References
MODULE 1 — Foundations: What the Web Actually Is
1.2 — Historical Evolution of Hidden Networks
Foundational Cryptography
Diffie, W., Hellman, M. (1976).
New Directions in Cryptography.
IEEE Transactions on Information Theory.
https://doi.org/10.1109/TIT.1976.1055638Rivest, R., Shamir, A., Adleman, L. (1978).
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.
Communications of the ACM.
https://doi.org/10.1145/359340.359342
Mix Networks & Anonymous Communication
Chaum, D. (1981).
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
Communications of the ACM.
https://doi.org/10.1145/358549.358563Chaum, D. (1988).
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability.
Journal of Cryptology.
https://doi.org/10.1007/BF02323528
Early Anonymous Remailers
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdfMixmaster & Mixminion Documentation (Cypherpunks).
Archived technical specifications:
https://mixminion.net
https://www.chaum.com
Onion Routing & Tor Development
Goldschlag, D. M., Reed, M. G., Syverson, P. F. (1999).
Onion Routing for Anonymous and Private Internet Connections.
Communications of the ACM (Extended abstract available via NRL).
https://www.onion-router.net/Publications.htmlTor Project Official Design Documents.
https://spec.torproject.org
https://community.torproject.org
Alternative Darknet Architectures
Freenet Project Paper
Clarke, I., Sandberg, O., Wiley, B., Hong, T. (2000).
Freenet: A Distributed Anonymous Information Storage and Retrieval System.
ICSI Berkeley.
https://freenetproject.org/papers/freenet.pdfI2P — Invisible Internet Project Documentation.
https://geti2p.net/en/docsGNUnet Technical Documentation.
https://gnunet.org/en/philosophy.html
https://gnunet.org/en/architecture.htmlYggdrasil Network Whitepaper.
https://yggdrasil-network.github.io/whitepaper.pdfNym Mixnet Academic Whitepaper.
Khovratovich, D., et al.
Nym Mixnet Overview.
https://nymtech.net/docs/whitepaper
Dark Web Mainstreamization (2010s)
Christin, N. (2013).
Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
WWW Conference.
https://doi.org/10.1145/2488388.2488408Moore, D., Rid, T. (2016).
Cryptopolitik and the Darknet.
Survival Journal (International Institute for Strategic Studies).
https://doi.org/10.1080/00396338.2016.1142085
Tor Hidden Service Upgrade (v3)
Tor v3 Onion Services Specification.
Next-Generation Hidden Services.
https://spec.torproject.org/hiddensvc.htmlTor Proposal 224 — Hidden Service Protocol Improvements.
https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt
1.3 Misconceptions & Media Myths: A Scientific Deconstruction
Moore, D., Rid, T. (2016).
Cryptopolitik and the Darknet.
Survival Journal.
https://doi.org/10.1080/00396338.2016.1142085Christin, N. (2013).
Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
WWW Conference.
https://doi.org/10.1145/2488388.2488408Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdfThe Tor Project — Myths and FAQs.
https://support.torproject.orgElectronic Frontier Foundation (EFF) — Surveillance & Anonymity Resources.
https://www.eff.orgI2P Documentation — Project Overview.
https://geti2p.net/en/docsFreenet Whitepaper — Clarke et al. (2000).
https://freenetproject.org/papers/freenet.pdf
1.4 Why Humans Built Hidden Networks: A Sociotechnical Perspective
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdfChaum, D. (1981).
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
Communications of the ACM.
https://doi.org/10.1145/358549.358563Hughes, E. (1993).
A Cypherpunk’s Manifesto.
Published on Cypherpunk mailing list archives.Moore, D., Rid, T. (2016).
Cryptopolitik and the Darknet.
International Institute for Strategic Studies.
https://doi.org/10.1080/00396338.2016.1142085Electronic Frontier Foundation.
Why Privacy Matters.
https://www.eff.orgUnited Nations Human Rights Council. (2015).
Report on the Right to Privacy in the Digital Age.Tor Project — Mission and Overview.
https://www.torproject.org/about
1.5 Deep Web vs Dark Web vs Darknets: Taxonomy and Terminology
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdfMoore, D., Clayton, R., Anderson, R. (2009).
The Anatomy of the Deep Web.
Cambridge University Computer Laboratory (Technical Discussion — widely cited).Moore, D., Rid, T. (2016).
Cryptopolitik and the Darknet.
International Institute for Strategic Studies.
https://doi.org/10.1080/00396338.2016.1142085I2P Project Documentation.
https://geti2p.net/en/docsFreenet Whitepaper — Clarke et al. (2000).
Freenet: A Distributed Anonymous Information Storage and Retrieval System.
https://freenetproject.org/papers/freenet.pdfGNUnet Architecture Overview.
https://gnunet.org/en/architecture.htmlYggdrasil Network Whitepaper.
https://yggdrasil-network.github.io/whitepaper.pdfNym Mixnet Whitepaper.
https://nymtech.net/docs/whitepaper
1.6 The Philosophy of Anonymity: Privacy as a Technological Construct
Hughes, E. (1993).
A Cypherpunk’s Manifesto.
Archived mailing list document.Chaum, D. (1981).
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
Communications of the ACM.
https://doi.org/10.1145/358549.358563Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdfUnited Nations Human Rights Council (2015).
The Right to Privacy in the Digital Age.Electronic Frontier Foundation — Privacy and Surveillance Resources.
https://www.eff.orgSolove, D. (2007).
“I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy.
San Diego Law Review.Nissenbaum, H. (2004).
Privacy as Contextual Integrity.
Washington Law Review.Zimmer, M. (2010).
“Web Search Studies and the Problem of Privacy.”
Library Trends Journal.
1.7 A Comparative Anatomy of Hidden Networks (F2F, I2P, Tor, Yggdrasil, Nym, Lokinet)
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdfI2P Project Documentation
https://geti2p.net/en/docsClarke, I., Sandberg, O., Wiley, B., Hong, T. (2000).
Freenet: A Distributed Anonymous Information Storage and Retrieval System.
https://freenetproject.org/papers/freenet.pdfYggdrasil Network Whitepaper
https://yggdrasil-network.github.io/whitepaper.pdfNym Mixnet Whitepaper
https://nymtech.net/docs/whitepaperChaum, D. (1981).
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
Communications of the ACM.
https://doi.org/10.1145/358549.358563Lokinet (Oxen) Technical Overview
https://lokinet.org/docs
MODULE 2 — Network Architectures of Hidden Ecosystems
2.1 Tor’s Onion Routing — Architectural Deep Dive
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdfGoldschlag, D., Reed, M., Syverson, P. (1999).
Onion Routing for Anonymous and Private Internet Connections.
Naval Research Laboratory.
https://www.onion-router.net/Publications.htmlMurdoch, S. J., & Zieliński, P. (2007).
Sampled Traffic Analysis Against Tor.
IEEE Symposium on Security and Privacy.Tor Project Specifications.
https://spec.torproject.orgBiryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization.
IEEE Symposium on Security and Privacy.Johnson, A., Wacek, C., Jansen, R., Sherr, M., Syverson, P. (2013).
Users Get Routed: Traffic Correlation on Tor.
ACM Conference on Computer and Communications Security.
2.2 Hidden Services Infrastructure: v2→v3 Transition, Cryptographic Upgrade
Tor Project — Next-Generation Onion Services Specification (v3).
https://spec.torproject.org/rend-spec-v3Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdfBiryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization.
IEEE Security & Privacy.Tor Proposal 224 — “Next-Generation Hidden Services.”
https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txtKadianakis, G., Jansen, R. (Tor Project).
Next-Generation Hidden Services in Tor.
Official Tor documentation and slides.Appelbaum, J., et al. (2012).
Design of Hidden Services.
Tor Project Technical Report.Johnson et al., (2013).
Users Get Routed: Traffic Correlation on Tor.
ACM CCS Conference.
2.3 Alternative Darknets:
I2P Tunnels
Freenet Data Store Mechanics
GNUnet’s Peer Group Cryptography
Yggdrasil’s DHT-Routed IPv6 Mesh
Nym Mixnet Layered Privacy
I2P
I2P Project Documentation
https://geti2p.net/en/docs
Zantout, B., & Haraty, R. (2011).
