Everipedia Logo
Everipedia is now IQ.wiki - Join the IQ Brainlist and our Discord for early access to editing on the new platform and to participate in the beta testing.


Dark Net (or Darknet) is an umbrella term describing the portions of the Internet purposefully not open to public view or hidden networks whose architecture is superimposed on that of the Internet.[1] "Darknet" is often associated with the encrypted part of the Internet called Tor network where illicit trading takes place such as the infamous online drug bazaar called Silk Road.[2] It is also considered part of the deep web.[3] Anonymous communication between whistle-blowers, journalists and news organisations is facilitated by the "Darknet" Tor network through use of applications including SecureDrop.[4]


The term originally described computers on ARPANET that were hidden, programmed to receive messages but not respond to or acknowledge anything, thus remaining invisible, in the dark.An account detailed how the first online transaction related to drugs transpired in 1971 when students of the Massachusetts Institute of Technology and Stanford University traded marijuana using ARPANET accounts in the former's Artificial Intelligence Laboratory.[5]

The term has in later usage incorporated services such as the dark web, which is an overlay network that can be accessed only with specific software, configurations, or authorization, often using non-standard communication protocols and ports. Types of dark webs include friend-to-friend networks (usually used for file sharing with a peer-to-peer connection) and privacy networks such as Tor.[6][7] The reciprocal term for an encrypted darknet is clearnet or surface web when referring to content indexable by search engines.[8][9][10]

As of 2015, the term "darknet" is often used interchangeably with the "dark web" due to the quantity of hidden services on Tor's darknet. The term is often inaccurately used interchangeably with the deep web due to Tor's history as a platform that could not be search-indexed. Mixing uses of both these terms has been described as inaccurate, with some commentators recommending the terms be used in distinct fashions.[11][12][13]


"Darknet" was coined in the 1970s to designate networks isolated from ARPANET (the government-founded military/academical network which evolved into the Internet), for security purposes.[14] Darknet addresses could receive data from ARPANET but did not appear in the network lists and would not answer pings or other inquiries.

The term gained public acceptance following publication of "The Darknet and the Future of Content Distribution", a 2002 paper by Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman, four employees of Microsoft who argued the presence of the darknet was the primary hindrance to the development of workable digital rights management (DRM) technologies and made copyright infringement inevitable.[15] This paper described "darknet" more generally as any type of parallel network that is encrypted or requires a specific protocol to allow a user to connect to it.[1]


Journalist J. D. Lasica, in his 2005 book Darknet: Hollywood's War Against the Digital Generation, described the darknet's reach encompassing file sharing networks.[16] Subsequently, in 2014, journalist Jamie Bartlett in his book The Dark Net used the term to describe a range of underground and emergent subcultures, including camgirls, cryptoanarchists, darknet drug markets, self harm communities, social media racists, and transhumanists.[17]

Telegram because of its features with encryption and after the ban on the territory of different countries, also belongs to the darknet.[18] It is because of the anonymity that it contains encrypted channels for the sale of prohibited substances, recruiting various organizations and coordinating anti-government actions.[19]


Darknets in general may be used for various reasons, such as:

  • Computer crime (cracking, file corruption, etc.)

  • Protecting dissidents from political reprisal

  • File sharing (warez, personal files, pornography, confidential files, illegal or counterfeit software, etc.)

  • To better protect the privacy rights of citizens from targeted and mass surveillance

  • Sale of restricted goods on darknet markets

  • Whistleblowing and news leaks

  • Purchase or sale of illicit or illegal goods or services[20]

  • Circumventing network censorship and content-filtering systems, or bypassing restrictive firewall policies[21]


All darknets require specific software installed or network configurations made to access them, such as Tor, which can be accessed via a customised browser from Vidalia (aka the Tor browser bundle), or alternatively via a proxy configured to perform the same function.


  • anoNet is a decentralized friend-to-friend network built using VPNs and software BGP routers.

  • Decentralized network 42 (not for anonymity but research purposes).

  • Freenet is a popular darknet (friend-to-friend) by default; since version 0.7 it can run as an "opennet" (peer nodes are discovered automatically).

  • GNUnet can be utilised as a darknet[22] if the "F2F (network) topology" option is enabled.[23]

  • I2P (Invisible Internet Project) is another overlay network that features a darknet whose sites are called "Eepsites".

  • OneSwarm can be run as a darknet for friend-to-friend file-sharing.

  • RetroShare can be run as a darknet (friend-to-friend) by default to perform anonymous file transfers if DHT and Discovery features are disabled.

  • Riffle is a client-server darknet system that simultaneously provides secure anonymity (as long as at least one server remains uncompromised), efficient computation, and minimal bandwidth burden.[24][25]

  • Syndie is software used to publish distributed forums over the anonymous networks of I2P, Tor and Freenet.

  • Tor (The onion router) is an anonymity network that also features a darknet – its "hidden services". It is the most popular instance of a darknet.[26]

  • Tribler can be run as a darknet for file-sharing.

  • Zeronet is open source software aimed to build an internet-like computer network of peer-to-peer users of Tor.

