While much of the internet is readily accessible, certain parts lie hidden beneath intricate layers of obfuscation. This dark side of the web provides a much greater level of anonymity and privacy and in this video I explore why it exists, what it contains, and who it appeals to.
The Dark Side of the Web
Jul 2, 2016
Credits
References
-
1996M.G. Reed, P.F. Syverson, & D.M. Goldschlag12th Annual Computer Security Applications ConferenceP. 95-104
-
#aDocumentOnion Routing
-
-
1997M.G. Reed, P.F. Syverson, & D.M. GoldschlagJournal of Computer SecurityVol. 5No. 3P. 237-248
-
#aDocumentOnion Routing
-
-
1998M.G. Reed, P.F. Syverson, & D.M. GoldschlagIEEE Journal on Selected Areas in CommunicationsVol. 6No. 4P. 482-494
-
#aDocumentOnion Routing
-
-
Mar 22, 2011Michael Reedtor-talk
An explanation as to why onion routing technology was created.
-
Sep 20, 2002Roger DingledineSEUL Project
The launch of the pre-alpha version of Tor.
-
2004Roger DingledineWizards of OS 3: The Future of the Digital Commons
-
Tor Bug Tracker & Wiki
-
2001Michael K. BergmanTaking LicenseVol. 7No. 1
-
Aug 14, 2013Andy GreenbergForbes
-
Oct 2, 2013Andy GreenbergForbes
-
Feb 4, 2015Benjamin WeiserThe New York Times
-
Nov 6, 2014Shawn KnightTechSpot
-
Nov 7, 2014Shawn KnightTechSpot
-
Tor Metrics
-
Oct 22, 2014Patrick Howell O'NeillThe Daily Dot
-
Oct 17, 2013Eli LakeThe Daily Beast
-
May 12, 2016Risk Based Security
-
Nov 11, 2014Joseph CoxMotherboard
-
Jan 5, 2016Joseph CoxMotherboard
-
May 18, 2016Joseph CoxMotherboard
-
Jun 23, 2015Sara PetersDarkReading
-
Aug 29, 2015Eileen OrmsbyAll Things VICE
-
May 16, 2016Eileen OrmsbyAll Things VICE
-
2016Daniel Moore & Thomas RidSurvival: Global Politics and StrategyVol. 58No. 1P. 7-38
-
Aug 4, 2015asnTor Blog
-
Jul 16, 2014Yasha LevinePando
-
2016Yasha LevineSurveillance Valley
-
#29Tor Project Funding
-
#30Wikipedia Articles