References
MODULE 1 — Foundations: What the Web Actually Is
Section titled “MODULE 1 — Foundations: What the Web Actually Is”1.2 — Historical Evolution of Hidden Networks
Section titled “1.2 — Historical Evolution of Hidden Networks”Foundational Cryptography
Section titled “Foundational Cryptography”-
Diffie, W., Hellman, M. (1976).
New Directions in Cryptography.
IEEE Transactions on Information Theory.
https://doi.org/10.1109/TIT.1976.1055638 -
Rivest, R., Shamir, A., Adleman, L. (1978).
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.
Communications of the ACM.
https://doi.org/10.1145/359340.359342
Mix Networks & Anonymous Communication
Section titled “Mix Networks & Anonymous Communication”-
Chaum, D. (1981).
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
Communications of the ACM.
https://doi.org/10.1145/358549.358563 -
Chaum, D. (1988).
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability.
Journal of Cryptology.
https://doi.org/10.1007/BF02323528
Early Anonymous Remailers
Section titled “Early Anonymous Remailers”-
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf -
Mixmaster & Mixminion Documentation (Cypherpunks).
Archived technical specifications:
https://mixminion.net
https://www.chaum.com
Onion Routing & Tor Development
Section titled “Onion Routing & Tor Development”-
Goldschlag, D. M., Reed, M. G., Syverson, P. F. (1999).
Onion Routing for Anonymous and Private Internet Connections.
Communications of the ACM (Extended abstract available via NRL).
https://www.onion-router.net/Publications.html -
Tor Project Official Design Documents.
https://spec.torproject.org
https://community.torproject.org
Alternative Darknet Architectures
Section titled “Alternative Darknet Architectures”-
Freenet Project Paper
Clarke, I., Sandberg, O., Wiley, B., Hong, T. (2000).
Freenet: A Distributed Anonymous Information Storage and Retrieval System.
ICSI Berkeley.
https://freenetproject.org/papers/freenet.pdf -
I2P — Invisible Internet Project Documentation.
https://geti2p.net/en/docs -
GNUnet Technical Documentation.
https://gnunet.org/en/philosophy.html
https://gnunet.org/en/architecture.html -
Yggdrasil Network Whitepaper.
https://yggdrasil-network.github.io/whitepaper.pdf -
Nym Mixnet Academic Whitepaper.
Khovratovich, D., et al.
Nym Mixnet Overview.
https://nymtech.net/docs/whitepaper
Dark Web Mainstreamization (2010s)
Section titled “Dark Web Mainstreamization (2010s)”-
Christin, N. (2013).
Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
WWW Conference.
https://doi.org/10.1145/2488388.2488408 -
Moore, D., Rid, T. (2016).
Cryptopolitik and the Darknet.
Survival Journal (International Institute for Strategic Studies).
https://doi.org/10.1080/00396338.2016.1142085
Tor Hidden Service Upgrade (v3)
Section titled “Tor Hidden Service Upgrade (v3)”-
Tor v3 Onion Services Specification.
Next-Generation Hidden Services.
https://spec.torproject.org/hiddensvc.html -
Tor Proposal 224 — Hidden Service Protocol Improvements.
https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt
1.3 Misconceptions & Media Myths: A Scientific Deconstruction
Section titled “1.3 Misconceptions & Media Myths: A Scientific Deconstruction”-
Moore, D., Rid, T. (2016).
Cryptopolitik and the Darknet.
Survival Journal.
https://doi.org/10.1080/00396338.2016.1142085 -
Christin, N. (2013).
Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
WWW Conference.
https://doi.org/10.1145/2488388.2488408 -
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf -
The Tor Project — Myths and FAQs.
https://support.torproject.org -
Electronic Frontier Foundation (EFF) — Surveillance & Anonymity Resources.
https://www.eff.org -
I2P Documentation — Project Overview.
https://geti2p.net/en/docs -
Freenet Whitepaper — Clarke et al. (2000).
https://freenetproject.org/papers/freenet.pdf
1.4 Why Humans Built Hidden Networks: A Sociotechnical Perspective
Section titled “1.4 Why Humans Built Hidden Networks: A Sociotechnical Perspective”-
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf -
Chaum, D. (1981).
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
Communications of the ACM.
https://doi.org/10.1145/358549.358563 -
Hughes, E. (1993).
A Cypherpunk’s Manifesto.
Published on Cypherpunk mailing list archives. -
Moore, D., Rid, T. (2016).
Cryptopolitik and the Darknet.
International Institute for Strategic Studies.
https://doi.org/10.1080/00396338.2016.1142085 -
Electronic Frontier Foundation.
Why Privacy Matters.
https://www.eff.org -
United Nations Human Rights Council. (2015).
Report on the Right to Privacy in the Digital Age. -
Tor Project — Mission and Overview.
https://www.torproject.org/about
1.5 Deep Web vs Dark Web vs Darknets: Taxonomy and Terminology
Section titled “1.5 Deep Web vs Dark Web vs Darknets: Taxonomy and Terminology”-
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf -
Moore, D., Clayton, R., Anderson, R. (2009).
The Anatomy of the Deep Web.
Cambridge University Computer Laboratory (Technical Discussion — widely cited). -
Moore, D., Rid, T. (2016).
Cryptopolitik and the Darknet.
International Institute for Strategic Studies.
https://doi.org/10.1080/00396338.2016.1142085 -
I2P Project Documentation.
https://geti2p.net/en/docs -
Freenet Whitepaper — Clarke et al. (2000).
Freenet: A Distributed Anonymous Information Storage and Retrieval System.
https://freenetproject.org/papers/freenet.pdf -
GNUnet Architecture Overview.
https://gnunet.org/en/architecture.html -
Yggdrasil Network Whitepaper.
https://yggdrasil-network.github.io/whitepaper.pdf -
Nym Mixnet Whitepaper.
https://nymtech.net/docs/whitepaper
1.6 The Philosophy of Anonymity: Privacy as a Technological Construct
Section titled “1.6 The Philosophy of Anonymity: Privacy as a Technological Construct”-
Hughes, E. (1993).
A Cypherpunk’s Manifesto.
Archived mailing list document. -
Chaum, D. (1981).
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
Communications of the ACM.
https://doi.org/10.1145/358549.358563 -
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf -
United Nations Human Rights Council (2015).
The Right to Privacy in the Digital Age. -
Electronic Frontier Foundation — Privacy and Surveillance Resources.
https://www.eff.org -
Solove, D. (2007).
“I’ve Got Nothing to Hide” and Other Misunderstandings of Privacy.
San Diego Law Review. -
Nissenbaum, H. (2004).
Privacy as Contextual Integrity.
Washington Law Review. -
Zimmer, M. (2010).
“Web Search Studies and the Problem of Privacy.”
Library Trends Journal.
1.7 A Comparative Anatomy of Hidden Networks (F2F, I2P, Tor, Yggdrasil, Nym, Lokinet)
Section titled “1.7 A Comparative Anatomy of Hidden Networks (F2F, I2P, Tor, Yggdrasil, Nym, Lokinet)”-
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf -
I2P Project Documentation
https://geti2p.net/en/docs -
Clarke, I., Sandberg, O., Wiley, B., Hong, T. (2000).
Freenet: A Distributed Anonymous Information Storage and Retrieval System.
https://freenetproject.org/papers/freenet.pdf -
Yggdrasil Network Whitepaper
https://yggdrasil-network.github.io/whitepaper.pdf -
Nym Mixnet Whitepaper
https://nymtech.net/docs/whitepaper -
Chaum, D. (1981).
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
Communications of the ACM.
https://doi.org/10.1145/358549.358563 -
Lokinet (Oxen) Technical Overview
https://lokinet.org/docs
MODULE 2 — Network Architectures of Hidden Ecosystems
Section titled “MODULE 2 — Network Architectures of Hidden Ecosystems”2.1 Tor’s Onion Routing — Architectural Deep Dive
Section titled “2.1 Tor’s Onion Routing — Architectural Deep Dive”-
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf -
Goldschlag, D., Reed, M., Syverson, P. (1999).
Onion Routing for Anonymous and Private Internet Connections.
Naval Research Laboratory.
https://www.onion-router.net/Publications.html -
Murdoch, S. J., & Zieliński, P. (2007).
Sampled Traffic Analysis Against Tor.
IEEE Symposium on Security and Privacy. -
Tor Project Specifications.
https://spec.torproject.org -
Biryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization.
IEEE Symposium on Security and Privacy. -
Johnson, A., Wacek, C., Jansen, R., Sherr, M., Syverson, P. (2013).
Users Get Routed: Traffic Correlation on Tor.
ACM Conference on Computer and Communications Security.
2.2 Hidden Services Infrastructure: v2→v3 Transition, Cryptographic Upgrade
Section titled “2.2 Hidden Services Infrastructure: v2→v3 Transition, Cryptographic Upgrade”-
Tor Project — Next-Generation Onion Services Specification (v3).
https://spec.torproject.org/rend-spec-v3 -
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf -
Biryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization.
IEEE Security & Privacy. -
Tor Proposal 224 — “Next-Generation Hidden Services.”
https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt -
Kadianakis, G., Jansen, R. (Tor Project).
Next-Generation Hidden Services in Tor.
Official Tor documentation and slides. -
Appelbaum, J., et al. (2012).
Design of Hidden Services.
Tor Project Technical Report. -
Johnson et al., (2013).
Users Get Routed: Traffic Correlation on Tor.
ACM CCS Conference.
2.3 Alternative Darknets:
Section titled “2.3 Alternative Darknets:”-
I2P Tunnels
Section titled “I2P Tunnels” -
Freenet Data Store Mechanics
Section titled “Freenet Data Store Mechanics” -
GNUnet’s Peer Group Cryptography
Section titled “GNUnet’s Peer Group Cryptography” -
Yggdrasil’s DHT-Routed IPv6 Mesh
Section titled “Yggdrasil’s DHT-Routed IPv6 Mesh” -
Nym Mixnet Layered Privacy
Section titled “Nym Mixnet Layered Privacy”I2P
I2P Project Documentation
https://geti2p.net/en/docs
Zantout, B., & Haraty, R. (2011).