I2P Data Communication System.
ICICS Conference.
Freenet
Clarke, I., Sandberg, O., Wiley, B., & Hong, T. (2000).
Freenet: A Distributed Anonymous Information Storage and Retrieval System.
https://freenetproject.org/papers/freenet.pdf
GNUnet
GNUnet Documentation — Architecture
https://gnunet.org/en/architecture.html
Grothoff, C. (2017).
The GNU Name System.
PETS (Privacy Enhancing Technologies Symposium).
https://doi.org/10.1515/popets-2017-0056
Yggdrasil
Yggdrasil Network Whitepaper
https://yggdrasil-network.github.io/whitepaper.pdf
Nym
Kwon, A., Lazar, D., Devadas, S., Ford, B. (2017).
The Loopix Anonymity System.
USENIX Security.
Nym Project Whitepaper
https://nymtech.net/docs/whitepaper
2.4 Comparative Latency Studies Across Darknets
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.Johnson, A., et al. (2013).
Users Get Routed: Traffic Correlation on Tor.
ACM CCS.Zantout, B., & Haraty, R. (2011).
I2P Data Communication System.
ICICS Conference.Clarke, I., Sandberg, O., Wiley, B., Hong, T. (2000).
Freenet: A Distributed Anonymous Information Storage and Retrieval System.
Freenet Whitepaper.Grothoff, C. (2017).
The GNU Name System.
PETS.Yggdrasil Network Whitepaper
https://yggdrasil-network.github.io/whitepaper.pdfKwon, A., Lazar, D., Devadas, S., Ford, B. (2017).
The Loopix Anonymity System.
USENIX Security.Nym Project Whitepaper
https://nymtech.net/docs/whitepaper
2.5 How Exit Relays Actually Work
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdfMcCoy, D., Bauer, K., Grunwald, D., Kohno, T., & Sicker, D. (2008).
Shining Light in Dark Places: Understanding the Tor Network.
Privacy Enhancing Technologies Symposium (PETS).
https://doi.org/10.1007/978-3-540-70630-4_5Winter, P., & Lindskog, S. (2012).
How To Catch A Tor User: Traffic Correlation on Tor by Real-World Adversaries.
HotPETs Paper.Tor Project Documentation — Exit Policies & Guidelines.
https://community.torproject.org/relay/operators/exit/Jansen, R., et al. (2014).
The Sniper Attack: Anonymously Deanonymizing Tor Users.
USENIX Security.Tor Metrics & Consensus Data.
https://metrics.torproject.org
2.6 Pluggable Transports: Obfuscation War Between Censorship & Anonymity
Tor Project — Pluggable Transport Specification (v2).
https://spec.torproject.org/pt-specWilde, E., Winter, P., Lindskog, S. (2018).
How to Build a Censorship Circumvention Tool.
USENIX FOCI Workshop.Fifield, D., Lan, C., Hynes, N., Wegmann, P., Paxson, V. (2015).
Blocking-Resistant Communication Through Domain Fronting.
ACM CCS.
https://doi.org/10.1145/2810103.2813682Houmansadr, A., Brubaker, C., Shmatikov, V. (2013).
The Parrot Is Dead: Observations on the Imitation Resistance of Traffic Mimicry.
IEEE Symposium on Security & Privacy.Wang, L., Dyer, K. P., Aksoy, S., et al. (2015).
Seeing Through Network-Protocol Obfuscation.
USENIX Security.Snowflake Technical Overview (Tor Project).
https://snowflake.torproject.orgFTE (Format-Transforming Encryption) Specification.
https://fteproxy.org
2.7 Ecosystem Fragility: Why Darknets Collapse and Rebuild
Fifield, D., et al. (2015).
Blocking-Resistant Communication Through Domain Fronting.
ACM CCS.
https://doi.org/10.1145/2810103.2813682Wilde, E., Winter, P., Lindskog, S. (2018).
How to Build a Censorship Circumvention Tool.
USENIX FOCI.Khattak, S., et al. (2013).
Do You See What I See? Differential Treatment of Anonymous Users.
NDSS Symposium.Tor Project: Snowflake Overview.
https://snowflake.torproject.orgTor Project: Pluggable Transport Specs.
https://spec.torproject.org/pt-specWinter, P., & Lindskog, S. (2012).
Great Firewall of China: Blocking and Evolving Strategies.
FOCI Workshop.Aryan, S., Aryan, H., & Halderman, J.A. (2013).
Internet Censorship in Iran: A First Look.
USENIX FOCI.Ramesh, R., et al. (2020).
Examining Russia’s DPI Deployment.
IMC (Internet Measurement Conference).
MODULE 3 — Cryptography Behind Hidden Services
3.1 Public Key Cryptography in Onion Ecosystems
Diffie, W., Hellman, M. (1976).
New Directions in Cryptography.
IEEE Transactions on Information Theory.
https://doi.org/10.1109/TIT.1976.1055638Rivest, R., Shamir, A., Adleman, L. (1978).
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.
Communications of the ACM.
https://doi.org/10.1145/359340.359342Chaum, D. (1981).
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
Communications of the ACM.
https://doi.org/10.1145/358549.358563Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdfTor Project — Cryptographic Protocol Specifications.
https://spec.torproject.orgBernstein, D. J., et al. (2012).
High-Speed High-Security Signatures (Ed25519).
https://ed25519.cr.yp.toKahn Academy / Stanford CS — Public Key Cryptography Lectures
(Used widely for foundational explanations)
3.2 HSDir (Hidden Service Directory) Cryptographic Workflows
Tor Project — Onion Service v3 Specification (HSDir).
https://spec.torproject.org/rend-spec-v3Tor Proposal 224.
Next-Generation Hidden Services.
https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txtBiryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
Trawling for Tor Hidden Services.
IEEE Symposium on Security and Privacy.Kadianakis, G., Johnson, A., et al. (2017).
Onion Services: Design and Improvements.
Tor Project Technical Report.Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.Johnson, A., et al. (2013).
Users Get Routed: Traffic Correlation on Tor.
ACM CCS.
3.3 Why v3 Onion Services Were Necessary
Biryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
Trawling for Tor Hidden Services.
IEEE Symposium on Security and Privacy.Tor Proposal 224.
Next-Generation Hidden Services.
https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txtTor Project — Onion Service v3 Specification.
https://spec.torproject.org/rend-spec-v3Kadianakis, G., Johnson, A., et al. (2017).
Onion Services: Design and Improvements.
Tor Project Technical Report.Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.Bernstein, D. J., et al. (2012).
High-Speed High-Security Signatures (Ed25519).
https://ed25519.cr.yp.toNIST Cryptographic Standards Transition Reports
(RSA-1024 & SHA-1 deprecation guidance)
3.4 Post-Quantum Threats to Darknets
Shor, P. (1994).
Algorithms for Quantum Computation: Discrete Logarithms and Factoring.
IEEE FOCS.Grover, L. (1996).
A Fast Quantum Mechanical Algorithm for Database Search.
STOC.NIST Post-Quantum Cryptography Project.
https://csrc.nist.gov/projects/post-quantum-cryptographyMosca, M. (2018).
Cybersecurity in an Era with Quantum Computers.
Communications of the ACM.Tor Project — Cryptographic Specifications & Proposals.
https://spec.torproject.orgBernstein, D. J., et al.
Introduction to Post-Quantum Cryptography.
Springer.
3.5 Decentralized PKI for Anonymous Services3.6 Zero-Knowledge Proof Concepts Relevant to Darknets
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.Tor Project — Onion Service v3 Specification.
https://spec.torproject.org/rend-spec-v3Goldberg, I. (2015).
Improving the Privacy and Security of Tor Hidden Services.
PETS Symposium.Chaum, D. (1981).
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
Communications of the ACM.Kahn Academy / Stanford CS.
Public Key Infrastructure Concepts.Anderson, R. (2008).
Security Engineering.
Wiley.
3.6 Zero-Knowledge Proof Concepts Relevant to Darknets
Goldwasser, S., Micali, S., Rackoff, C. (1985).
The Knowledge Complexity of Interactive Proof Systems.
SIAM Journal on Computing.Chaum, D., Evertse, J., van de Graaf, J. (1988).
