A dark net or darknet is an
overlay network
An overlay network is a computer network that is layered on top of another network.
Structure
Nodes in the overlay network can be thought of as being connected by virtual or logical links, each of which corresponds to a path, perhaps through ...
within the
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a ''internetworking, network of networks'' that consists ...
that can only be accessed with specific software, configurations, or authorization,
and often uses a unique customized
communication protocol
A communication protocol is a system of rules that allows two or more entities of a communications system to transmit information via any kind of variation of a physical quantity. The protocol defines the rules, syntax, semantics and synchroniza ...
. Two typical darknet types are social networks (usually used for
file hosting
A file-hosting service, cloud-storage service, online file-storage provider, or cyberlocker is an internet hosting service specifically designed to host user files. It allows users to upload files that could be accessed over the internet afte ...
with a
peer-to-peer
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer ...
connection), and
anonymity proxy networks such as
Tor via an anonymized series of connections.
The term "darknet" was popularized by major news outlets to associate with
Tor Onion services
Tor, TOR or ToR may refer to:
Places
* Tor, Pallars, a village in Spain
* Tor, former name of Sloviansk, Ukraine, a city
* Mount Tor, Tasmania, Australia, an extinct volcano
* Tor Bay, Devon, England
* Tor River, Western New Guinea, Indonesia
S ...
, when the infamous drug bazaar
Silk Road used it, despite the terminology being unofficial. Technology such as
Tor,
I2P
The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by usin ...
, and
Freenet
Freenet is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web ...
was intended to defend digital rights by providing security, anonymity, or censorship resistance and is used for both illegal and legitimate reasons. Anonymous communication between
whistle-blowers
A whistleblower (also written as whistle-blower or whistle blower) is a person, often an employee, who reveals information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe or fraudulent. Whi ...
, activists, journalists and news organisations is also facilitated by darknets through use of applications such as
SecureDrop
SecureDrop is a free software platform for secure communication between journalists and sources (whistleblowers). It was originally designed and developed by Aaron Swartz and Kevin Poulsen under the name ''DeadDrop''. James Dolan also co-creat ...
.
Terminology
The term originally described computers on
ARPANET
The Advanced Research Projects Agency Network (ARPANET) was the first wide-area packet-switched network with distributed control and one of the first networks to implement the TCP/IP protocol suite. Both technologies became the technical foun ...
that were hidden, programmed to receive messages but not respond to or acknowledge anything, thus remaining invisible, in the dark.
Since
ARPANET
The Advanced Research Projects Agency Network (ARPANET) was the first wide-area packet-switched network with distributed control and one of the first networks to implement the TCP/IP protocol suite. Both technologies became the technical foun ...
, the usage of dark net has expanded to include
friend-to-friend
A friend-to-friend (or F2F) computer network is a type of peer-to-peer network in which users only make direct connections with people they know. Passwords or digital signatures can be used for authentication.
Unlike other kinds of private P2P, ...
networks (usually used for
file sharing
File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include r ...
with a
peer-to-peer
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer ...
connection) and
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
networks such as Tor.
The reciprocal term for a darknet is a
clearnet or the
surface web when referring to content indexable by search engines.
The term "darknet" is often used
interchangeably with "
dark web
The dark web is the World Wide Web content that exists on '' darknets'': overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can commu ...
" because of the quantity of
hidden services
Tor, short for The Onion Router, is free and open-source software for enabling Anonymity, anonymous communication. It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting of more than seven thousand relay ...
on
Tor's darknet. Additionally, the term is often inaccurately used interchangeably with the
deep web
The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard web search-engine programs. This is in contrast to the " surface web", which is accessible to anyone using the Internet. Co ...
because of Tor's history as a platform that could not be search-indexed. Mixing uses of both these terms has been described as inaccurate, with some commentators recommending the terms be used in distinct fashions.
Origins
"Darknet" was coined in the 1970s to designate networks isolated from
ARPANET
The Advanced Research Projects Agency Network (ARPANET) was the first wide-area packet-switched network with distributed control and one of the first networks to implement the TCP/IP protocol suite. Both technologies became the technical foun ...
(the government-founded military/academical network which evolved into the
Internet
The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a ''internetworking, network of networks'' that consists ...
), for security purposes.
Darknet addresses could receive data from ARPANET but did not appear in the network lists and would not answer
pings or other inquiries.
The term gained public acceptance following publication of "The Darknet and the Future of
Content Distribution", a 2002 paper by
Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman, four employees of
Microsoft
Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
who argued the presence of the darknet was the primary hindrance to the development of workable
digital rights management
Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures (TPM) such as access control technologies can restrict the use of proprietary hardware and copyrighted work ...