I2P Data Communication System.
ICICS Conference.
Freenet
Clarke, I., Sandberg, O., Wiley, B., & Hong, T. (2000).
Freenet: A Distributed Anonymous Information Storage and Retrieval System.
https://freenetproject.org/papers/freenet.pdf
GNUnet
GNUnet Documentation — Architecture
https://gnunet.org/en/architecture.html
Grothoff, C. (2017).
The GNU Name System.
PETS (Privacy Enhancing Technologies Symposium).
https://doi.org/10.1515/popets-2017-0056
Yggdrasil
Yggdrasil Network Whitepaper
https://yggdrasil-network.github.io/whitepaper.pdf
Nym
Kwon, A., Lazar, D., Devadas, S., Ford, B. (2017).
The Loopix Anonymity System.
USENIX Security.
Nym Project Whitepaper
https://nymtech.net/docs/whitepaper
2.4 Comparative Latency Studies Across Darknets
Section titled “2.4 Comparative Latency Studies Across Darknets”-
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium. -
Johnson, A., et al. (2013).
Users Get Routed: Traffic Correlation on Tor.
ACM CCS. -
Zantout, B., & Haraty, R. (2011).
I2P Data Communication System.
ICICS Conference. -
Clarke, I., Sandberg, O., Wiley, B., Hong, T. (2000).
Freenet: A Distributed Anonymous Information Storage and Retrieval System.
Freenet Whitepaper. -
Grothoff, C. (2017).
The GNU Name System.
PETS. -
Yggdrasil Network Whitepaper
https://yggdrasil-network.github.io/whitepaper.pdf -
Kwon, A., Lazar, D., Devadas, S., Ford, B. (2017).
The Loopix Anonymity System.
USENIX Security. -
Nym Project Whitepaper
https://nymtech.net/docs/whitepaper
2.5 How Exit Relays Actually Work
Section titled “2.5 How Exit Relays Actually Work”-
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf -
McCoy, D., Bauer, K., Grunwald, D., Kohno, T., & Sicker, D. (2008).
Shining Light in Dark Places: Understanding the Tor Network.
Privacy Enhancing Technologies Symposium (PETS).
https://doi.org/10.1007/978-3-540-70630-4_5 -
Winter, P., & Lindskog, S. (2012).
How To Catch A Tor User: Traffic Correlation on Tor by Real-World Adversaries.
HotPETs Paper. -
Tor Project Documentation — Exit Policies & Guidelines.
https://community.torproject.org/relay/operators/exit/ -
Jansen, R., et al. (2014).
The Sniper Attack: Anonymously Deanonymizing Tor Users.
USENIX Security. -
Tor Metrics & Consensus Data.
https://metrics.torproject.org
2.6 Pluggable Transports: Obfuscation War Between Censorship & Anonymity
Section titled “2.6 Pluggable Transports: Obfuscation War Between Censorship & Anonymity”-
Tor Project — Pluggable Transport Specification (v2).
https://spec.torproject.org/pt-spec -
Wilde, E., Winter, P., Lindskog, S. (2018).
How to Build a Censorship Circumvention Tool.
USENIX FOCI Workshop. -
Fifield, D., Lan, C., Hynes, N., Wegmann, P., Paxson, V. (2015).
Blocking-Resistant Communication Through Domain Fronting.
ACM CCS.
https://doi.org/10.1145/2810103.2813682 -
Houmansadr, A., Brubaker, C., Shmatikov, V. (2013).
The Parrot Is Dead: Observations on the Imitation Resistance of Traffic Mimicry.
IEEE Symposium on Security & Privacy. -
Wang, L., Dyer, K. P., Aksoy, S., et al. (2015).
Seeing Through Network-Protocol Obfuscation.
USENIX Security. -
Snowflake Technical Overview (Tor Project).
https://snowflake.torproject.org -
FTE (Format-Transforming Encryption) Specification.
https://fteproxy.org
2.7 Ecosystem Fragility: Why Darknets Collapse and Rebuild
Section titled “2.7 Ecosystem Fragility: Why Darknets Collapse and Rebuild”-
Fifield, D., et al. (2015).
Blocking-Resistant Communication Through Domain Fronting.
ACM CCS.
https://doi.org/10.1145/2810103.2813682 -
Wilde, E., Winter, P., Lindskog, S. (2018).
How to Build a Censorship Circumvention Tool.
USENIX FOCI. -
Khattak, S., et al. (2013).
Do You See What I See? Differential Treatment of Anonymous Users.
NDSS Symposium. -
Tor Project: Snowflake Overview.
https://snowflake.torproject.org -
Tor Project: Pluggable Transport Specs.
https://spec.torproject.org/pt-spec -
Winter, P., & Lindskog, S. (2012).
Great Firewall of China: Blocking and Evolving Strategies.
FOCI Workshop. -
Aryan, S., Aryan, H., & Halderman, J.A. (2013).
Internet Censorship in Iran: A First Look.
USENIX FOCI. -
Ramesh, R., et al. (2020).
Examining Russia’s DPI Deployment.
IMC (Internet Measurement Conference).
MODULE 3 — Cryptography Behind Hidden Services
Section titled “MODULE 3 — Cryptography Behind Hidden Services”3.1 Public Key Cryptography in Onion Ecosystems
Section titled “3.1 Public Key Cryptography in Onion Ecosystems”-
Diffie, W., Hellman, M. (1976).
New Directions in Cryptography.
IEEE Transactions on Information Theory.
https://doi.org/10.1109/TIT.1976.1055638 -
Rivest, R., Shamir, A., Adleman, L. (1978).
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.
Communications of the ACM.
https://doi.org/10.1145/359340.359342 -
Chaum, D. (1981).
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
Communications of the ACM.
https://doi.org/10.1145/358549.358563 -
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium.
https://www.usenix.org/legacy/events/sec04/tech/dingledine/dingledine.pdf -
Tor Project — Cryptographic Protocol Specifications.
https://spec.torproject.org -
Bernstein, D. J., et al. (2012).
High-Speed High-Security Signatures (Ed25519).
https://ed25519.cr.yp.to -
Kahn Academy / Stanford CS — Public Key Cryptography Lectures
(Used widely for foundational explanations)
3.2 HSDir (Hidden Service Directory) Cryptographic Workflows
Section titled “3.2 HSDir (Hidden Service Directory) Cryptographic Workflows”-
Tor Project — Onion Service v3 Specification (HSDir).
https://spec.torproject.org/rend-spec-v3 -
Tor Proposal 224.
Next-Generation Hidden Services.
https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt -
Biryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
Trawling for Tor Hidden Services.
IEEE Symposium on Security and Privacy. -
Kadianakis, G., Johnson, A., et al. (2017).
Onion Services: Design and Improvements.
Tor Project Technical Report. -
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium. -
Johnson, A., et al. (2013).
Users Get Routed: Traffic Correlation on Tor.
ACM CCS.
3.3 Why v3 Onion Services Were Necessary
Section titled “3.3 Why v3 Onion Services Were Necessary”-
Biryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
Trawling for Tor Hidden Services.
IEEE Symposium on Security and Privacy. -
Tor Proposal 224.
Next-Generation Hidden Services.
https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt -
Tor Project — Onion Service v3 Specification.
https://spec.torproject.org/rend-spec-v3 -
Kadianakis, G., Johnson, A., et al. (2017).
Onion Services: Design and Improvements.
Tor Project Technical Report. -
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium. -
Bernstein, D. J., et al. (2012).
High-Speed High-Security Signatures (Ed25519).
https://ed25519.cr.yp.to -
NIST Cryptographic Standards Transition Reports
(RSA-1024 & SHA-1 deprecation guidance)
3.4 Post-Quantum Threats to Darknets
Section titled “3.4 Post-Quantum Threats to Darknets”-
Shor, P. (1994).
Algorithms for Quantum Computation: Discrete Logarithms and Factoring.
IEEE FOCS. -
Grover, L. (1996).
A Fast Quantum Mechanical Algorithm for Database Search.
STOC. -
NIST Post-Quantum Cryptography Project.
https://csrc.nist.gov/projects/post-quantum-cryptography -
Mosca, M. (2018).
Cybersecurity in an Era with Quantum Computers.
Communications of the ACM. -
Tor Project — Cryptographic Specifications & Proposals.
https://spec.torproject.org -
Bernstein, D. J., et al.
Introduction to Post-Quantum Cryptography.
Springer.
3.5 Decentralized PKI for Anonymous Services3.6 Zero-Knowledge Proof Concepts Relevant to Darknets
Section titled “3.5 Decentralized PKI for Anonymous Services3.6 Zero-Knowledge Proof Concepts Relevant to Darknets”-
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium. -
Tor Project — Onion Service v3 Specification.
https://spec.torproject.org/rend-spec-v3 -
Goldberg, I. (2015).
Improving the Privacy and Security of Tor Hidden Services.
PETS Symposium. -
Chaum, D. (1981).
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
Communications of the ACM. -
Kahn Academy / Stanford CS.
Public Key Infrastructure Concepts. -
Anderson, R. (2008).
Security Engineering.
Wiley.
3.6 Zero-Knowledge Proof Concepts Relevant to Darknets
Section titled “3.6 Zero-Knowledge Proof Concepts Relevant to Darknets”-
Goldwasser, S., Micali, S., Rackoff, C. (1985).
The Knowledge Complexity of Interactive Proof Systems.
SIAM Journal on Computing. -
Chaum, D., Evertse, J., van de Graaf, J. (1988).
An Improved Protocol for Demonstrating Possession of Discrete Logarithms.
CRYPTO. -
Camenisch, J., Lysyanskaya, A. (2001).
An Efficient System for Non-transferable Anonymous Credentials.