An Improved Protocol for Demonstrating Possession of Discrete Logarithms.
CRYPTO.Camenisch, J., Lysyanskaya, A. (2001).
An Efficient System for Non-transferable Anonymous Credentials.
EUROCRYPT.Kahn Academy / MIT OpenCourseWare.
Zero-Knowledge Proof Lectures.Tor Project — Cryptographic Protocol Overview.
https://spec.torproject.orgBoneh, D., Shoup, V. (2020).
A Graduate Course in Applied Cryptography.
3.7 Metadata Minimization Engineering
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.Murdoch, S. J., Zieliński, P. (2007).
Sampled Traffic Analysis Against Tor.
IEEE Security & Privacy.Johnson, A., et al. (2013).
Users Get Routed: Traffic Correlation on Tor.
ACM CCS.Goldberg, I. (2015).
Improving the Privacy and Security of Tor Hidden Services.
PETS Symposium.Tor Project — Threat Models & Design Docs.
https://spec.torproject.orgPfitzmann, A., Hansen, M. (2010).
A Terminology for Talking About Privacy by Data Minimization.RFC 6973 — Privacy Considerations for Internet Protocols.
MODULE 4 — Cybersecurity Failures in Hidden Networks
4.1 How Hidden Services De-Anonymize Themselves
Biryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
Trawling for Tor Hidden Services.
IEEE Symposium on Security and Privacy.Murdoch, S. J., Zieliński, P. (2007).
Sampled Traffic Analysis Against Tor.
IEEE Security & Privacy.Goldberg, I. (2015).
Improving the Privacy and Security of Tor Hidden Services.
PETS Symposium.Anderson, R. (2008).
Security Engineering.
Wiley.Tor Project — Onion Services Documentation.
https://spec.torproject.orgNarayanan, A., et al. (2012).
On the Feasibility of Internet-Scale Author Identification.
IEEE Symposium on Security and Privacy.
4.2 Browser-Level Identity Leaks: Fingerprinting Anatomy
Eckersley, P. (2010).
How Unique Is Your Web Browser?
Electronic Frontier Foundation.Panopticlick Project (EFF).
https://panopticlick.eff.orgNarayanan, A., et al. (2012).
On the Feasibility of Internet-Scale Author Identification.
IEEE Symposium on Security and Privacy.Mowery, K., et al. (2012).
Fingerprinting Information in JavaScript Implementations.
W2SP Workshop.Tor Project — Tor Browser Design Documentation.
https://support.torproject.orgBoda, K., et al. (2011).
User Tracking on the Web via Cross-Browser Fingerprinting.
WWW Conference.
4.3 Deanonymization Attacks Observed in Research Papers
Murdoch, S. J., Zieliński, P. (2007).
Sampled Traffic Analysis Against Tor.
IEEE Security & Privacy.Johnson, A., et al. (2013).
Users Get Routed: Traffic Correlation on Tor.
ACM CCS.Biryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
Trawling for Tor Hidden Services.
IEEE S&P.Wang, T., et al. (2014).
Effective Attacks and Provable Defenses for Website Fingerprinting.
USENIX Security.Panchenko, A., et al. (2016).
Website Fingerprinting at Internet Scale.
NDSS.Eckersley, P. (2010).
How Unique Is Your Web Browser?
EFF.Edman, M., Syverson, P. (2009).
As-Awareness in Tor Path Selection.
ACM CCS.
4.4 Traffic-Correlation Attacks & Global Adversaries
Murdoch, S. J., Zieliński, P. (2007).
Sampled Traffic Analysis Against Tor.
IEEE Security & Privacy.Johnson, A., et al. (2013).
Users Get Routed: Traffic Correlation on Tor.
ACM CCS.Feamster, N., Dingledine, R. (2004).
Location Diversity in Anonymity Networks.
WPES.Edman, M., Syverson, P. (2009).
As-Awareness in Tor Path Selection.
ACM CCS.Kwon, A., et al. (2017).
The Loopix Anonymity System.
USENIX Security.Tor Project — Threat Model Documentation.
https://spec.torproject.org
4.5 Cryptocurrency Mistakes That Lead to Identity Exposure
Meiklejohn, S., et al. (2013).
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names.
USENIX Security Symposium.Androulaki, E., et al. (2013).
Evaluating User Privacy in Bitcoin.
FC (Financial Cryptography).Reid, F., Harrigan, M. (2013).
An Analysis of Anonymity in the Bitcoin System.
Security and Privacy in Social Networks.Kappos, G., et al. (2018).
An Empirical Analysis of Anonymity in Zcash.
USENIX Security.Biryukov, A., Khovratovich, D. (2017).
Deanonymization of Clients in Bitcoin P2P Network.
ACM CCS.Moser, M., Böhme, R., Breuker, D. (2014).
An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem.
eCrime Symposium.
4.6 Tor Over VPN vs VPN Over Tor — Mythology & Reality
Tor Project — FAQ: Tips on Staying Anonymous.
https://support.torproject.orgDingledine, R., et al. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security.Murdoch, S. J., Zieliński, P. (2007).
Sampled Traffic Analysis Against Tor.
IEEE Security & Privacy.Johnson, A., et al. (2013).
Users Get Routed: Traffic Correlation on Tor.
ACM CCS.Tor Project Blog & Threat Model Discussions.
Anderson, R. (2008).
Security Engineering.
Wiley.
4.7 Side-Channel Leaks in Onion Architectures
Murdoch, S. J. (2006).
Hot or Not: Revealing Hidden Services by Their Clock Skew.
IEEE Symposium on Security and Privacy.Murdoch, S. J., Danezis, G. (2005).
Low-Cost Traffic Analysis of Tor.
IEEE Security & Privacy.Backes, M., et al. (2012).
Statistical Disclosure Attacks against Tor.
ESORICS.Bauer, K., et al. (2007).
Low-Resource Routing Attacks Against Tor.
WPES.Goldberg, I. (2015).
Improving the Privacy and Security of Tor Hidden Services.
PETS.Tor Project — Design & Threat Model Documentation.
https://spec.torproject.orgAnderson, R. (2008).
Security Engineering.
Wiley.
MODULE 5 — Threat Intelligence: Mapping Darknet Ecosystems
5.1 How Security Firms Profile Darknet Activity
Décary-Hétu, D., Giommoni, L. (2017).
Do Police Crackdowns Disrupt Drug Cryptomarkets?
International Journal of Drug Policy.Christin, N. (2013).
Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
WWW Conference.Ablon, L., Libicki, M., Golay, A. (2014).
Markets for Cybercrime Tools and Stolen Data.
RAND Corporation.Holt, T. J., Smirnova, O., Chua, Y. T. (2016).
Examining the Structure, Organization, and Processes of Cybercrime Markets.
Deviant Behavior.Europol (IOCTA Reports).
Internet Organised Crime Threat Assessment.Krebs, B. (Investigative reporting on darknet markets).
5.2 OSINT Techniques Adapted for Anonymous Networks
Christin, N. (2013).
Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
WWW Conference.Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy.Holt, T. J. (2013).
Exploring the Social Organisation and Structure of Dark Web Forums.
Global Crime.Ablon, L., Libicki, M., Golay, A. (2014).
Markets for Cybercrime Tools and Stolen Data.
RAND Corporation.Europol IOCTA Reports.
OSINT Framework (methodological reference).
5.3 Linguistic Profiling in Anonymous Forums
Narayanan, A., et al. (2012).
On the Feasibility of Internet-Scale Author Identification.
IEEE Symposium on Security and Privacy.Juola, P. (2006).
Authorship Attribution.
Foundations and Trends in Information Retrieval.Holt, T. J. (2013).
Exploring the Social Organisation and Structure of Dark Web Forums.
Global Crime.Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy.Grant, T., Baker, K. (2001).
Identifying Reliable, Valid Markers of Authorship.
Forensic Linguistics.Europol IOCTA Reports (linguistic and behavioral analysis sections).
5.4 Temporal Activity Analysis: Time-Zone Fingerprinting
Christin, N. (2013).
Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
WWW Conference.Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy.Holt, T. J. (2013).
Exploring the Social Organisation and Structure of Dark Web Forums.