(DRM) technologies and made
copyright infringement
Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, ...
inevitable. This paper described "darknet" more generally as any type of parallel network that is encrypted or requires a specific protocol to allow a user to connect to it.
Sub-cultures
Journalist
J. D. Lasica, in his 2005 book ''Darknet: Hollywood's War Against the Digital Generation'', described the darknet's reach encompassing file sharing networks. Subsequently, in 2014, journalist
Jamie Bartlett
James Bartlett (9 July 1966 – 23 May 2022) was a British-born South African actor best known for his role as the wicked puppet master, David Genaro, in '' Rhythm City'' and his theatre work.
Career Television
Bartlett was a well-known South ...
in his book ''The Dark Net'' used the term to describe a range of underground and emergent
subcultures, including
camgirl
A webcam model (colloquially, camgirl, camboy, or cammodel) is a video performer who streams on the Internet with a live webcam broadcast. A webcam model often performs erotic acts online, such as stripping, masturbation, or sex acts in exchan ...
s,
cryptoanarchists,
darknet drug markets,
self harm
Self-harm is intentional behavior that is considered harmful to oneself. This is most commonly regarded as direct injury of one's own skin tissues usually without a suicidal intention. Other terms such as cutting, self-injury and self-mutilati ...
communities,
social media
Social media are interactive media technologies that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks. While challenges to the definition of ''social me ...
racists, and
transhumanists.
Uses
Darknets in general may be used for various reasons, such as:
* To better protect the
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
rights of citizens from
targeted and
mass
Mass is an intrinsic property of a body. It was traditionally believed to be related to the quantity of matter in a physical body, until the discovery of the atom and particle physics. It was found that different atoms and different element ...
surveillance
*
Computer crime
A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing t ...
(cracking, file corruption, etc.)
* Protecting
dissident
A dissident is a person who actively challenges an established political or religious system, doctrine, belief, policy, or institution. In a religious context, the word has been used since the 18th century, and in the political sense since the 20th ...
s from political reprisal
*
File sharing
File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include r ...
(
warez
Warez is a common computing and broader cultural term referring to pirated software (i.e. illegally copied, often after deactivation of anti-piracy measures) that is distributed via the Internet. Warez is used most commonly as a noun, a plura ...
, personal files, pornography, confidential files, illegal or counterfeit software, etc.)
* Sale of restricted goods on
darknet market
A darknet market is a commercial website on the Dark Web, dark web that operates via darknets such as Tor (anonymity network), Tor or I2P. They function primarily as black markets, selling or brokering transactions involving Illegal drug trade, dru ...
s
*
Whistleblowing
A whistleblower (also written as whistle-blower or whistle blower) is a person, often an employee, who reveals information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe or fraudulent. Whi ...
and
news leak
A news leak is the unsanctioned release of confidential information to news media. It can also be the premature publication of information by a news outlet, of information that it has agreed not to release before a specified time, in violation of ...
s
* Purchase or sale of illicit or illegal goods or services
*
Circumventing network censorship and
content-filtering systems, or bypassing restrictive
firewall
Firewall may refer to:
* Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts
* Firewall (construction), a barrier inside a building, designed to limit the spre ...
policies
Software
All darknets require specific software installed or network configurations made to access them, such as
Tor, which can be accessed via a customized browser from
Vidalia (aka the Tor browser bundle), or alternatively via a
proxy
Proxy may refer to:
* Proxy or agent (law), a substitute authorized to act for another entity or a document which authorizes the agent so to act
* Proxy (climate), a measured variable used to infer the value of a variable of interest in climate re ...
configured to perform the same function.
Active
Tor is the most popular instance of a darknet, often mistakenly equated with darknet in general.

Alphabetical list:
*
anoNet
anoNet is a decentralized friend-to-friend network built using VPNs and software BGP routers. anoNet works by making it difficult to learn the identities of others on the network allowing them to anonymously host IPv4 and IPv6 Network service, ...
is a decentralized friend-to-friend network built using
VPN
A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
and software
BGP routers.
*
BitTorrent is a high performance semi-decentralized peer-to-peer communication
protocol
Protocol may refer to:
Sociology and politics
* Protocol (politics), a formal agreement between nation states
* Protocol (diplomacy), the etiquette of diplomacy and affairs of state
* Etiquette, a code of personal behavior
Science and technology
...
.
*
Decentralized network 42
dn42 is a decentralized peer-to-peer network built using VPNs and software/hardware BGP routers.
While other darknets try to establish anonymity for their participants, that is not what dn42 aims for. It is a network to explore routing technolo ...
(not for anonymity but research purposes).