EUROCRYPT. -
Kahn Academy / MIT OpenCourseWare.
Zero-Knowledge Proof Lectures. -
Tor Project — Cryptographic Protocol Overview.
https://spec.torproject.org -
Boneh, D., Shoup, V. (2020).
A Graduate Course in Applied Cryptography.
3.7 Metadata Minimization Engineering
Section titled “3.7 Metadata Minimization Engineering”-
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium. -
Murdoch, S. J., Zieliński, P. (2007).
Sampled Traffic Analysis Against Tor.
IEEE Security & Privacy. -
Johnson, A., et al. (2013).
Users Get Routed: Traffic Correlation on Tor.
ACM CCS. -
Goldberg, I. (2015).
Improving the Privacy and Security of Tor Hidden Services.
PETS Symposium. -
Tor Project — Threat Models & Design Docs.
https://spec.torproject.org -
Pfitzmann, A., Hansen, M. (2010).
A Terminology for Talking About Privacy by Data Minimization. -
RFC 6973 — Privacy Considerations for Internet Protocols.
MODULE 4 — Cybersecurity Failures in Hidden Networks
Section titled “MODULE 4 — Cybersecurity Failures in Hidden Networks”4.1 How Hidden Services De-Anonymize Themselves
Section titled “4.1 How Hidden Services De-Anonymize Themselves”-
Biryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
Trawling for Tor Hidden Services.
IEEE Symposium on Security and Privacy. -
Murdoch, S. J., Zieliński, P. (2007).
Sampled Traffic Analysis Against Tor.
IEEE Security & Privacy. -
Goldberg, I. (2015).
Improving the Privacy and Security of Tor Hidden Services.
PETS Symposium. -
Anderson, R. (2008).
Security Engineering.
Wiley. -
Tor Project — Onion Services Documentation.
https://spec.torproject.org -
Narayanan, A., et al. (2012).
On the Feasibility of Internet-Scale Author Identification.
IEEE Symposium on Security and Privacy.
4.2 Browser-Level Identity Leaks: Fingerprinting Anatomy
Section titled “4.2 Browser-Level Identity Leaks: Fingerprinting Anatomy”-
Eckersley, P. (2010).
How Unique Is Your Web Browser?
Electronic Frontier Foundation. -
Panopticlick Project (EFF).
https://panopticlick.eff.org -
Narayanan, A., et al. (2012).
On the Feasibility of Internet-Scale Author Identification.
IEEE Symposium on Security and Privacy. -
Mowery, K., et al. (2012).
Fingerprinting Information in JavaScript Implementations.
W2SP Workshop. -
Tor Project — Tor Browser Design Documentation.
https://support.torproject.org -
Boda, K., et al. (2011).
User Tracking on the Web via Cross-Browser Fingerprinting.
WWW Conference.
4.3 Deanonymization Attacks Observed in Research Papers
Section titled “4.3 Deanonymization Attacks Observed in Research Papers”-
Murdoch, S. J., Zieliński, P. (2007).
Sampled Traffic Analysis Against Tor.
IEEE Security & Privacy. -
Johnson, A., et al. (2013).
Users Get Routed: Traffic Correlation on Tor.
ACM CCS. -
Biryukov, A., Pustogarov, I., Weinmann, R.-P. (2013).
Trawling for Tor Hidden Services.
IEEE S&P. -
Wang, T., et al. (2014).
Effective Attacks and Provable Defenses for Website Fingerprinting.
USENIX Security. -
Panchenko, A., et al. (2016).
Website Fingerprinting at Internet Scale.
NDSS. -
Eckersley, P. (2010).
How Unique Is Your Web Browser?
EFF. -
Edman, M., Syverson, P. (2009).
As-Awareness in Tor Path Selection.
ACM CCS.
4.4 Traffic-Correlation Attacks & Global Adversaries
Section titled “4.4 Traffic-Correlation Attacks & Global Adversaries”-
Murdoch, S. J., Zieliński, P. (2007).
Sampled Traffic Analysis Against Tor.
IEEE Security & Privacy. -
Johnson, A., et al. (2013).
Users Get Routed: Traffic Correlation on Tor.
ACM CCS. -
Feamster, N., Dingledine, R. (2004).
Location Diversity in Anonymity Networks.
WPES. -
Edman, M., Syverson, P. (2009).
As-Awareness in Tor Path Selection.
ACM CCS. -
Kwon, A., et al. (2017).
The Loopix Anonymity System.
USENIX Security. -
Tor Project — Threat Model Documentation.
https://spec.torproject.org
4.5 Cryptocurrency Mistakes That Lead to Identity Exposure
Section titled “4.5 Cryptocurrency Mistakes That Lead to Identity Exposure”-
Meiklejohn, S., et al. (2013).
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names.
USENIX Security Symposium. -
Androulaki, E., et al. (2013).
Evaluating User Privacy in Bitcoin.
FC (Financial Cryptography). -
Reid, F., Harrigan, M. (2013).
An Analysis of Anonymity in the Bitcoin System.
Security and Privacy in Social Networks. -
Kappos, G., et al. (2018).
An Empirical Analysis of Anonymity in Zcash.
USENIX Security. -
Biryukov, A., Khovratovich, D. (2017).
Deanonymization of Clients in Bitcoin P2P Network.
ACM CCS. -
Moser, M., Böhme, R., Breuker, D. (2014).
An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem.
eCrime Symposium.
4.6 Tor Over VPN vs VPN Over Tor — Mythology & Reality
Section titled “4.6 Tor Over VPN vs VPN Over Tor — Mythology & Reality”-
Tor Project — FAQ: Tips on Staying Anonymous.
https://support.torproject.org -
Dingledine, R., et al. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security. -
Murdoch, S. J., Zieliński, P. (2007).
Sampled Traffic Analysis Against Tor.
IEEE Security & Privacy. -
Johnson, A., et al. (2013).
Users Get Routed: Traffic Correlation on Tor.
ACM CCS. -
Tor Project Blog & Threat Model Discussions.
-
Anderson, R. (2008).
Security Engineering.
Wiley.
4.7 Side-Channel Leaks in Onion Architectures
Section titled “4.7 Side-Channel Leaks in Onion Architectures”-
Murdoch, S. J. (2006).
Hot or Not: Revealing Hidden Services by Their Clock Skew.
IEEE Symposium on Security and Privacy. -
Murdoch, S. J., Danezis, G. (2005).
Low-Cost Traffic Analysis of Tor.
IEEE Security & Privacy. -
Backes, M., et al. (2012).
Statistical Disclosure Attacks against Tor.
ESORICS. -
Bauer, K., et al. (2007).
Low-Resource Routing Attacks Against Tor.
WPES. -
Goldberg, I. (2015).
Improving the Privacy and Security of Tor Hidden Services.
PETS. -
Tor Project — Design & Threat Model Documentation.
https://spec.torproject.org -
Anderson, R. (2008).
Security Engineering.
Wiley.
MODULE 5 — Threat Intelligence: Mapping Darknet Ecosystems
Section titled “MODULE 5 — Threat Intelligence: Mapping Darknet Ecosystems”5.1 How Security Firms Profile Darknet Activity
Section titled “5.1 How Security Firms Profile Darknet Activity”-
Décary-Hétu, D., Giommoni, L. (2017).
Do Police Crackdowns Disrupt Drug Cryptomarkets?
International Journal of Drug Policy. -
Christin, N. (2013).
Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
WWW Conference. -
Ablon, L., Libicki, M., Golay, A. (2014).
Markets for Cybercrime Tools and Stolen Data.
RAND Corporation. -
Holt, T. J., Smirnova, O., Chua, Y. T. (2016).
Examining the Structure, Organization, and Processes of Cybercrime Markets.
Deviant Behavior. -
Europol (IOCTA Reports).
Internet Organised Crime Threat Assessment. -
Krebs, B. (Investigative reporting on darknet markets).
5.2 OSINT Techniques Adapted for Anonymous Networks
Section titled “5.2 OSINT Techniques Adapted for Anonymous Networks”-
Christin, N. (2013).
Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
WWW Conference. -
Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy. -
Holt, T. J. (2013).
Exploring the Social Organisation and Structure of Dark Web Forums.
Global Crime. -
Ablon, L., Libicki, M., Golay, A. (2014).
Markets for Cybercrime Tools and Stolen Data.
RAND Corporation. -
Europol IOCTA Reports.
-
OSINT Framework (methodological reference).
5.3 Linguistic Profiling in Anonymous Forums
Section titled “5.3 Linguistic Profiling in Anonymous Forums”-
Narayanan, A., et al. (2012).
On the Feasibility of Internet-Scale Author Identification.
IEEE Symposium on Security and Privacy. -
Juola, P. (2006).
Authorship Attribution.
Foundations and Trends in Information Retrieval. -
Holt, T. J. (2013).
Exploring the Social Organisation and Structure of Dark Web Forums.
Global Crime. -
Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy. -
Grant, T., Baker, K. (2001).
Identifying Reliable, Valid Markers of Authorship.
Forensic Linguistics. -
Europol IOCTA Reports (linguistic and behavioral analysis sections).
5.4 Temporal Activity Analysis: Time-Zone Fingerprinting
Section titled “5.4 Temporal Activity Analysis: Time-Zone Fingerprinting”-
Christin, N. (2013).
Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
WWW Conference. -
Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy. -
Holt, T. J. (2013).
Exploring the Social Organisation and Structure of Dark Web Forums.
Global Crime. -
Ablon, L., Libicki, M., Golay, A. (2014).
Markets for Cybercrime Tools and Stolen Data.
RAND Corporation. -
Europol IOCTA Reports (temporal and behavioral analysis sections).
-
Anderson, R. (2008).
Security Engineering.
Wiley.
5.5 Cluster Mapping Hidden Service Families
Section titled “5.5 Cluster Mapping Hidden Service Families”-
Christin, N. (2013).
Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
WWW Conference. -
Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy. -
Ablon, L., Libicki, M., Golay, A. (2014).