Global Crime.Ablon, L., Libicki, M., Golay, A. (2014).
Markets for Cybercrime Tools and Stolen Data.
RAND Corporation.Europol IOCTA Reports (temporal and behavioral analysis sections).
Anderson, R. (2008).
Security Engineering.
Wiley.
5.5 Cluster Mapping Hidden Service Families
Christin, N. (2013).
Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
WWW Conference.Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy.Ablon, L., Libicki, M., Golay, A. (2014).
Markets for Cybercrime Tools and Stolen Data.
RAND Corporation.Holt, T. J., Smirnova, O. (2016).
Examining the Structure of Cybercrime Markets.
Deviant Behavior.Europol IOCTA Reports (marketplace lineage and clustering sections).
Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science.
5.6 Darknet Scam Ecology: Identifying Pattern Families
Décary-Hétu, D., Giommoni, L. (2017).
Do Police Crackdowns Disrupt Drug Cryptomarkets?
International Journal of Drug Policy.Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science.Christin, N. (2013).
Traveling the Silk Road.
WWW Conference.Ablon, L., Libicki, M., Golay, A. (2014).
Markets for Cybercrime Tools and Stolen Data.
RAND Corporation.Holt, T. J., Smirnova, O. (2016).
Examining the Structure of Cybercrime Markets.
Deviant Behavior.Europol IOCTA Reports (scam typologies and marketplace fraud).
5.7 Life Cycle of Darknet Communities (Anthropological Overview)
Christin, N. (2013).
Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
WWW Conference.Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science.Décary-Hétu, D., Giommoni, L. (2017).
Do Police Crackdowns Disrupt Drug Cryptomarkets?
International Journal of Drug Policy.Holt, T. J. (2013).
Exploring the Social Organisation and Structure of Dark Web Forums.
Global Crime.Ablon, L., Libicki, M., Golay, A. (2014).
Markets for Cybercrime Tools and Stolen Data.
RAND Corporation.Anderson, R. (2008).
Security Engineering.
Wiley.Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso.
MODULE 6 — Governance, Law & Geopolitics
6.1 The Global Jurisdiction Puzzle of Darknets
Brenner, S. (2011).
Cybercrime: Criminal Threats from Cyberspace.
Praeger.Goldsmith, J., Wu, T. (2006).
Who Controls the Internet?
Oxford University Press.Council of Europe.
Budapest Convention on Cybercrime.UNODC.
Comprehensive Study on Cybercrime.Lessig, L. (2006).
Code and Other Laws of Cyberspace.
Basic Books.Tor Project — Legal FAQ and Policy Documents.
6.2 International Law Enforcement Collaboration Mechanisms
Council of Europe (2001).
Convention on Cybercrime (Budapest Convention).UNODC.
Comprehensive Study on Cybercrime.Brenner, S. (2011).
Cybercrime: Criminal Threats from Cyberspace.
Praeger.Europol — IOCTA Reports and JIT Documentation.
INTERPOL — Cybercrime Cooperation Frameworks.
Goldsmith, J., Wu, T. (2006).
Who Controls the Internet?
Oxford University Press.
6.3 Nation-State Response Models (China, Russia, US, EU)
Goldsmith, J., Wu, T. (2006).
Who Controls the Internet?
Oxford University Press.Deibert, R. (2015).
Black Code: Surveillance, Privacy, and the Dark Side of the Internet.
Signal / McClelland & Stewart.UNODC.
Comprehensive Study on Cybercrime.Council of Europe.
Budapest Convention & Policy Commentary.European Union Charter of Fundamental Rights.
Chinese Cybersecurity Law & Cyberspace Administration Policy Papers.
Russian Information Security Doctrine.
US DOJ Cybercrime and Darknet Prosecution Reports.
6.4 Ethical Frameworks for Darknet Research
Belmont Report (1979).
Ethical Principles and Guidelines for the Protection of Human Subjects of Research.Association of Internet Researchers (AoIR).
Ethical Guidelines for Internet Research.Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy.Nissenbaum, H. (2010).
Privacy in Context.
Stanford University Press.Floridi, L., Taddeo, M. (2016).
What Is Data Ethics?
Philosophical Transactions of the Royal Society A.UNESCO.
Ethics of Artificial Intelligence and Data.
6.5 Surveillance Technology Arms Race
Deibert, R. (2015).
Black Code: Surveillance, Privacy, and the Dark Side of the Internet.
Signal.Zuboff, S. (2019).
The Age of Surveillance Capitalism.
PublicAffairs.Greenwald, G. (2014).
No Place to Hide.
Metropolitan Books.Lyon, D. (2018).
The Culture of Surveillance.
Polity.UN Special Rapporteur on the Right to Privacy — Reports.
European Court of Human Rights — Surveillance Jurisprudence.
Anderson, R. (2008).
Security Engineering.
Wiley.
6.6 Censorship Circumvention Technology in Authoritarian Regimes
Deibert, R., et al. (2010).
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace.
MIT Press.Deibert, R. (2015).
Black Code.
Signal.Freedom House.
Freedom on the Net Reports.OpenNet Initiative.
Global Internet Filtering Studies.UN Special Rapporteur on Freedom of Expression — Reports.
Clayton, R., Murdoch, S. J., Watson, R. (2006).
Ignoring the Great Firewall of China.
PETS.Roberts, M. (2018).
Censored: Distraction and Diversion Inside China’s Great Firewall.
Princeton University Press.
6.7 Case Studies of Major Operations (Silk Road, Hansa, Alphabay) — Forensics Perspective Only
United States v. Ulbricht — Court Records and DOJ Filings.
Europol (2017).
Operation Bayonet / Hansa Takedown Reports.Christin, N. (2013).
Traveling the Silk Road.
WWW Conference.Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science.Décary-Hétu, D., Giommoni, L. (2017).
Do Police Crackdowns Disrupt Drug Cryptomarkets?
International Journal of Drug Policy.Europol IOCTA Reports (case study sections).
Anderson, R. (2008).
Security Engineering.
Wiley.
6.8 Implications for Human Rights & Whistleblowing
United Nations.
Universal Declaration of Human Rights.International Covenant on Civil and Political Rights (ICCPR).
*European Court of Human Rights — Case Law on Source Protection.
UN Special Rapporteur on Freedom of Expression — Reports.
Reporters Without Borders (RSF).
World Press Freedom Index.Privacy International — Surveillance and Human Rights Reports.
Nissenbaum, H. (2010).
Privacy in Context.
Stanford University Press.Greenwald, G. (2014).
No Place to Hide.
Metropolitan Books.
MODULE 7 — Social Structures of the Dark Web
7.1 Darknet Community Sociology
Holt, T. J. (2013).
Exploring the Social Organisation and Structure of Dark Web Forums.
Global Crime.Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy.Christin, N. (2013).
Traveling the Silk Road.
WWW Conference.Goffman, E. (1959).
The Presentation of Self in Everyday Life.
Anchor Books.Durkheim, E. (1893).
The Division of Labor in Society.
(Applied conceptually).Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso.
7.2 Reputation Systems & Trustless Cooperation
Christin, N. (2013).
Traveling the Silk Road.
WWW Conference.Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy.Akerlof, G. (1970).
The Market for Lemons.
Quarterly Journal of Economics.Axelrod, R. (1984).
The Evolution of Cooperation.
Basic Books.Resnick, P., et al. (2000).
Reputation Systems.
Communications of the ACM.Holt, T. J. (2013).
Exploring the Social Organisation of Dark Web Forums.
Global Crime.
7.3 Underground Ideology Ecosystems
Borum, R. (2011).
Radicalization into Violent Extremism.
Journal of Strategic Security.Holt, T. J. (2013).
Exploring the Social Organisation of Dark Web Forums.
Global Crime.Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso.Sunstein, C. (2009).
Going to Extremes: How Like Minds Unite and Divide.
Oxford University Press.Neumann, P. (2013).
The Trouble with Radicalization.
International Affairs.Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science.
7.4 Tribal Identity Formation in Anonymous Groups
Tajfel, H., Turner, J. (1979).
An Integrative Theory of Intergroup Conflict.
In The Social Psychology of Intergroup Relations.Holt, T. J. (2013).
Exploring the Social Organisation of Dark Web Forums.