*
Freenet
Freenet is a peer-to-peer platform for censorship-resistant, anonymous communication. It uses a decentralized distributed data store to keep and deliver information, and has a suite of free software for publishing and communicating on the Web ...
is a popular
DHT file hosting darknet platform. It supports
friend-to-friend
A friend-to-friend (or F2F) computer network is a type of peer-to-peer network in which users only make direct connections with people they know. Passwords or digital signatures can be used for authentication.
Unlike other kinds of private P2P, ...
and
opennet modes.
*
GNUnet can be utilized as a darknet if the "
F2F (network) topology" option is enabled.
*
I2P
The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by usin ...
(Invisible Internet Project) is an
overlay proxy network that features hidden services called "
Eepsite
The Invisible Internet Project (I2P) is an anonymous network layer (implemented as a mix network) that allows for censorship-resistant, peer-to-peer communication. Anonymous connections are achieved by encrypting the user's traffic (by using ...
s".
*
IPFS has a browser extension that may backup popular webpages.
*
RetroShare
Retroshare is a free and open-source peer-to-peer communication and file sharing app based on a friend-to-friend network built by GNU Privacy Guard (GPG). Optionally, peers may exchange certificates and IP addresses to their friends and vice ...
is a
friend-to-friend
A friend-to-friend (or F2F) computer network is a type of peer-to-peer network in which users only make direct connections with people they know. Passwords or digital signatures can be used for authentication.
Unlike other kinds of private P2P, ...
messenger communication and file transfer platform. It may be used as a darknet if
DHT and Discovery features are disabled.
*
Riffle
A riffle is a shallow landform in a flowing channel. Colloquially, it is a shallow place in a river where water flows quickly past rocks. However, in geology a riffle has specific characteristics.
Topographic, sedimentary and hydraulic indic ...
is a government, client-server darknet system that simultaneously provides secure anonymity (as long as at least one server remains uncompromised), efficient computation, and minimal bandwidth burden.
*
Secure Scuttlebutt is a peer-to peer communication protocol, mesh network, and self-hosted social media ecosystem
*
Syndie is
software
Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work.
...
used to publish
distributed Distribution may refer to:
Mathematics
*Distribution (mathematics), generalized functions used to formulate solutions of partial differential equations
*Probability distribution, the probability of a particular value or value range of a varia ...
forums over the anonymous networks of I2P, Tor and Freenet.
*
Tor (The onion router) is an
anonymity network that also features a darknet – via its
onion services
Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting of more than seven thousand relays, to conc ...
.
*
Tribler is an anonymous BitTorrent client with built in search engine, and non-
web
Web most often refers to:
* Spider web, a silken structure created by the animal
* World Wide Web or the Web, an Internet-based hypertext system
Web, WEB, or the Web may also refer to:
Computing
* WEB, a literate programming system created b ...
, worldwide publishing through channels.
*
Urbit is a federated system of personal servers in a peer-to-peer overlay network.
*
Zeronet
ZeroNet is a decentralized web-like network of peer-to-peer users, created by Tamas Kocsis in 2015, programming for the network was based in Budapest, Hungary; is built in Python; and is fully open source. Instead of having an IP address, ...
is a
DHT Web 2.0 hosting with
Tor users.
No longer supported
*
StealthNet (discontinued)
*
WASTE
Waste (or wastes) are unwanted or unusable materials. Waste is any substance discarded after primary use, or is worthless, defective and of no use. A by-product, by contrast is a joint product of relatively minor economic value. A waste pr ...
Defunct
*
AllPeers
*
Turtle F2F
See also
*
Crypto-anarchism
*
Cryptocurrency
A cryptocurrency, crypto-currency, or crypto is a digital currency designed to work as a medium of exchange through a computer network that is not reliant on any central authority, such as a government or bank, to uphold or maintain it. It ...
*
Darknet market
A darknet market is a commercial website on the Dark Web, dark web that operates via darknets such as Tor (anonymity network), Tor or I2P. They function primarily as black markets, selling or brokering transactions involving Illegal drug trade, dru ...
*
Dark web
The dark web is the World Wide Web content that exists on '' darknets'': overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can commu ...
*
Deep web
The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are not indexed by standard web search-engine programs. This is in contrast to the " surface web", which is accessible to anyone using the Internet. Co ...
*
Private peer-to-peer (P2P)
*
Sneakernet
Sneakernet, also called sneaker net, is an informal term for the transfer of electronic information by physically moving media such as magnetic tape, floppy disks, optical discs, USB flash drives or external hard drives between computers, rathe ...
*
Virtual private network (VPN)
References
{{DEFAULTSORT:Darknet (networking)
File sharing
Virtual private networks
Darknet markets
Cyberspace
Internet culture
Internet terminology
Dark web
Network architecture
Distributed computing architecture
1970s neologisms
*
Internet architecture