Markets for Cybercrime Tools and Stolen Data.
RAND Corporation. -
Holt, T. J., Smirnova, O. (2016).
Examining the Structure of Cybercrime Markets.
Deviant Behavior. -
Europol IOCTA Reports (marketplace lineage and clustering sections).
-
Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science.
5.6 Darknet Scam Ecology: Identifying Pattern Families
Section titled “5.6 Darknet Scam Ecology: Identifying Pattern Families”-
Décary-Hétu, D., Giommoni, L. (2017).
Do Police Crackdowns Disrupt Drug Cryptomarkets?
International Journal of Drug Policy. -
Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science. -
Christin, N. (2013).
Traveling the Silk Road.
WWW Conference. -
Ablon, L., Libicki, M., Golay, A. (2014).
Markets for Cybercrime Tools and Stolen Data.
RAND Corporation. -
Holt, T. J., Smirnova, O. (2016).
Examining the Structure of Cybercrime Markets.
Deviant Behavior. -
Europol IOCTA Reports (scam typologies and marketplace fraud).
5.7 Life Cycle of Darknet Communities (Anthropological Overview)
Section titled “5.7 Life Cycle of Darknet Communities (Anthropological Overview)”-
Christin, N. (2013).
Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace.
WWW Conference. -
Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science. -
Décary-Hétu, D., Giommoni, L. (2017).
Do Police Crackdowns Disrupt Drug Cryptomarkets?
International Journal of Drug Policy. -
Holt, T. J. (2013).
Exploring the Social Organisation and Structure of Dark Web Forums.
Global Crime. -
Ablon, L., Libicki, M., Golay, A. (2014).
Markets for Cybercrime Tools and Stolen Data.
RAND Corporation. -
Anderson, R. (2008).
Security Engineering.
Wiley. -
Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso.
MODULE 6 — Governance, Law & Geopolitics
Section titled “MODULE 6 — Governance, Law & Geopolitics”6.1 The Global Jurisdiction Puzzle of Darknets
Section titled “6.1 The Global Jurisdiction Puzzle of Darknets”-
Brenner, S. (2011).
Cybercrime: Criminal Threats from Cyberspace.
Praeger. -
Goldsmith, J., Wu, T. (2006).
Who Controls the Internet?
Oxford University Press. -
Council of Europe.
Budapest Convention on Cybercrime. -
UNODC.
Comprehensive Study on Cybercrime. -
Lessig, L. (2006).
Code and Other Laws of Cyberspace.
Basic Books. -
Tor Project — Legal FAQ and Policy Documents.
6.2 International Law Enforcement Collaboration Mechanisms
Section titled “6.2 International Law Enforcement Collaboration Mechanisms”-
Council of Europe (2001).
Convention on Cybercrime (Budapest Convention). -
UNODC.
Comprehensive Study on Cybercrime. -
Brenner, S. (2011).
Cybercrime: Criminal Threats from Cyberspace.
Praeger. -
Europol — IOCTA Reports and JIT Documentation.
-
INTERPOL — Cybercrime Cooperation Frameworks.
-
Goldsmith, J., Wu, T. (2006).
Who Controls the Internet?
Oxford University Press.
6.3 Nation-State Response Models (China, Russia, US, EU)
Section titled “6.3 Nation-State Response Models (China, Russia, US, EU)”-
Goldsmith, J., Wu, T. (2006).
Who Controls the Internet?
Oxford University Press. -
Deibert, R. (2015).
Black Code: Surveillance, Privacy, and the Dark Side of the Internet.
Signal / McClelland & Stewart. -
UNODC.
Comprehensive Study on Cybercrime. -
Council of Europe.
Budapest Convention & Policy Commentary. -
European Union Charter of Fundamental Rights.
-
Chinese Cybersecurity Law & Cyberspace Administration Policy Papers.
-
Russian Information Security Doctrine.
-
US DOJ Cybercrime and Darknet Prosecution Reports.
6.4 Ethical Frameworks for Darknet Research
Section titled “6.4 Ethical Frameworks for Darknet Research”-
Belmont Report (1979).
Ethical Principles and Guidelines for the Protection of Human Subjects of Research. -
Association of Internet Researchers (AoIR).
Ethical Guidelines for Internet Research. -
Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy. -
Nissenbaum, H. (2010).
Privacy in Context.
Stanford University Press. -
Floridi, L., Taddeo, M. (2016).
What Is Data Ethics?
Philosophical Transactions of the Royal Society A. -
UNESCO.
Ethics of Artificial Intelligence and Data.
6.5 Surveillance Technology Arms Race
Section titled “6.5 Surveillance Technology Arms Race”-
Deibert, R. (2015).
Black Code: Surveillance, Privacy, and the Dark Side of the Internet.
Signal. -
Zuboff, S. (2019).
The Age of Surveillance Capitalism.
PublicAffairs. -
Greenwald, G. (2014).
No Place to Hide.
Metropolitan Books. -
Lyon, D. (2018).
The Culture of Surveillance.
Polity. -
UN Special Rapporteur on the Right to Privacy — Reports.
-
European Court of Human Rights — Surveillance Jurisprudence.
-
Anderson, R. (2008).
Security Engineering.
Wiley.
6.6 Censorship Circumvention Technology in Authoritarian Regimes
Section titled “6.6 Censorship Circumvention Technology in Authoritarian Regimes”-
Deibert, R., et al. (2010).
Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace.
MIT Press. -
Deibert, R. (2015).
Black Code.
Signal. -
Freedom House.
Freedom on the Net Reports. -
OpenNet Initiative.
Global Internet Filtering Studies. -
UN Special Rapporteur on Freedom of Expression — Reports.
-
Clayton, R., Murdoch, S. J., Watson, R. (2006).
Ignoring the Great Firewall of China.
PETS. -
Roberts, M. (2018).
Censored: Distraction and Diversion Inside China’s Great Firewall.
Princeton University Press.
6.7 Case Studies of Major Operations (Silk Road, Hansa, Alphabay) — Forensics Perspective Only
Section titled “6.7 Case Studies of Major Operations (Silk Road, Hansa, Alphabay) — Forensics Perspective Only”-
United States v. Ulbricht — Court Records and DOJ Filings.
-
Europol (2017).
Operation Bayonet / Hansa Takedown Reports. -
Christin, N. (2013).
Traveling the Silk Road.
WWW Conference. -
Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science. -
Décary-Hétu, D., Giommoni, L. (2017).
Do Police Crackdowns Disrupt Drug Cryptomarkets?
International Journal of Drug Policy. -
Europol IOCTA Reports (case study sections).
-
Anderson, R. (2008).
Security Engineering.
Wiley.
6.8 Implications for Human Rights & Whistleblowing
Section titled “6.8 Implications for Human Rights & Whistleblowing”-
United Nations.
Universal Declaration of Human Rights. -
International Covenant on Civil and Political Rights (ICCPR).
-
*European Court of Human Rights — Case Law on Source Protection.
-
UN Special Rapporteur on Freedom of Expression — Reports.
-
Reporters Without Borders (RSF).
World Press Freedom Index. -
Privacy International — Surveillance and Human Rights Reports.
-
Nissenbaum, H. (2010).
Privacy in Context.
Stanford University Press. -
Greenwald, G. (2014).
No Place to Hide.
Metropolitan Books.
MODULE 7 — Social Structures of the Dark Web
Section titled “MODULE 7 — Social Structures of the Dark Web”7.1 Darknet Community Sociology
Section titled “7.1 Darknet Community Sociology”-
Holt, T. J. (2013).
Exploring the Social Organisation and Structure of Dark Web Forums.
Global Crime. -
Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy. -
Christin, N. (2013).
Traveling the Silk Road.
WWW Conference. -
Goffman, E. (1959).
The Presentation of Self in Everyday Life.
Anchor Books. -
Durkheim, E. (1893).
The Division of Labor in Society.
(Applied conceptually). -
Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso.
7.2 Reputation Systems & Trustless Cooperation
Section titled “7.2 Reputation Systems & Trustless Cooperation”-
Christin, N. (2013).
Traveling the Silk Road.
WWW Conference. -
Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy. -
Akerlof, G. (1970).
The Market for Lemons.
Quarterly Journal of Economics. -
Axelrod, R. (1984).
The Evolution of Cooperation.
Basic Books. -
Resnick, P., et al. (2000).
Reputation Systems.
Communications of the ACM. -
Holt, T. J. (2013).
Exploring the Social Organisation of Dark Web Forums.
Global Crime.
7.3 Underground Ideology Ecosystems
Section titled “7.3 Underground Ideology Ecosystems”-
Borum, R. (2011).
Radicalization into Violent Extremism.
Journal of Strategic Security. -
Holt, T. J. (2013).
Exploring the Social Organisation of Dark Web Forums.
Global Crime. -
Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso. -
Sunstein, C. (2009).
Going to Extremes: How Like Minds Unite and Divide.
Oxford University Press. -
Neumann, P. (2013).
The Trouble with Radicalization.
International Affairs. -
Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science.
7.4 Tribal Identity Formation in Anonymous Groups
Section titled “7.4 Tribal Identity Formation in Anonymous Groups”-
Tajfel, H., Turner, J. (1979).
An Integrative Theory of Intergroup Conflict.
In The Social Psychology of Intergroup Relations. -
Holt, T. J. (2013).
Exploring the Social Organisation of Dark Web Forums.
Global Crime. -
Durkheim, E. (1912).
The Elementary Forms of Religious Life.
(Applied conceptually). -
Sunstein, C. (2009).
Going to Extremes.
Oxford University Press. -
Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso. -
Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science.
7.5 The Psychology of Hidden Social Networks
Section titled “7.5 The Psychology of Hidden Social Networks”-
Suler, J. (2004).
The Online Disinhibition Effect.
CyberPsychology & Behavior. -
Festinger, L. (1957).
A Theory of Cognitive Dissonance.
Stanford University Press. -
Bandura, A. (1999).
Moral Disengagement in the Perpetration of Inhumanities.