Global Crime.Durkheim, E. (1912).
The Elementary Forms of Religious Life.
(Applied conceptually).Sunstein, C. (2009).
Going to Extremes.
Oxford University Press.Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso.Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science.
7.5 The Psychology of Hidden Social Networks
Suler, J. (2004).
The Online Disinhibition Effect.
CyberPsychology & Behavior.Festinger, L. (1957).
A Theory of Cognitive Dissonance.
Stanford University Press.Bandura, A. (1999).
Moral Disengagement in the Perpetration of Inhumanities.
Personality and Social Psychology Review.Sunstein, C. (2009).
Going to Extremes.
Oxford University Press.Holt, T. J. (2013).
Exploring the Social Organisation of Dark Web Forums.
Global Crime.Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy.
7.6 The Linguistic Evolution of Darknet Jargon
Labov, W. (1972).
Sociolinguistic Patterns.
University of Pennsylvania Press.Eckert, P. (2000).
Linguistic Variation as Social Practice.
Blackwell.Holt, T. J. (2013).
Exploring the Social Organisation of Dark Web Forums.
Global Crime.Androutsopoulos, J. (2014).
Mediatization and Sociolinguistic Change.
De Gruyter.Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso.Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science.
7.7 The Role of Humor, Memes & Symbolism in Hidden Cultures
Douglas, M. (1968).
The Social Control of Cognition: Some Factors in Joke Perception.
Man.Freud, S. (1905).
Jokes and Their Relation to the Unconscious.
(Psychological framing).Shifman, L. (2014).
Memes in Digital Culture.
MIT Press.Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso.Holt, T. J. (2013).
Exploring the Social Organisation of Dark Web Forums.
Global Crime.Durkheim, E. (1912).
The Elementary Forms of Religious Life.
(Symbolism applied conceptually).
7.8 “Nomadic Markets”: Why Markets Jump, Fork, Rebrand
Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science.Christin, N. (2013).
Traveling the Silk Road.
WWW Conference.Décary-Hétu, D., Giommoni, L. (2017).
Do Police Crackdowns Disrupt Drug Cryptomarkets?
International Journal of Drug Policy.Holt, T. J. (2013).
Exploring the Social Organisation of Dark Web Forums.
Global Crime.Powell, W., DiMaggio, P. (1991).
The New Institutionalism in Organizational Analysis.
University of Chicago Press.Tilly, C. (2004).
Social Movements, 1768–2004.
Paradigm Publishers.
MODULE 8 — Hidden Economy (Legal Framework Only)
8.1 Understanding Incentive Structures Without Focusing on Illicit Trades
North, D. (1990).
Institutions, Institutional Change and Economic Performance.
Cambridge University Press.Axelrod, R. (1984).
The Evolution of Cooperation.
Basic Books.Akerlof, G. (1970).
The Market for Lemons.
Quarterly Journal of Economics.Christin, N. (2013).
Traveling the Silk Road.
WWW Conference.Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy.Williamson, O. (1985).
The Economic Institutions of Capitalism.
Free Press.
8.2 Cryptocurrencies as Socioeconomic Infrastructure
Nakamoto, S. (2008).
Bitcoin: A Peer-to-Peer Electronic Cash System.Narayanan, A., et al. (2016).
Bitcoin and Cryptocurrency Technologies.
Princeton University Press.Böhme, R., et al. (2015).
Bitcoin: Economics, Technology, and Governance.
Journal of Economic Perspectives.Yermack, D. (2017).
Corporate Governance and Blockchains.
Review of Finance.Scott, B. (2016).
How Can Cryptocurrency and Blockchain Technology Play a Role in Building Social and Solidarity Finance?
UNRISD.North, D. (1990).
Institutions, Institutional Change and Economic Performance.
Cambridge University Press.
8.3 Privacy Coins: Monero, Zcash, and Their Scientific Designs
Nakamoto, S. (2008).
Bitcoin: A Peer-to-Peer Electronic Cash System.van Saberhagen, N. (2013).
CryptoNote v2.0.Miers, I., et al. (2013).
Zerocoin: Anonymous Distributed E-Cash from Bitcoin.
IEEE Symposium on Security and Privacy.Ben-Sasson, E., et al. (2014).
SNARKs for C: Verifying Program Executions Succinctly.
Cryptology ePrint Archive.Böhme, R., et al. (2015).
Bitcoin: Economics, Technology, and Governance.
Journal of Economic Perspectives.Kahn Academy / Princeton Cryptocurrency Course Materials (privacy sections).
8.4 Mixing, Tumbling & Decoy Transaction Theory
Chaum, D. (1981).
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
Communications of the ACM.Serjantov, A., Danezis, G. (2003).
Towards an Information-Theoretic Metric for Anonymity.
PETS.Bonneau, J., et al. (2015).
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
IEEE Symposium on Security and Privacy.Meiklejohn, S., et al. (2013).
A Fistful of Bitcoins.
IMC.Narayanan, A., et al. (2016).
Bitcoin and Cryptocurrency Technologies.
Princeton University Press.Danezis, G., et al. (2010).
Statistical Disclosure Control for Anonymous Communications.
PETS.
8.5 Reputation-Based Economic Systems in Anonymous Markets
Akerlof, G. (1970).
The Market for Lemons.
Quarterly Journal of Economics.Resnick, P., et al. (2000).
Reputation Systems.
Communications of the ACM.Axelrod, R. (1984).
The Evolution of Cooperation.
Basic Books.Christin, N. (2013).
Traveling the Silk Road.
WWW Conference.Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy.Williamson, O. (1985).
The Economic Institutions of Capitalism.
Free Press.
8.6 Logistics Models of Hidden Online Ecosystems
Powell, W., DiMaggio, P. (1991).
The New Institutionalism in Organizational Analysis.
University of Chicago Press.Perrow, C. (1984).
Normal Accidents.
Basic Books.Taleb, N. N. (2012).
Antifragile.
Random House.Christin, N. (2013).
Traveling the Silk Road.
WWW Conference.Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy.Weick, K. (1995).
Sensemaking in Organizations.
Sage.
8.7 How Researchers Analyze Market Data Without Participating
Christin, N. (2013).
Traveling the Silk Road.
WWW Conference.Décary-Hétu, D., Aldridge, J. (2015).
Sifting Through the Net: Monitoring Darknet Markets.
European Review of Organised Crime.Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science.Buchanan, E., Zimmer, M. (2016).
Internet Research Ethics.
Stanford Encyclopedia of Philosophy.Association of Internet Researchers (AoIR).
Ethical Guidelines for Internet Research.Narayanan, A., et al. (2016).
Bitcoin and Cryptocurrency Technologies.
Princeton University Press.
MODULE 9 — Forensic Science & Digital Investigation on Darknets
9.1 Tor Forensics: What Can Actually Be Recovered
Tor Project.
Tor Design Paper & Threat Model.Murdoch, S. J., Danezis, G. (2005).
Low-Cost Traffic Analysis of Tor.
IEEE Symposium on Security and Privacy.Johnson, A., et al. (2013).
Users Get Routed: Traffic Correlation on Tor.
CCS.Anderson, R. (2008).
Security Engineering.
Wiley.US DOJ Court Filings — Expert Testimony on Tor (various cases).
ENISA Reports on Anonymity Networks.
9.2 Blockchain Forensics & Behavioral Clustering
Meiklejohn, S., et al. (2013).
A Fistful of Bitcoins.
Internet Measurement Conference (IMC).Ron, D., Shamir, A. (2013).
Quantitative Analysis of the Full Bitcoin Transaction Graph.
Financial Cryptography.Androulaki, E., et al. (2013).
Evaluating User Privacy in Bitcoin.
Financial Cryptography.Narayanan, A., et al. (2016).
Bitcoin and Cryptocurrency Technologies.
Princeton University Press.Bonneau, J., et al. (2015).
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
IEEE S&P.US DOJ & Europol — Blockchain Forensic Expert Testimony (multiple cases).
9.3 Memory Analysis Techniques in Hidden Service Hosts
Ligh, M., et al. (2014).
The Art of Memory Forensics.
Wiley.Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press.Schatz, B., Cohen, M. (2017).
Digital Forensics in the Cloud.
