects like site popularity [8], topology and traffic on the Internet, the so-called Surface Web traffic has been estimated in just about 5% of the total. The rest of the dimensions [9], or classifying network traffic and darknet volume of this type of traffic corresponds to the portion of applications [10], [11], [12], [13], [14]. Web known as Deep Web. These contents are not accessible Two of the most popular darknets at present are The Onion by search engines because they are authentication protected Router (TOR; https://www.torproject.org/) and The Invisible contents or pages that are only reachable through the well Internet Project (I2P;https://geti2p.net/en/). This paper is fo- known as darknets. To browse through darknets websites special authorization or specific software and configurations are needed. cused on exploring and investigating the contents and structure Despite TOR is the most used darknet nowadays, there are of the websites in I2P, the so-called eepsites.
    [Show full text]
  • P2P-Hate-Report.Pdf
    I’m in a community called Scuttlebutt which uses Peer-to-Peer technology. This is a type of ​ ​ technology that works radically differently from the internet as we know it now and offers a powerful vision for a resilient and sustainable future for technology and social movements. One evening, a friend who is a developer on Scuttlebutt and also has marginalized identities like myself messaged me and a small group of others with great concern writing: “Ok - so we have nazis already using scuttlebutt. When the NZ shootings happened I had a dream that in the news it was announced that they had been using an enclave of scuttlebutt to organise and radicalise. It seems inevitable that this will happen…” It continued a long conversation about the risks created by these radical technologies. My friend was genuinely afraid. So was I. And I still am. Like so many others, he had put a ton of work into cultivating both the community and the technology. He was scared both that the product of so many people’s love would become a central aid in white-supremacist organizing and that the community wasn’t ready to deal with the fall out of such a “nightmarish vision.” In most Peer-to-Peer communities it is impossible to surveill them or know how many people are using them because they are secure and often private by design. The only way to even catch a glimpse of how many white supremacists are using them is when they post on leaked forums or public websites. Otherwise, unless their conversations are infiltrated, we can only see the tips of the iceberg of the violence (or good!) facilitated by these technologies.
    [Show full text]
  • ZERONET: an OVERVIEW M.Pavithra1, S.Vasanth2, R
    International Journal of Pure and Applied Mathematics Volume 119 No. 14 2018, 1347-1351 ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Special Issue ijpam.eu ZERONET: AN OVERVIEW M.Pavithra1, S.Vasanth2, R.Rajmohan3, D.Jayakumar4 1,2Departmentof CSE, PEC, Pondicherry, India 3,4Department of CSE, IFET, Villupuram, India ABSTRACT— Internet is the basic need in todays life. anywhere virtually but actually the data is nowhere. Sharing of data’s resources files among different group Python based software called zeronet can be used to of user is possible because of the emerging growth of achieve the virtuality. The network does not rely on internet. Once the internet is only for the group of centralized resources instead of that each user will people works within an organization i.e. it is a maintain their own data the authority of the data must standalone network may or may not connected to the depend on the individual user who rely on the network. network. Later everything moved towards a centralized It makes an user interface decentralized instead of network. Every user in the network will rely on the network. The zeronet is said to be an decentralized web central authority the authority must responsible to browser and it is an open source python based software manage maintain and update the user request. And most here the user can create their own site without much importantly the centralized network is established on effort and they will be able to maintain it. They will act the client server exemplary, if particular site can be as an owner for their own data every other user will able requested by an end user the request can be sent to the to access the data but no one will change the data.
    [Show full text]
  • NSIGHT SERIES May 2020 — Issue 5
    NSIGHT SERIES May 2020 — Issue 5 The Decline of the Dark Web How Mobile Solutions have Disrupted the Dark Web The dark web is in decline. Once the preferred means for anonymizing users’ online activity, the dark web has now been supplanted by encrypted mobile applications and alternate solutions. Similarly, aggressive law enforcement actions have shuttered many of the dark web’s largest forums, making it a much more fleeting and much less secure destination for criminal activity. As a result, the number of users accessing dark web sites has dropped. Instead, many users are connecting through the dark web via mobile applications on Android and iOS, rather than to the dark web via standard browsers, to obfuscate their internet traffic. Indeed, the number of users accessing the Tor network has increased, even as the number of users accessing hidden Dark web platforms such as The Onion Router (Tor), I2P, service sites—the “dark” part of the dark web—has dropped. Freenet, and Zeronet, attempt to anonymize users’ digital Moreover, encrypted applications like Telegram, Signal, fingerprint so that technical attributes like IP addresses are and Wickr.me have lowered the barrier to entry for secure not easily available to entities with intent to track users’ communication and illicit transactions. As a result, just like online activity. This emphasis on anonymity was designed to many other industries, the dark web has been disrupted keep the dark web free from oversight, free from censorship, by technological innovation and aggressive competition, and open to anyone in any location. The developers of Tor, triggering a gradual decline and turning the so-called the most popular dark web platform, promote it as a tool invisible internet even more opaque.
    [Show full text]