Personality and Social Psychology Review. -
Sunstein, C. (2009).
Going to Extremes.
Oxford University Press. -
Holt, T. J. (2013).
Exploring the Social Organisation of Dark Web Forums.
Global Crime. -
Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy.
7.6 The Linguistic Evolution of Darknet Jargon
Section titled “7.6 The Linguistic Evolution of Darknet Jargon”-
Labov, W. (1972).
Sociolinguistic Patterns.
University of Pennsylvania Press. -
Eckert, P. (2000).
Linguistic Variation as Social Practice.
Blackwell. -
Holt, T. J. (2013).
Exploring the Social Organisation of Dark Web Forums.
Global Crime. -
Androutsopoulos, J. (2014).
Mediatization and Sociolinguistic Change.
De Gruyter. -
Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso. -
Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science.
7.7 The Role of Humor, Memes & Symbolism in Hidden Cultures
Section titled “7.7 The Role of Humor, Memes & Symbolism in Hidden Cultures”-
Douglas, M. (1968).
The Social Control of Cognition: Some Factors in Joke Perception.
Man. -
Freud, S. (1905).
Jokes and Their Relation to the Unconscious.
(Psychological framing). -
Shifman, L. (2014).
Memes in Digital Culture.
MIT Press. -
Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso. -
Holt, T. J. (2013).
Exploring the Social Organisation of Dark Web Forums.
Global Crime. -
Durkheim, E. (1912).
The Elementary Forms of Religious Life.
(Symbolism applied conceptually).
7.8 “Nomadic Markets”: Why Markets Jump, Fork, Rebrand
Section titled “7.8 “Nomadic Markets”: Why Markets Jump, Fork, Rebrand”-
Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science. -
Christin, N. (2013).
Traveling the Silk Road.
WWW Conference. -
Décary-Hétu, D., Giommoni, L. (2017).
Do Police Crackdowns Disrupt Drug Cryptomarkets?
International Journal of Drug Policy. -
Holt, T. J. (2013).
Exploring the Social Organisation of Dark Web Forums.
Global Crime. -
Powell, W., DiMaggio, P. (1991).
The New Institutionalism in Organizational Analysis.
University of Chicago Press. -
Tilly, C. (2004).
Social Movements, 1768–2004.
Paradigm Publishers.
MODULE 8 — Hidden Economy (Legal Framework Only)
Section titled “MODULE 8 — Hidden Economy (Legal Framework Only)”8.1 Understanding Incentive Structures Without Focusing on Illicit Trades
Section titled “8.1 Understanding Incentive Structures Without Focusing on Illicit Trades”-
North, D. (1990).
Institutions, Institutional Change and Economic Performance.
Cambridge University Press. -
Axelrod, R. (1984).
The Evolution of Cooperation.
Basic Books. -
Akerlof, G. (1970).
The Market for Lemons.
Quarterly Journal of Economics. -
Christin, N. (2013).
Traveling the Silk Road.
WWW Conference. -
Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy. -
Williamson, O. (1985).
The Economic Institutions of Capitalism.
Free Press.
8.2 Cryptocurrencies as Socioeconomic Infrastructure
Section titled “8.2 Cryptocurrencies as Socioeconomic Infrastructure”-
Nakamoto, S. (2008).
Bitcoin: A Peer-to-Peer Electronic Cash System. -
Narayanan, A., et al. (2016).
Bitcoin and Cryptocurrency Technologies.
Princeton University Press. -
Böhme, R., et al. (2015).
Bitcoin: Economics, Technology, and Governance.
Journal of Economic Perspectives. -
Yermack, D. (2017).
Corporate Governance and Blockchains.
Review of Finance. -
Scott, B. (2016).
How Can Cryptocurrency and Blockchain Technology Play a Role in Building Social and Solidarity Finance?
UNRISD. -
North, D. (1990).
Institutions, Institutional Change and Economic Performance.
Cambridge University Press.
8.3 Privacy Coins: Monero, Zcash, and Their Scientific Designs
Section titled “8.3 Privacy Coins: Monero, Zcash, and Their Scientific Designs”-
Nakamoto, S. (2008).
Bitcoin: A Peer-to-Peer Electronic Cash System. -
van Saberhagen, N. (2013).
CryptoNote v2.0. -
Miers, I., et al. (2013).
Zerocoin: Anonymous Distributed E-Cash from Bitcoin.
IEEE Symposium on Security and Privacy. -
Ben-Sasson, E., et al. (2014).
SNARKs for C: Verifying Program Executions Succinctly.
Cryptology ePrint Archive. -
Böhme, R., et al. (2015).
Bitcoin: Economics, Technology, and Governance.
Journal of Economic Perspectives. -
Kahn Academy / Princeton Cryptocurrency Course Materials (privacy sections).
8.4 Mixing, Tumbling & Decoy Transaction Theory
Section titled “8.4 Mixing, Tumbling & Decoy Transaction Theory”-
Chaum, D. (1981).
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms.
Communications of the ACM. -
Serjantov, A., Danezis, G. (2003).
Towards an Information-Theoretic Metric for Anonymity.
PETS. -
Bonneau, J., et al. (2015).
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
IEEE Symposium on Security and Privacy. -
Meiklejohn, S., et al. (2013).
A Fistful of Bitcoins.
IMC. -
Narayanan, A., et al. (2016).
Bitcoin and Cryptocurrency Technologies.
Princeton University Press. -
Danezis, G., et al. (2010).
Statistical Disclosure Control for Anonymous Communications.
PETS.
8.5 Reputation-Based Economic Systems in Anonymous Markets
Section titled “8.5 Reputation-Based Economic Systems in Anonymous Markets”-
Akerlof, G. (1970).
The Market for Lemons.
Quarterly Journal of Economics. -
Resnick, P., et al. (2000).
Reputation Systems.
Communications of the ACM. -
Axelrod, R. (1984).
The Evolution of Cooperation.
Basic Books. -
Christin, N. (2013).
Traveling the Silk Road.
WWW Conference. -
Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy. -
Williamson, O. (1985).
The Economic Institutions of Capitalism.
Free Press.
8.6 Logistics Models of Hidden Online Ecosystems
Section titled “8.6 Logistics Models of Hidden Online Ecosystems”-
Powell, W., DiMaggio, P. (1991).
The New Institutionalism in Organizational Analysis.
University of Chicago Press. -
Perrow, C. (1984).
Normal Accidents.
Basic Books. -
Taleb, N. N. (2012).
Antifragile.
Random House. -
Christin, N. (2013).
Traveling the Silk Road.
WWW Conference. -
Décary-Hétu, D., et al. (2016).
Analyzing Darknet Markets.
International Journal of Drug Policy. -
Weick, K. (1995).
Sensemaking in Organizations.
Sage.
8.7 How Researchers Analyze Market Data Without Participating
Section titled “8.7 How Researchers Analyze Market Data Without Participating”-
Christin, N. (2013).
Traveling the Silk Road.
WWW Conference. -
Décary-Hétu, D., Aldridge, J. (2015).
Sifting Through the Net: Monitoring Darknet Markets.
European Review of Organised Crime. -
Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science. -
Buchanan, E., Zimmer, M. (2016).
Internet Research Ethics.
Stanford Encyclopedia of Philosophy. -
Association of Internet Researchers (AoIR).
Ethical Guidelines for Internet Research. -
Narayanan, A., et al. (2016).
Bitcoin and Cryptocurrency Technologies.
Princeton University Press.
MODULE 9 — Forensic Science & Digital Investigation on Darknets
Section titled “MODULE 9 — Forensic Science & Digital Investigation on Darknets”9.1 Tor Forensics: What Can Actually Be Recovered
Section titled “9.1 Tor Forensics: What Can Actually Be Recovered”-
Tor Project.
Tor Design Paper & Threat Model. -
Murdoch, S. J., Danezis, G. (2005).
Low-Cost Traffic Analysis of Tor.
IEEE Symposium on Security and Privacy. -
Johnson, A., et al. (2013).
Users Get Routed: Traffic Correlation on Tor.
CCS. -
Anderson, R. (2008).
Security Engineering.
Wiley. -
US DOJ Court Filings — Expert Testimony on Tor (various cases).
-
ENISA Reports on Anonymity Networks.
9.2 Blockchain Forensics & Behavioral Clustering
Section titled “9.2 Blockchain Forensics & Behavioral Clustering”-
Meiklejohn, S., et al. (2013).
A Fistful of Bitcoins.
Internet Measurement Conference (IMC). -
Ron, D., Shamir, A. (2013).
Quantitative Analysis of the Full Bitcoin Transaction Graph.
Financial Cryptography. -
Androulaki, E., et al. (2013).
Evaluating User Privacy in Bitcoin.
Financial Cryptography. -
Narayanan, A., et al. (2016).
Bitcoin and Cryptocurrency Technologies.
Princeton University Press. -
Bonneau, J., et al. (2015).
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
IEEE S&P. -
US DOJ & Europol — Blockchain Forensic Expert Testimony (multiple cases).
9.3 Memory Analysis Techniques in Hidden Service Hosts
Section titled “9.3 Memory Analysis Techniques in Hidden Service Hosts”-
Ligh, M., et al. (2014).
The Art of Memory Forensics.
Wiley. -
Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press. -
Schatz, B., Cohen, M. (2017).
Digital Forensics in the Cloud.
Elsevier. -
ENISA.
Memory Forensics and Volatile Data Analysis Reports. -
Anderson, R. (2008).
Security Engineering.
Wiley. -
US DOJ Expert Testimony — Volatile Memory Evidence (multiple cases).
9.4 Host Fingerprinting Through Subtle Misconfigurations
Section titled “9.4 Host Fingerprinting Through Subtle Misconfigurations”-
Zalewski, M. (2012).
Silence on the Wire.
No Starch Press. -
Anderson, R. (2008).
Security Engineering.
Wiley. -
Paxson, V. (1999).
Bro: A System for Detecting Network Intruders.