Elsevier.ENISA.
Memory Forensics and Volatile Data Analysis Reports.Anderson, R. (2008).
Security Engineering.
Wiley.US DOJ Expert Testimony — Volatile Memory Evidence (multiple cases).
9.4 Host Fingerprinting Through Subtle Misconfigurations
Zalewski, M. (2012).
Silence on the Wire.
No Starch Press.Anderson, R. (2008).
Security Engineering.
Wiley.Paxson, V. (1999).
Bro: A System for Detecting Network Intruders.
Computer Networks.Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press.ENISA.
Technical Guidelines on Digital Forensics.US & EU Court Filings — Infrastructure Correlation Evidence (various cases).
9.5 Metadata Leaks in Hosting Environments
Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press.Zuboff, S. (2019).
The Age of Surveillance Capitalism.
PublicAffairs. (Metadata theory framing)ENISA.
Cloud Forensics and Metadata Analysis Reports.Behl, A., Behl, K. (2017).
Cyberwar and Information Warfare.
Oxford University Press.Anderson, R. (2008).
Security Engineering.
Wiley.US & EU Court Decisions referencing metadata evidence (various).
9.6 Detecting Botnets in Hidden Networks
Sanatinia, A., Noubir, G. (2015).
On the Feasibility of Botnet Command and Control Using Tor.
USENIX Workshop on Offensive Technologies (WOOT).Biryukov, A., Pustogarov, I. (2012).
Tor-based Botnets: Analysis and Countermeasures.
NDSS.Afroz, S., et al. (2014).
Doppelgänger Botnets: Exploring the Ecosystem.
USENIX Security.Anderson, R. (2008).
Security Engineering.
Wiley.ENISA.
Botnet Threat Assessment Reports.Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press.
9.7 Correlating Hidden Service Behavior With Clearnet Artifacts
Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press.Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science.Narayanan, A., et al. (2016).
Bitcoin and Cryptocurrency Technologies.
Princeton University Press.Buchanan, E., Zimmer, M. (2016).
Internet Research Ethics.
Stanford Encyclopedia of Philosophy.ENISA.
Digital Forensics Correlation Techniques Reports.US & EU Court Opinions referencing timeline and behavioral correlation evidence.
9.8 Intelligence Linking Through Linguistic Stylometry
Stamatatos, E. (2009).
A Survey of Modern Authorship Attribution Methods.
Journal of the American Society for Information Science and Technology.Juola, P. (2006).
Authorship Attribution.
Foundations and Trends in Information Retrieval.Koppel, M., Schler, J., Argamon, S. (2009).
Computational Methods in Authorship Attribution.
Journal of the American Society for Information Science.Grant, T. (2010).
Textual Analysis in Forensic Linguistics.
International Journal of Speech, Language & the Law.Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press.ENISA.
Cyber Forensics and Behavioral Analysis Reports.
MODULE 10 — Infrastructure Engineering for Secure Research
10.1 Building a Legally Compliant Research Workstation
Association of Internet Researchers (AoIR).
Ethical Guidelines for Internet Research.Buchanan, E., Zimmer, M. (2016).
Internet Research Ethics.
Stanford Encyclopedia of Philosophy.Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press.ENISA.
Good Practices for Security Research.OECD (2015).
Digital Security Risk Management for Economic and Social Prosperity.
10.2 Air-gapped Architectures
NIST SP 800-53 & SP 800-171
System and Information Integrity & Isolation Controls.ENISA.
Good Practices for Isolated and High-Security Systems.Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press.Anderson, R. (2008).
Security Engineering.
Wiley.OECD (2015).
Digital Security Risk Management.
10.3 Hardware Fingerprint Minimization
Anderson, R. (2008).
Security Engineering.
Wiley.Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press.NIST SP 800-53.
System Integrity and Risk Management Controls.ENISA.
Security-by-Design and Risk Reduction Guidelines.Saltzer, J., Schroeder, M. (1975).
The Protection of Information in Computer Systems.
IEEE.
10.4 Virtualization, Sandbox Layers & Network Compartmentalization
Saltzer, J., Schroeder, M. (1975).
The Protection of Information in Computer Systems.
IEEE.Anderson, R. (2008).
Security Engineering.
Wiley.NIST SP 800-53.
System and Communications Protection.ENISA.
Virtualisation Security and Best Practices.Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press.
10.5 Secure Environment Logging Without Identity Exposure
NIST SP 800-92.
Guide to Computer Security Log Management.ISO/IEC 27001 & 27002.
Information Security Logging and Monitoring Controls.Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press.OECD (2013).
Privacy Guidelines & Purpose Limitation Principles.Association of Internet Researchers (AoIR).
Ethical Guidelines for Internet Research.
10.6 How Researchers Prevent Contamination of Personal Identity
Association of Internet Researchers (AoIR).
Ethical Guidelines for Internet Research.Buchanan, E., Zimmer, M. (2016).
Internet Research Ethics.
Stanford Encyclopedia of Philosophy.Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press.OECD (2015).
Digital Security Risk Management.ISO/IEC 27001.
Information Security Management Systems.
10.7 Ethical Honeypots: Structure, Purpose, Limitations
Spitzner, L. (2003).
Honeypots: Tracking Hackers.
Addison-Wesley.ENISA.
Honeypots and Honeynets: Security and Legal Considerations.Bishop, M., et al. (2011).
Legal and Ethical Issues in Honeypot Deployment.
IEEE Security & Privacy.Association of Internet Researchers (AoIR).
Ethical Guidelines for Internet Research.OECD (2015).
Digital Security Risk Management.
MODULE 11 — Anthropology of Hidden Subcultures
11.1 Archetypes of Darknet Actors (Non-criminological, sociological)
Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso.Nissenbaum, H. (2010).
Privacy in Context.
Stanford University Press.Turkle, S. (1995).
Life on the Screen.
MIT Press.boyd, d. (2014).
It’s Complicated: The Social Lives of Networked Teens.
Yale University Press.Geertz, C. (1973).
The Interpretation of Cultures.
Basic Books.
11.2 Insider vs Outsider Dynamics
Goffman, E. (1959).
The Presentation of Self in Everyday Life.
Anchor Books.Geertz, C. (1973).
The Interpretation of Cultures.
Basic Books.Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso.Bourdieu, P. (1984).
Distinction: A Social Critique of the Judgement of Taste.
Harvard University Press.boyd, d. (2014).
It’s Complicated.
Yale University Press.
11.3 Rituals, Initiation, Status Symbols
Turner, V. (1969).
The Ritual Process.
Aldine.Bourdieu, P. (1986).
The Forms of Capital.
Greenwood.Geertz, C. (1973).
The Interpretation of Cultures.
Basic Books.Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso.Goffman, E. (1967).
Interaction Ritual.
Anchor Books.
11.4 The Semiotics (Sign Systems) of Darknet Communities
Geertz, C. (1973).
The Interpretation of Cultures.
Basic Books.Saussure, F. de (1916).
Course in General Linguistics.Barthes, R. (1972).
Mythologies.
Hill and Wang.Eco, U. (1976).
A Theory of Semiotics.
Indiana University Press.Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso.
11.5 Humor, Trolling, and Identity Masking
Bakhtin, M. (1968).
Rabelais and His World.
MIT Press.Goffman, E. (1959).
The Presentation of Self in Everyday Life.
Anchor Books.Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso.Phillips, W. (2015).
This Is Why We Can’t Have Nice Things.
MIT Press.Douglas, M. (1968).
The Social Control of Cognition.
Routledge.
11.6 How Online Anonymity Shapes Morality
Zimbardo, P. (1969).
The Human Choice: Individuation, Reason, and Order vs Deindividuation.
Nebraska Symposium on Motivation.Suler, J. (2004).
The Online Disinhibition Effect.
CyberPsychology & Behavior.Bauman, Z. (1993).
Postmodern Ethics.
Blackwell.Turkle, S. (1995).
Life on the Screen.
MIT Press.Durkheim, É. (1893).
The Division of Labor in Society.
11.7 Comparative Study: Deep-Web Communities vs Regular Internet Subcultures
boyd, d. (2014).
It’s Complicated: The Social Lives of Networked Teens.
Yale University Press.Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso.Turkle, S. (1995).