No longer supported

  • RShare (discontinued)

  • StealthNet (discontinued)



  • AllPeers

  • Turtle F2F

See also

  • Crypto-anarchism

  • Cryptocurrency

  • Dark web

  • Deep web

  • Deepnet

  • Private peer-to-peer (P2P)

  • Sneakernet

  • Virtual private network (VPN)


Citation Linkopenlibrary.orgGayard, Laurent (2018). Darknet: Geopolitics and Uses. Hoboken, NJ: John Wiley & Sons. p. 158. ISBN 9781786302021.
Sep 30, 2019, 1:03 AM
Citation Linkopenlibrary.orgMartin, James (2014). Drugs on the Dark Net: How Cryptomarkets are Transforming the Global Trade in Illicit Drugs. New York: Palgrave Macmillan. p. 2. ISBN 9781349485666.
Sep 30, 2019, 1:03 AM
Citation Linkbooks.google.com.phSenker, Cath (2016-09-12). Cybercrime & the Dark Net: Revealing the hidden underworld of the internet. London: Arcturus Publishing. ISBN 9781784285555.
Sep 30, 2019, 1:03 AM
Citation Linkgithub.comPress Foundation, Freedom of the. "SecureDrop". github. Freedom of the Press Foundation. Retrieved 28 January 2019.
Sep 30, 2019, 1:03 AM
Citation Linkopenlibrary.orgBrown Sr., Michael; Hersey, Leigh (2018). Returning to Interpersonal Dialogue and Understanding Human Communication in the Digital Age. Hershey, PA: IGI Global. p. 6. ISBN 9781522541684.
Sep 30, 2019, 1:03 AM
Citation Linkjolt.richmond.eduWood, Jessica (2010). "The Darknet: A Digital Copyright Revolution" (PDF). Richmond Journal of Law and Technology. 16 (4): 15–17. Retrieved 25 October 2011.
Sep 30, 2019, 1:03 AM
Citation Link//doi.org/10.1016%2FS1361-3723%2809%2970150-2Mansfield-Devine, Steve (December 2009). "Darknets". Computer Fraud & Security. 2009 (12): 4–6. doi:10.1016/S1361-3723(09)70150-2.
Sep 30, 2019, 1:03 AM
Citation Linklifehacker.comMiller, Tessa (10 January 2014). "How Can I Stay Anonymous with Tor?". Life Hacker. Retrieved 7 June 2015.
Sep 30, 2019, 1:03 AM
Citation Linkwww.deepdotweb.comRoger, Jolly. "Clearnet vs Hidden Services – Why You Should Be Careful". Jolly Roger’s Security Guide for Beginners. DeepDotWeb. Archived from the original on 28 June 2015. Retrieved 4 June 2015.
Sep 30, 2019, 1:03 AM
Citation Linkmonicabarratt.netBarratt, Monica (15 January 2015). "A Discussion About Dark Net Terminology". Drugs, Internet, Society. Retrieved 14 June 2015.
Sep 30, 2019, 1:03 AM
Citation Linkwww.brightplanet.com"Clearing Up Confusion – Deep Web vs. Dark Web". BrightPlanet.
Sep 30, 2019, 1:03 AM
Citation Linkwww.npr.orgNPR Staff (25 May 2014). "Going Dark: The Internet Behind The Internet". Retrieved 29 May 2015.
Sep 30, 2019, 1:03 AM
Citation Linkwww.wired.comGreenberg, Andy (19 November 2014). "Hacker Lexicon: What Is the Dark Web?". Retrieved 6 June 2015.
Sep 30, 2019, 1:03 AM
Citation Linkchainhead.io"Om Darknet". Retrieved 15 January 2018.
Sep 30, 2019, 1:03 AM
Citation Linkmsl1.mit.eduBiddle, Peter; England, Paul; Peinado, Marcus; Willman, Bryan (18 November 2002). The Darknet and the Future of Content Distribution (PDF). ACM Workshop on Digital Rights Management. Washington, D.C.: Microsoft Corporation. Retrieved 10 October 2012.
Sep 30, 2019, 1:03 AM
Citation Linkarchive.orgLasica, J. D. (2005). Darknets: Hollywood's War Against the Digital Generation. Hoboken, NJ: J. Wiley & Sons. ISBN 0-471-68334-5.
Sep 30, 2019, 1:03 AM
Citation Linkwww.independent.co.ukIan, Burrell (28 August 2014). "The Dark Net: Inside the Digital Underworld by Jamie Bartlett, book review". Retrieved 3 June 2015.
Sep 30, 2019, 1:03 AM
Citation Linkwww.youtube.comnetstalkers (2017-09-07). "ДАРКНЕТ ПЕРЕЕХАЛ В ТЕЛЕГРАМ [netstalkers]". Retrieved 2018-10-29.
Sep 30, 2019, 1:03 AM
Citation Linkwww.vesti.ru"Опасный Telegram: закрытость мессенждера на руку террористам и наркоторговцам". Retrieved 2018-10-29.
Sep 30, 2019, 1:03 AM
Citation Linkwww.cnbc.comTaylor, Harriet (19 May 2016). "Hit men, drugs and malicious teens: the darknet is going mainstream".
Sep 30, 2019, 1:03 AM