Computer Networks. -
Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press. -
ENISA.
Technical Guidelines on Digital Forensics. -
US & EU Court Filings — Infrastructure Correlation Evidence (various cases).
9.5 Metadata Leaks in Hosting Environments
Section titled “9.5 Metadata Leaks in Hosting Environments”-
Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press. -
Zuboff, S. (2019).
The Age of Surveillance Capitalism.
PublicAffairs. (Metadata theory framing) -
ENISA.
Cloud Forensics and Metadata Analysis Reports. -
Behl, A., Behl, K. (2017).
Cyberwar and Information Warfare.
Oxford University Press. -
Anderson, R. (2008).
Security Engineering.
Wiley. -
US & EU Court Decisions referencing metadata evidence (various).
9.6 Detecting Botnets in Hidden Networks
Section titled “9.6 Detecting Botnets in Hidden Networks”-
Sanatinia, A., Noubir, G. (2015).
On the Feasibility of Botnet Command and Control Using Tor.
USENIX Workshop on Offensive Technologies (WOOT). -
Biryukov, A., Pustogarov, I. (2012).
Tor-based Botnets: Analysis and Countermeasures.
NDSS. -
Afroz, S., et al. (2014).
Doppelgänger Botnets: Exploring the Ecosystem.
USENIX Security. -
Anderson, R. (2008).
Security Engineering.
Wiley. -
ENISA.
Botnet Threat Assessment Reports. -
Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press.
9.7 Correlating Hidden Service Behavior With Clearnet Artifacts
Section titled “9.7 Correlating Hidden Service Behavior With Clearnet Artifacts”-
Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press. -
Van Wegberg, R., et al. (2018).
The Lifecycle of Cryptomarkets.
Crime Science. -
Narayanan, A., et al. (2016).
Bitcoin and Cryptocurrency Technologies.
Princeton University Press. -
Buchanan, E., Zimmer, M. (2016).
Internet Research Ethics.
Stanford Encyclopedia of Philosophy. -
ENISA.
Digital Forensics Correlation Techniques Reports. -
US & EU Court Opinions referencing timeline and behavioral correlation evidence.
9.8 Intelligence Linking Through Linguistic Stylometry
Section titled “9.8 Intelligence Linking Through Linguistic Stylometry”-
Stamatatos, E. (2009).
A Survey of Modern Authorship Attribution Methods.
Journal of the American Society for Information Science and Technology. -
Juola, P. (2006).
Authorship Attribution.
Foundations and Trends in Information Retrieval. -
Koppel, M., Schler, J., Argamon, S. (2009).
Computational Methods in Authorship Attribution.
Journal of the American Society for Information Science. -
Grant, T. (2010).
Textual Analysis in Forensic Linguistics.
International Journal of Speech, Language & the Law. -
Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press. -
ENISA.
Cyber Forensics and Behavioral Analysis Reports.
MODULE 10 — Infrastructure Engineering for Secure Research
Section titled “MODULE 10 — Infrastructure Engineering for Secure Research”10.1 Building a Legally Compliant Research Workstation
Section titled “10.1 Building a Legally Compliant Research Workstation”-
Association of Internet Researchers (AoIR).
Ethical Guidelines for Internet Research. -
Buchanan, E., Zimmer, M. (2016).
Internet Research Ethics.
Stanford Encyclopedia of Philosophy. -
Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press. -
ENISA.
Good Practices for Security Research. -
OECD (2015).
Digital Security Risk Management for Economic and Social Prosperity.
10.2 Air-gapped Architectures
Section titled “10.2 Air-gapped Architectures”-
NIST SP 800-53 & SP 800-171
System and Information Integrity & Isolation Controls. -
ENISA.
Good Practices for Isolated and High-Security Systems. -
Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press. -
Anderson, R. (2008).
Security Engineering.
Wiley. -
OECD (2015).
Digital Security Risk Management.
10.3 Hardware Fingerprint Minimization
Section titled “10.3 Hardware Fingerprint Minimization”-
Anderson, R. (2008).
Security Engineering.
Wiley. -
Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press. -
NIST SP 800-53.
System Integrity and Risk Management Controls. -
ENISA.
Security-by-Design and Risk Reduction Guidelines. -
Saltzer, J., Schroeder, M. (1975).
The Protection of Information in Computer Systems.
IEEE.
10.4 Virtualization, Sandbox Layers & Network Compartmentalization
Section titled “10.4 Virtualization, Sandbox Layers & Network Compartmentalization”-
Saltzer, J., Schroeder, M. (1975).
The Protection of Information in Computer Systems.
IEEE. -
Anderson, R. (2008).
Security Engineering.
Wiley. -
NIST SP 800-53.
System and Communications Protection. -
ENISA.
Virtualisation Security and Best Practices. -
Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press.
10.5 Secure Environment Logging Without Identity Exposure
Section titled “10.5 Secure Environment Logging Without Identity Exposure”-
NIST SP 800-92.
Guide to Computer Security Log Management. -
ISO/IEC 27001 & 27002.
Information Security Logging and Monitoring Controls. -
Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press. -
OECD (2013).
Privacy Guidelines & Purpose Limitation Principles. -
Association of Internet Researchers (AoIR).
Ethical Guidelines for Internet Research.
10.6 How Researchers Prevent Contamination of Personal Identity
Section titled “10.6 How Researchers Prevent Contamination of Personal Identity”-
Association of Internet Researchers (AoIR).
Ethical Guidelines for Internet Research. -
Buchanan, E., Zimmer, M. (2016).
Internet Research Ethics.
Stanford Encyclopedia of Philosophy. -
Casey, E. (2011).
Digital Evidence and Computer Crime.
Academic Press. -
OECD (2015).
Digital Security Risk Management. -
ISO/IEC 27001.
Information Security Management Systems.
10.7 Ethical Honeypots: Structure, Purpose, Limitations
Section titled “10.7 Ethical Honeypots: Structure, Purpose, Limitations”-
Spitzner, L. (2003).
Honeypots: Tracking Hackers.
Addison-Wesley. -
ENISA.
Honeypots and Honeynets: Security and Legal Considerations. -
Bishop, M., et al. (2011).
Legal and Ethical Issues in Honeypot Deployment.
IEEE Security & Privacy. -
Association of Internet Researchers (AoIR).
Ethical Guidelines for Internet Research. -
OECD (2015).
Digital Security Risk Management.
MODULE 11 — Anthropology of Hidden Subcultures
Section titled “MODULE 11 — Anthropology of Hidden Subcultures”11.1 Archetypes of Darknet Actors (Non-criminological, sociological)
Section titled “11.1 Archetypes of Darknet Actors (Non-criminological, sociological)”-
Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso. -
Nissenbaum, H. (2010).
Privacy in Context.
Stanford University Press. -
Turkle, S. (1995).
Life on the Screen.
MIT Press. -
boyd, d. (2014).
It’s Complicated: The Social Lives of Networked Teens.
Yale University Press. -
Geertz, C. (1973).
The Interpretation of Cultures.
Basic Books.
11.2 Insider vs Outsider Dynamics
Section titled “11.2 Insider vs Outsider Dynamics”-
Goffman, E. (1959).
The Presentation of Self in Everyday Life.
Anchor Books. -
Geertz, C. (1973).
The Interpretation of Cultures.
Basic Books. -
Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso. -
Bourdieu, P. (1984).
Distinction: A Social Critique of the Judgement of Taste.
Harvard University Press. -
boyd, d. (2014).
It’s Complicated.
Yale University Press.
11.3 Rituals, Initiation, Status Symbols
Section titled “11.3 Rituals, Initiation, Status Symbols”-
Turner, V. (1969).
The Ritual Process.
Aldine. -
Bourdieu, P. (1986).
The Forms of Capital.
Greenwood. -
Geertz, C. (1973).
The Interpretation of Cultures.
Basic Books. -
Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso. -
Goffman, E. (1967).
Interaction Ritual.
Anchor Books.
11.4 The Semiotics (Sign Systems) of Darknet Communities
Section titled “11.4 The Semiotics (Sign Systems) of Darknet Communities”-
Geertz, C. (1973).
The Interpretation of Cultures.
Basic Books. -
Saussure, F. de (1916).
Course in General Linguistics. -
Barthes, R. (1972).
Mythologies.
Hill and Wang. -
Eco, U. (1976).
A Theory of Semiotics.
Indiana University Press. -
Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso.
11.5 Humor, Trolling, and Identity Masking
Section titled “11.5 Humor, Trolling, and Identity Masking”-
Bakhtin, M. (1968).
Rabelais and His World.
MIT Press. -
Goffman, E. (1959).
The Presentation of Self in Everyday Life.
Anchor Books. -
Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso. -
Phillips, W. (2015).
This Is Why We Can’t Have Nice Things.
MIT Press. -
Douglas, M. (1968).
The Social Control of Cognition.
Routledge.
11.6 How Online Anonymity Shapes Morality
Section titled “11.6 How Online Anonymity Shapes Morality”-
Zimbardo, P. (1969).
The Human Choice: Individuation, Reason, and Order vs Deindividuation.
Nebraska Symposium on Motivation. -
Suler, J. (2004).
The Online Disinhibition Effect.
CyberPsychology & Behavior. -
Bauman, Z. (1993).
Postmodern Ethics.
Blackwell. -
Turkle, S. (1995).
Life on the Screen.
MIT Press. -
Durkheim, É. (1893).
The Division of Labor in Society.
11.7 Comparative Study: Deep-Web Communities vs Regular Internet Subcultures
Section titled “11.7 Comparative Study: Deep-Web Communities vs Regular Internet Subcultures”-
boyd, d. (2014).
It’s Complicated: The Social Lives of Networked Teens.
Yale University Press. -
Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy.
Verso. -
Turkle, S. (1995).
Life on the Screen.
MIT Press. -
Geertz, C. (1973).
The Interpretation of Cultures.
Basic Books. -
Durkheim, É. (1895).
The Rules of Sociological Method.