Life on the Screen.
MIT Press.Geertz, C. (1973).
The Interpretation of Cultures.
Basic Books.Durkheim, É. (1895).
The Rules of Sociological Method.
MODULE 12 — Content Delivery & Hidden Service Mechanics
12.1 Data Caching in Anonymous Networks
Tor Project.
Tor Design Paper & Threat Model.Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.Goldberg, I. (2002).
Privacy-Enhancing Technologies.
Springer.Anderson, R. (2008).
Security Engineering.
Wiley.ENISA.
Anonymity Networks and Traffic Analysis Resistance.
12.2 Why Darknet Sites Are Slow: Root Causes
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router. USENIX.Tor Project.
Tor Network Performance Metrics & Design Documentation.Anderson, R. (2008).
Security Engineering. Wiley.Goldberg, I., et al. (2012).
Privacy-Enhancing Technologies. Springer.ENISA.
Traffic Analysis and Anonymity Networks.
12.3 The Architecture of Onion Mirrors
Tor Project.
Onion Services Design Documentation.Dingledine, R., Syverson, P. (2004).
Tor Design and Threat Model. USENIX.Anderson, R. (2008).
Security Engineering. Wiley.ENISA.
Resilience and Availability in Anonymous Networks.Goldberg, I. (2010).
Privacy-Enhancing Technologies. Springer.
12.4 Captchas & Abuse Prevention Under Anonymity Constraints
Tor Project.
Tor Abuse Mitigation and Network Health Documentation.Biryukov, A., et al. (2014).
Content and Popularity Analysis in Tor Hidden Services.
NDSS Symposium.Dwork, C., Naor, M. (1992).
Pricing via Processing or Combatting Junk Mail.
CRYPTO.Goldberg, I. (2002).
Privacy-Enhancing Technologies. Springer.ENISA.
Abuse and Misuse in Anonymity Networks.
12.5 Darknet Search Engines: How They Crawl Hidden Services
Biryukov, A., et al. (2014).
Content and Popularity Analysis of Tor Hidden Services. NDSS.Tor Project.
Onion Services and Discovery Documentation.Anderson, R. (2008).
Security Engineering. Wiley.Goldberg, I. (2002).
Privacy-Enhancing Technologies. Springer.ENISA.
Anonymity Networks: Discovery and Metadata Risks.
12.6 Protocol-Level Challenges of Hosting Anonymous Media
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router. USENIX.Tor Project.
Tor Network Performance and Design Documentation.Anderson, R. (2008).
Security Engineering. Wiley.Goldberg, I. (2010).
Privacy-Enhancing Technologies. Springer.ENISA.
Traffic Analysis and Bandwidth Abuse in Anonymity Networks.
12.7 The Rise of Decentralized Hidden Host Networks
Anderson, R. (2008).
Security Engineering. Wiley.Dingledine, R., Syverson, P.
Tor Design and Threat Model.Stoica, I., et al. (2001).
Chord: A Scalable Peer-to-Peer Lookup Service. SIGCOMM.Goldberg, I. (2010).
Privacy-Enhancing Technologies. Springer.ENISA.
Decentralisation, Resilience, and Anonymity Networks.
MODULE 13 — Metadata Science
13.1 The Science of Metadata in Anonymous Systems
Mayer, J., & Mitchell, J. (2012).
Third-Party Web Tracking: Policy and Technology. IEEE.Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router. USENIX.Narayanan, A., Shmatikov, V. (2009).
De-anonymizing Social Networks. IEEE Symposium on Security & Privacy.Greenwald, G. (2014).
No Place to Hide. Metropolitan Books.ENISA.
Metadata and Traffic Analysis Risks in Anonymity Networks.
13.2 Behavioral Metadata: Timing, Frequency, Patterns
Narayanan, A., & Shmatikov, V. (2009).
De-anonymizing Social Networks. IEEE Symposium on Security & Privacy.Danezis, G., & Clayton, R. (2006).
Introducing Traffic Analysis. Digital Privacy.Suler, J. (2004).
The Online Disinhibition Effect. CyberPsychology & Behavior.ENISA.
Behavioral and Traffic Analysis in Anonymity Networks.Barabási, A.-L. (2010).
Bursts: The Hidden Pattern Behind Everything We Do. Penguin.
13.3 Machine Learning Models for Activity Typing
Herrmann, D., Wendolsky, R., & Federrath, H. (2009).
Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies. CCS.Panchenko, A., et al. (2016).
Website Fingerprinting at Internet Scale. NDSS.Danezis, G. (2010).
Traffic Analysis of the Tor Network. PETS.Bishop, C. M. (2006).
Pattern Recognition and Machine Learning. Springer.ENISA.
Machine Learning and Traffic Analysis in Privacy Networks.
13.4 Ethical Boundaries for Metadata Collection
Belmont Report (1979).
Ethical Principles and Guidelines for the Protection of Human Subjects of Research.Narayanan, A., & Shmatikov, V. (2009).
De-anonymizing Social Networks. IEEE S&P.Ohm, P. (2010).
Broken Promises of Privacy. UCLA Law Review.ENISA.
Ethical Considerations of Metadata and Traffic Analysis.Floridi, L., & Taddeo, M. (2016).
What Is Data Ethics? Philosophical Transactions of the Royal Society A.
13.5 Advanced Fingerprinting Methods in Academic Literature
Herrmann, D., Wendolsky, R., & Federrath, H. (2009).
Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies. CCS.Panchenko, A., et al. (2016).
Website Fingerprinting at Internet Scale. NDSS.Juarez, M., et al. (2014).
A Critical Evaluation of Website Fingerprinting Attacks. CCS.Danezis, G. (2010).
Traffic Analysis of the Tor Network. PETS.Tor Project.
Research on Traffic Analysis Resistance.
13.6 Hidden Markov Models for Traffic Flow Analysis
Rabiner, L. R. (1989).
A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proceedings of the IEEE.Danezis, G., & Clayton, R. (2006).
Introducing Traffic Analysis. Digital Privacy.Shalizi, C. R., & Crutchfield, J. P. (2001).
Computational Mechanics: Pattern and Prediction. Journal of Statistical Physics.Bishop, C. M. (2006).
Pattern Recognition and Machine Learning. Springer.ENISA.
Sequential Traffic Analysis Models in Anonymity Networks.
13.7 Noise Injection Models & Anti-Fingerprinting Techniques
Danezis, G., & Clayton, R. (2006).
Route Fingerprinting in Anonymous Communications. PETS.Juarez, M., et al. (2014).
Toward an Efficient Website Fingerprinting Defense. ESORICS.Shmatikov, V., & Wang, M.-H. (2006).
Timing Analysis in Low-Latency Mix Networks. ESORICS.Bishop, C. M. (2006).
Pattern Recognition and Machine Learning. Springer.ENISA.
Traffic Obfuscation and Noise-Based Privacy Defenses.
MODULE 14 — The Future of Darknets
14.1 Post-Quantum Darknet Proposals
Bernstein, D. J., Buchmann, J., Dahmen, E. (2009).
Post-Quantum Cryptography. Springer.NIST.
Post-Quantum Cryptography Standardization Project.Alagic, G., et al. (2020).
Status Report on the Second Round of the NIST PQC Process.Tor Project Research Team.
Cryptographic Agility and Post-Quantum Considerations.Mosca, M. (2018).
Cybersecurity in an Era with Quantum Computers. IEEE Security & Privacy.
14.2 AI-Assisted Privacy Tools
Juarez, M., et al. (2014).
Toward an Efficient Website Fingerprinting Defense. ESORICS.Abadi, M., et al. (2016).
Deep Learning with Differential Privacy. CCS.Papernot, N., et al. (2017).
Semi-Supervised Knowledge Transfer for Deep Learning from Private Training Data. ICLR.Tor Project Research Team.
Machine Learning and Anonymity Defense Research.ENISA.
Artificial Intelligence and Privacy-Enhancing Technologies.
14.3 Meritocratic & DAO-Style Hidden Communities
Ostrom, E. (1990).
Governing the Commons. Cambridge University Press.Buterin, V. (2014).
DAOs, DACs, DAs and More. Ethereum Blog.Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy. Verso.De Filippi, P., & Wright, A. (2018).