MODULE 12 — Content Delivery & Hidden Service Mechanics
Section titled “MODULE 12 — Content Delivery & Hidden Service Mechanics”12.1 Data Caching in Anonymous Networks
Section titled “12.1 Data Caching in Anonymous Networks”-
Tor Project.
Tor Design Paper & Threat Model. -
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router.
USENIX Security Symposium. -
Goldberg, I. (2002).
Privacy-Enhancing Technologies.
Springer. -
Anderson, R. (2008).
Security Engineering.
Wiley. -
ENISA.
Anonymity Networks and Traffic Analysis Resistance.
12.2 Why Darknet Sites Are Slow: Root Causes
Section titled “12.2 Why Darknet Sites Are Slow: Root Causes”-
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router. USENIX. -
Tor Project.
Tor Network Performance Metrics & Design Documentation. -
Anderson, R. (2008).
Security Engineering. Wiley. -
Goldberg, I., et al. (2012).
Privacy-Enhancing Technologies. Springer. -
ENISA.
Traffic Analysis and Anonymity Networks.
12.3 The Architecture of Onion Mirrors
Section titled “12.3 The Architecture of Onion Mirrors”-
Tor Project.
Onion Services Design Documentation. -
Dingledine, R., Syverson, P. (2004).
Tor Design and Threat Model. USENIX. -
Anderson, R. (2008).
Security Engineering. Wiley. -
ENISA.
Resilience and Availability in Anonymous Networks. -
Goldberg, I. (2010).
Privacy-Enhancing Technologies. Springer.
12.4 Captchas & Abuse Prevention Under Anonymity Constraints
Section titled “12.4 Captchas & Abuse Prevention Under Anonymity Constraints”-
Tor Project.
Tor Abuse Mitigation and Network Health Documentation. -
Biryukov, A., et al. (2014).
Content and Popularity Analysis in Tor Hidden Services.
NDSS Symposium. -
Dwork, C., Naor, M. (1992).
Pricing via Processing or Combatting Junk Mail.
CRYPTO. -
Goldberg, I. (2002).
Privacy-Enhancing Technologies. Springer. -
ENISA.
Abuse and Misuse in Anonymity Networks.
12.5 Darknet Search Engines: How They Crawl Hidden Services
Section titled “12.5 Darknet Search Engines: How They Crawl Hidden Services”-
Biryukov, A., et al. (2014).
Content and Popularity Analysis of Tor Hidden Services. NDSS. -
Tor Project.
Onion Services and Discovery Documentation. -
Anderson, R. (2008).
Security Engineering. Wiley. -
Goldberg, I. (2002).
Privacy-Enhancing Technologies. Springer. -
ENISA.
Anonymity Networks: Discovery and Metadata Risks.
12.6 Protocol-Level Challenges of Hosting Anonymous Media
Section titled “12.6 Protocol-Level Challenges of Hosting Anonymous Media”-
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router. USENIX. -
Tor Project.
Tor Network Performance and Design Documentation. -
Anderson, R. (2008).
Security Engineering. Wiley. -
Goldberg, I. (2010).
Privacy-Enhancing Technologies. Springer. -
ENISA.
Traffic Analysis and Bandwidth Abuse in Anonymity Networks.
12.7 The Rise of Decentralized Hidden Host Networks
Section titled “12.7 The Rise of Decentralized Hidden Host Networks”-
Anderson, R. (2008).
Security Engineering. Wiley. -
Dingledine, R., Syverson, P.
Tor Design and Threat Model. -
Stoica, I., et al. (2001).
Chord: A Scalable Peer-to-Peer Lookup Service. SIGCOMM. -
Goldberg, I. (2010).
Privacy-Enhancing Technologies. Springer. -
ENISA.
Decentralisation, Resilience, and Anonymity Networks.
MODULE 13 — Metadata Science
Section titled “MODULE 13 — Metadata Science”13.1 The Science of Metadata in Anonymous Systems
Section titled “13.1 The Science of Metadata in Anonymous Systems”-
Mayer, J., & Mitchell, J. (2012).
Third-Party Web Tracking: Policy and Technology. IEEE. -
Dingledine, R., Mathewson, N., Syverson, P. (2004).
Tor: The Second-Generation Onion Router. USENIX. -
Narayanan, A., Shmatikov, V. (2009).
De-anonymizing Social Networks. IEEE Symposium on Security & Privacy. -
Greenwald, G. (2014).
No Place to Hide. Metropolitan Books. -
ENISA.
Metadata and Traffic Analysis Risks in Anonymity Networks.
13.2 Behavioral Metadata: Timing, Frequency, Patterns
Section titled “13.2 Behavioral Metadata: Timing, Frequency, Patterns”-
Narayanan, A., & Shmatikov, V. (2009).
De-anonymizing Social Networks. IEEE Symposium on Security & Privacy. -
Danezis, G., & Clayton, R. (2006).
Introducing Traffic Analysis. Digital Privacy. -
Suler, J. (2004).
The Online Disinhibition Effect. CyberPsychology & Behavior. -
ENISA.
Behavioral and Traffic Analysis in Anonymity Networks. -
Barabási, A.-L. (2010).
Bursts: The Hidden Pattern Behind Everything We Do. Penguin.
13.3 Machine Learning Models for Activity Typing
Section titled “13.3 Machine Learning Models for Activity Typing”-
Herrmann, D., Wendolsky, R., & Federrath, H. (2009).
Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies. CCS. -
Panchenko, A., et al. (2016).
Website Fingerprinting at Internet Scale. NDSS. -
Danezis, G. (2010).
Traffic Analysis of the Tor Network. PETS. -
Bishop, C. M. (2006).
Pattern Recognition and Machine Learning. Springer. -
ENISA.
Machine Learning and Traffic Analysis in Privacy Networks.
13.4 Ethical Boundaries for Metadata Collection
Section titled “13.4 Ethical Boundaries for Metadata Collection”-
Belmont Report (1979).
Ethical Principles and Guidelines for the Protection of Human Subjects of Research. -
Narayanan, A., & Shmatikov, V. (2009).
De-anonymizing Social Networks. IEEE S&P. -
Ohm, P. (2010).
Broken Promises of Privacy. UCLA Law Review. -
ENISA.
Ethical Considerations of Metadata and Traffic Analysis. -
Floridi, L., & Taddeo, M. (2016).
What Is Data Ethics? Philosophical Transactions of the Royal Society A.
13.5 Advanced Fingerprinting Methods in Academic Literature
Section titled “13.5 Advanced Fingerprinting Methods in Academic Literature”-
Herrmann, D., Wendolsky, R., & Federrath, H. (2009).
Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies. CCS. -
Panchenko, A., et al. (2016).
Website Fingerprinting at Internet Scale. NDSS. -
Juarez, M., et al. (2014).
A Critical Evaluation of Website Fingerprinting Attacks. CCS. -
Danezis, G. (2010).
Traffic Analysis of the Tor Network. PETS. -
Tor Project.
Research on Traffic Analysis Resistance.
13.6 Hidden Markov Models for Traffic Flow Analysis
Section titled “13.6 Hidden Markov Models for Traffic Flow Analysis”-
Rabiner, L. R. (1989).
A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proceedings of the IEEE. -
Danezis, G., & Clayton, R. (2006).
Introducing Traffic Analysis. Digital Privacy. -
Shalizi, C. R., & Crutchfield, J. P. (2001).
Computational Mechanics: Pattern and Prediction. Journal of Statistical Physics. -
Bishop, C. M. (2006).
Pattern Recognition and Machine Learning. Springer. -
ENISA.
Sequential Traffic Analysis Models in Anonymity Networks.
13.7 Noise Injection Models & Anti-Fingerprinting Techniques
Section titled “13.7 Noise Injection Models & Anti-Fingerprinting Techniques”-
Danezis, G., & Clayton, R. (2006).
Route Fingerprinting in Anonymous Communications. PETS. -
Juarez, M., et al. (2014).
Toward an Efficient Website Fingerprinting Defense. ESORICS. -
Shmatikov, V., & Wang, M.-H. (2006).
Timing Analysis in Low-Latency Mix Networks. ESORICS. -
Bishop, C. M. (2006).
Pattern Recognition and Machine Learning. Springer. -
ENISA.
Traffic Obfuscation and Noise-Based Privacy Defenses.
MODULE 14 — The Future of Darknets
Section titled “MODULE 14 — The Future of Darknets”14.1 Post-Quantum Darknet Proposals
Section titled “14.1 Post-Quantum Darknet Proposals”-
Bernstein, D. J., Buchmann, J., Dahmen, E. (2009).
Post-Quantum Cryptography. Springer. -
NIST.
Post-Quantum Cryptography Standardization Project. -
Alagic, G., et al. (2020).
Status Report on the Second Round of the NIST PQC Process. -
Tor Project Research Team.
Cryptographic Agility and Post-Quantum Considerations. -
Mosca, M. (2018).
Cybersecurity in an Era with Quantum Computers. IEEE Security & Privacy.
14.2 AI-Assisted Privacy Tools
Section titled “14.2 AI-Assisted Privacy Tools”-
Juarez, M., et al. (2014).
Toward an Efficient Website Fingerprinting Defense. ESORICS. -
Abadi, M., et al. (2016).
Deep Learning with Differential Privacy. CCS. -
Papernot, N., et al. (2017).
Semi-Supervised Knowledge Transfer for Deep Learning from Private Training Data. ICLR. -
Tor Project Research Team.
Machine Learning and Anonymity Defense Research. -
ENISA.
Artificial Intelligence and Privacy-Enhancing Technologies.
14.3 Meritocratic & DAO-Style Hidden Communities
Section titled “14.3 Meritocratic & DAO-Style Hidden Communities”-
Ostrom, E. (1990).
Governing the Commons. Cambridge University Press. -
Buterin, V. (2014).
DAOs, DACs, DAs and More. Ethereum Blog. -
Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy. Verso. -
De Filippi, P., & Wright, A. (2018).
Blockchain and the Law. Harvard University Press. -
ENISA.
Decentralized Governance and Trust Models.
14.4 Darknets in Space: Mesh Networks in LEO Satellite Constellations
Section titled “14.4 Darknets in Space: Mesh Networks in LEO Satellite Constellations”-
Handley, M. (2018).
Delay is Not an Option: Low Latency Routing in Space. ACM SIGCOMM. -
Bhattacherjee, D., et al. (2020).
Gearing Up for the 21st Century Space Race. HotNets. -
Kassing, S., et al. (2022).
Routing in Mega-Constellations. IEEE/ACM TON. -
Cerf, V., et al. (2015).
Delay-Tolerant Networking Architecture. RFC 4838. -
ENISA.
Satellite Communications and Network Security.
14.5 Decentralized Identity & Anonymous Credentials
Section titled “14.5 Decentralized Identity & Anonymous Credentials”-
Chaum, D. (1985).
Security Without Identification: Transaction Systems to Make Big Brother Obsolete. CACM. -
Camenisch, J., & Lysyanskaya, A. (2001).
An Efficient System for Non-transferable Anonymous Credentials. EUROCRYPT. -
Boneh, D., et al. (2019).
Zexe: Enabling Decentralized Private Computation. IEEE S&P. -
W3C.
Decentralized Identifiers (DIDs) Specification. -
ENISA.
Privacy-Preserving Identity Management Systems.
14.6 Next-Generation Mixnets
Section titled “14.6 Next-Generation Mixnets”-
Chaum, D. (1981).
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. CACM. -
Danezis, G., & Sassaman, L. (2003).
Heartbeat Traffic to Counter (n−1) Attacks. PETS. -
Danezis, G., et al. (2015).
Sphinx: A Compact and Provably Secure Mix Format. IEEE S&P. -
Loopix Project.
Mix Network Design for Low-Latency Messaging. -
ENISA.
Mix Networks and Traffic Analysis Resistance.
14.7 Predictions for the 2030–2040 Hidden Internet Landscape
Section titled “14.7 Predictions for the 2030–2040 Hidden Internet Landscape”-
Dingledine, R., et al.
Tor: Design, Threat Models, and Future Directions. -
Narayanan, A., et al. (2020).
Limits of Privacy and the Future of Anonymity. Princeton CITP. -
Green & Smith (2016).
The Cryptopals Crypto Challenges and Real-World Cryptography. -
ENISA.
Future Trends in Privacy-Enhancing Technologies. -
Solove, D. J. (2021).
Privacy and Power. Harvard Law Review.
MODULE 15 — The Philosophy & Ethics of Hidden Systems
Section titled “MODULE 15 — The Philosophy & Ethics of Hidden Systems”15.1 The Paradox of Anonymity: Freedom vs Abuse
Section titled “15.1 The Paradox of Anonymity: Freedom vs Abuse”-
United Nations (1948).
Universal Declaration of Human Rights, Article 12. -
United Nations (1966).
International Covenant on Civil and Political Rights, Article 17. -
European Court of Human Rights.
Article 8 Jurisprudence. -
Westin, A. F. (1967).
Privacy and Freedom. Atheneum. -
Solove, D. J. (2008).
Understanding Privacy. Harvard University Press.
15.2 Privacy as a Human Right
Section titled “15.2 Privacy as a Human Right”-
United Nations (1948).
Universal Declaration of Human Rights, Article 12. -
United Nations (1966).
International Covenant on Civil and Political Rights, Article 17. -
European Court of Human Rights.
Article 8 Jurisprudence. -
Westin, A. F. (1967).
Privacy and Freedom. Atheneum. -
Solove, D. J. (2008).
Understanding Privacy. Harvard University Press.
15.3 The Moral Structures of Non-Attributed Societies
Section titled “15.3 The Moral Structures of Non-Attributed Societies”-
Zimbardo, P. (1969).
The Human Choice: Individuation, Reason, and Order vs. Deindividuation, Impulse, and Chaos. -
Suler, J. (2004).
The Online Disinhibition Effect. CyberPsychology & Behavior. -
Bandura, A. (1999).
Moral Disengagement in the Perpetration of Inhumanities. Personality and Social Psychology Review. -
Kahneman, D. (2011).
Thinking, Fast and Slow. Farrar, Straus and Giroux. -
Nissenbaum, H. (2010).
Privacy in Context. Stanford University Press.
15.4 How Hidden Systems Shape Human Behavior
Section titled “15.4 How Hidden Systems Shape Human Behavior”-
Arendt, H. (1958).
The Human Condition. University of Chicago Press. -
Arendt, H. (1971).
The Origins of Totalitarianism. Harcourt Brace. -
Foucault, M. (1975).
Discipline and Punish. Vintage Books. -
Ellul, J. (1964).
The Technological Society. Vintage Books. -
Lyon, D. (2007).
Surveillance Studies. Polity Press.
15.5 Philosophers on Secrecy (Arendt, Foucault, Ellul)
Section titled “15.5 Philosophers on Secrecy (Arendt, Foucault, Ellul)”-
Belmont Report (1979).
Ethical Principles and Guidelines for the Protection of Human Subjects of Research. -
Association of Internet Researchers (AoIR).
Ethical Decision-Making and Internet Research. -
Zuboff, S. (2019).
The Age of Surveillance Capitalism. PublicAffairs. -
ENISA.
Ethics in Cybersecurity Research. -
Greenwald, G. (2014).
No Place to Hide. Metropolitan Books.
15.6 Ethical Darknet Journalism & Research Methodologies
Section titled “15.6 Ethical Darknet Journalism & Research Methodologies”-
Arendt, H. (1958).
The Human Condition. University of Chicago Press. -
Nissenbaum, H. (2010).
Privacy in Context. Stanford University Press. -
Solove, D. J. (2021).
Privacy and Power. Harvard Law Review. -
Floridi, L. (2014).
The Ethics of Information. Oxford University Press. -
ENISA.
Principles for Privacy-Enhancing Technologies.
15.7 Building a Better Anonymous Internet
Section titled “15.7 Building a Better Anonymous Internet”-
Creswell, J. W. (2014).
Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. Sage. -
Yin, R. K. (2018).
Case Study Research and Applications. Sage. -
Floridi, L. (2014).
The Ethics of Information. Oxford University Press. -
ENISA.
Research Ethics in Cybersecurity and Privacy Studies. -
Association of Internet Researchers (AoIR).
Ethical Decision-Making and Internet Research.
MODULE 16 — Capstone Research Projects
Section titled “MODULE 16 — Capstone Research Projects”16.1 Multidisciplinary Analysis Project
Section titled “16.1 Multidisciplinary Analysis Project”-
Danezis, G., & Diaz, C. (2008).
A Survey of Anonymous Communication Channels. Technical Report, KU Leuven. -
Murdoch, S. J., & Danezis, G. (2005).
Low-Cost Traffic Analysis of Tor. IEEE Symposium on Security & Privacy. -
Shalizi, C. R. (2006).
Methods and Techniques of Complex Systems Science. Santa Fe Institute. -
Creswell, J. W. (2014).
Research Design. Sage Publications. -
ENISA.
Ethical Experimentation in Cybersecurity Research.
16.2 Technical Research: Build a Model Darknet Simulator
Section titled “16.2 Technical Research: Build a Model Darknet Simulator”-
Geertz, C. (1973).
The Interpretation of Cultures. Basic Books. -
Hammersley, M., & Atkinson, P. (2007).
Ethnography: Principles in Practice. Routledge. -
Association of Internet Researchers (AoIR).
Ethical Decision-Making and Internet Research. -
Coleman, G. (2014).
Hacker, Hoaxer, Whistleblower, Spy. Verso. -
ENISA.
Ethics in Sociotechnical Security Research.
16.3 Sociological Field-Study Report (Non-participatory)
Section titled “16.3 Sociological Field-Study Report (Non-participatory)”-
Tufte, E. R. (2001).
The Visual Display of Quantitative Information. Graphics Press. -
Cairo, A. (2016).
The Truthful Art. New Riders. -
Munzner, T. (2014).
Visualization Analysis and Design. CRC Press. -
Narayanan, A., & Shmatikov, V. (2009).
De-anonymizing Social Networks. IEEE S&P. -
ENISA.
Ethical Visualization of Security and Privacy Data.
16.4 Metadata Visualization Dashboard
Section titled “16.4 Metadata Visualization Dashboard”-
Belmont Report (1979).
Ethical Principles and Guidelines for the Protection of Human Subjects of Research. -
Floridi, L. (2014).
The Ethics of Information. Oxford University Press. -
Association of Internet Researchers (AoIR).
Ethical Decision-Making and Internet Research. -
ENISA.
Research Ethics and Secure Methodologies in Cybersecurity. -
Creswell, J. W. (2014).
Research Design. Sage Publications.
16.5 Secure Research Methodology Paper
Section titled “16.5 Secure Research Methodology Paper”-
National Academies of Sciences (2017).
Dual Use Research of Concern in the Life Sciences. -
ENISA.
Responsible Disclosure and Publication in Security Research. -
Floridi, L., & Taddeo, M. (2016).
What Is Data Ethics? Philosophical Transactions of the Royal Society A. -
COPE (Committee on Publication Ethics).
Guidelines on Good Publication Practice. -
Resnik, D. B. (2011).
What Is Ethics in Research & Why Is It Important? NIH.
16.6 Panel Review & Publication Preparation
Section titled “16.6 Panel Review & Publication Preparation”-
National Academies of Sciences (2017).
Dual Use Research of Concern in the Life Sciences. -
ENISA.
Responsible Disclosure and Publication in Security Research. -
Floridi, L., & Taddeo, M. (2016).
What Is Data Ethics? Philosophical Transactions of the Royal Society A. -
COPE (Committee on Publication Ethics).
Guidelines on Good Publication Practice. -
Resnik, D. B. (2011).
What Is Ethics in Research & Why Is It Important? NIH.