Blockchain and the Law. Harvard University Press.ENISA.
Decentralized Governance and Trust Models.
14.4 Darknets in Space: Mesh Networks in LEO Satellite Constellations
Handley, M. (2018).
Delay is Not an Option: Low Latency Routing in Space. ACM SIGCOMM.Bhattacherjee, D., et al. (2020).
Gearing Up for the 21st Century Space Race. HotNets.Kassing, S., et al. (2022).
Routing in Mega-Constellations. IEEE/ACM TON.Cerf, V., et al. (2015).
Delay-Tolerant Networking Architecture. RFC 4838.ENISA.
Satellite Communications and Network Security.
14.5 Decentralized Identity & Anonymous Credentials
Chaum, D. (1985).
Security Without Identification: Transaction Systems to Make Big Brother Obsolete. CACM.Camenisch, J., & Lysyanskaya, A. (2001).
An Efficient System for Non-transferable Anonymous Credentials. EUROCRYPT.Boneh, D., et al. (2019).
Zexe: Enabling Decentralized Private Computation. IEEE S&P.W3C.
Decentralized Identifiers (DIDs) Specification.ENISA.
Privacy-Preserving Identity Management Systems.
14.6 Next-Generation Mixnets
Chaum, D. (1981).
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. CACM.Danezis, G., & Sassaman, L. (2003).
Heartbeat Traffic to Counter (n−1) Attacks. PETS.Danezis, G., et al. (2015).
Sphinx: A Compact and Provably Secure Mix Format. IEEE S&P.Loopix Project.
Mix Network Design for Low-Latency Messaging.ENISA.
Mix Networks and Traffic Analysis Resistance.
14.7 Predictions for the 2030–2040 Hidden Internet Landscape
Dingledine, R., et al.
Tor: Design, Threat Models, and Future Directions.Narayanan, A., et al. (2020).
Limits of Privacy and the Future of Anonymity. Princeton CITP.Green & Smith (2016).
The Cryptopals Crypto Challenges and Real-World Cryptography.ENISA.
Future Trends in Privacy-Enhancing Technologies.Solove, D. J. (2021).
Privacy and Power. Harvard Law Review.
MODULE 15 — The Philosophy & Ethics of Hidden Systems
15.1 The Paradox of Anonymity: Freedom vs Abuse
United Nations (1948).
Universal Declaration of Human Rights, Article 12.United Nations (1966).
International Covenant on Civil and Political Rights, Article 17.European Court of Human Rights.
Article 8 Jurisprudence.Westin, A. F. (1967).
Privacy and Freedom. Atheneum.Solove, D. J. (2008).
Understanding Privacy. Harvard University Press.
15.2 Privacy as a Human Right
United Nations (1948).
Universal Declaration of Human Rights, Article 12.United Nations (1966).
International Covenant on Civil and Political Rights, Article 17.European Court of Human Rights.
Article 8 Jurisprudence.Westin, A. F. (1967).
Privacy and Freedom. Atheneum.Solove, D. J. (2008).
Understanding Privacy. Harvard University Press.
15.3 The Moral Structures of Non-Attributed Societies
Zimbardo, P. (1969).
The Human Choice: Individuation, Reason, and Order vs. Deindividuation, Impulse, and Chaos.Suler, J. (2004).
The Online Disinhibition Effect. CyberPsychology & Behavior.Bandura, A. (1999).
Moral Disengagement in the Perpetration of Inhumanities. Personality and Social Psychology Review.Kahneman, D. (2011).
Thinking, Fast and Slow. Farrar, Straus and Giroux.Nissenbaum, H. (2010).
Privacy in Context. Stanford University Press.
15.4 How Hidden Systems Shape Human Behavior
Arendt, H. (1958).
The Human Condition. University of Chicago Press.Arendt, H. (1971).
The Origins of Totalitarianism. Harcourt Brace.Foucault, M. (1975).
Discipline and Punish. Vintage Books.Ellul, J. (1964).
The Technological Society. Vintage Books.Lyon, D. (2007).
Surveillance Studies. Polity Press.
15.5 Philosophers on Secrecy (Arendt, Foucault, Ellul)
Belmont Report (1979).
Ethical Principles and Guidelines for the Protection of Human Subjects of Research.Association of Internet Researchers (AoIR).
Ethical Decision-Making and Internet Research.Zuboff, S. (2019).
The Age of Surveillance Capitalism. PublicAffairs.ENISA.
Ethics in Cybersecurity Research.Greenwald, G. (2014).
No Place to Hide. Metropolitan Books.
15.6 Ethical Darknet Journalism & Research Methodologies
Arendt, H. (1958).
The Human Condition. University of Chicago Press.Nissenbaum, H. (2010).
Privacy in Context. Stanford University Press.Solove, D. J. (2021).
Privacy and Power. Harvard Law Review.Floridi, L. (2014).
The Ethics of Information. Oxford University Press.ENISA.
Principles for Privacy-Enhancing Technologies.
15.7 Building a Better Anonymous Internet
Creswell, J. W. (2014).
Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. Sage.Yin, R. K. (2018).
Case Study Research and Applications. Sage.Floridi, L. (2014).
The Ethics of Information. Oxford University Press.ENISA.
Research Ethics in Cybersecurity and Privacy Studies.Association of Internet Researchers (AoIR).
Ethical Decision-Making and Internet Research.
MODULE 16 — Capstone Research Projects
16.1 Multidisciplinary Analysis Project
Danezis, G., & Diaz, C. (2008).
A Survey of Anonymous Communication Channels. Technical Report, KU Leuven.Murdoch, S. J., & Danezis, G. (2005).
Low-Cost Traffic Analysis of Tor. IEEE Symposium on Security & Privacy.Shalizi, C. R. (2006).
Methods and Techniques of Complex Systems Science. Santa Fe Institute.Creswell, J. W. (2014).
Research Design. Sage Publications.ENISA.
Ethical Experimentation in Cybersecurity Research.
16.2 Technical Research: Build a Model Darknet Simulator
Geertz, C. (1973).
The Interpretation of Cultures. Basic Books.Hammersley, M., & Atkinson, P. (2007).
Ethnography: Principles in Practice. Routledge.Association of Internet Researchers (AoIR).
Ethical Decision-Making and Internet Research.Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy. Verso.ENISA.
Ethics in Sociotechnical Security Research.
16.3 Sociological Field-Study Report (Non-participatory)
Tufte, E. R. (2001).
The Visual Display of Quantitative Information. Graphics Press.Cairo, A. (2016).
The Truthful Art. New Riders.Munzner, T. (2014).
Visualization Analysis and Design. CRC Press.Narayanan, A., & Shmatikov, V. (2009).
De-anonymizing Social Networks. IEEE S&P.ENISA.
Ethical Visualization of Security and Privacy Data.
16.4 Metadata Visualization Dashboard
Belmont Report (1979).
Ethical Principles and Guidelines for the Protection of Human Subjects of Research.Floridi, L. (2014).
The Ethics of Information. Oxford University Press.Association of Internet Researchers (AoIR).
Ethical Decision-Making and Internet Research.ENISA.
Research Ethics and Secure Methodologies in Cybersecurity.Creswell, J. W. (2014).
Research Design. Sage Publications.
16.5 Secure Research Methodology Paper
National Academies of Sciences (2017).
Dual Use Research of Concern in the Life Sciences.ENISA.
Responsible Disclosure and Publication in Security Research.Floridi, L., & Taddeo, M. (2016).
What Is Data Ethics? Philosophical Transactions of the Royal Society A.COPE (Committee on Publication Ethics).
Guidelines on Good Publication Practice.Resnik, D. B. (2011).
What Is Ethics in Research & Why Is It Important? NIH.
16.6 Panel Review & Publication Preparation
National Academies of Sciences (2017).
Dual Use Research of Concern in the Life Sciences.ENISA.
Responsible Disclosure and Publication in Security Research.Floridi, L., & Taddeo, M. (2016).
What Is Data Ethics? Philosophical Transactions of the Royal Society A.COPE (Committee on Publication Ethics).
Guidelines on Good Publication Practice.Resnik, D. B. (2011).
What Is Ethics in Research & Why Is It Important? NIH.