-
1
-
-
84891637210
-
NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say
-
30 October
-
Barton Gellman and Ashkan Soltani, ‘NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say’, Washington Post, 30 October 2013, https://www.washingtonpost.com/world/national-security/nsainfiltrates-links-to-yahoo-google-datacenters-worldwide-snowdendocuments-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html.
-
(2013)
Washington Post
-
-
Gellman, B.1
Soltani, A.2
-
2
-
-
84896477029
-
Secret Contract Tied NSA and Security Industry Pioneer
-
20 December
-
Joseph Menn, ‘Secret Contract Tied NSA and Security Industry Pioneer’, Reuters, 20 December 2013, http://www.reuters.com/article/us-usasecurity-rsa-idUSBRE9BJ1C220131221.
-
(2013)
Reuters
-
-
Menn, J.1
-
3
-
-
84957537850
-
NSA Spying: Whom Do You Believe?
-
23 December
-
Bruce Schneier, ‘NSA Spying: Whom Do You Believe?’, Schneier on Security, 23 December 2013, https://www.schneier.com/blog/archives/2013/12/nsa_spying_who.html.
-
(2013)
Schneier on Security
-
-
Schneier, B.1
-
4
-
-
84897302609
-
Cypherpunks, E-Money and the Technologies of Disconnection
-
Summer
-
Kevin Kelly, ‘Cypherpunks, E-Money and the Technologies of Disconnection’, Whole Earth Review, no. 79, Summer 1993, p. 48.
-
(1993)
Whole Earth Review
, Issue.79
, pp. 48
-
-
Kelly, K.1
-
5
-
-
84957537272
-
-
Intelligence and Security Committee, UK Parliament, HC 1075, 12 March
-
Intelligence and Security Committee, ‘Privacy and Security’, UK Parliament, HC 1075, 12 March 2015, p. 67.
-
(2015)
Privacy and Security
, pp. 67
-
-
-
6
-
-
84957557141
-
How Has David Cameron Caused a Storm Over Encryption?
-
15 January
-
Alex Hern, ‘How Has David Cameron Caused a Storm Over Encryption?’, Guardian, 15 January 2015, http://www.theguardian.com/technology/2015/jan/15/davidcameron-encryption-anti-terror-laws.
-
(2015)
Guardian
-
-
Hern, A.1
-
7
-
-
84957539689
-
Feds Challenged by Encrypted Devices of San Bernardino Attackers
-
9 December
-
Pierre Thomas, ‘Feds Challenged by Encrypted Devices of San Bernardino Attackers’, ABC News, 9 December 2015, http://abcnews.go.com/US/feds-challenged-encrypteddevices-san-bernardino-attackers/story?id=35680875.
-
(2015)
ABC News
-
-
Thomas, P.1
-
8
-
-
84957600558
-
-
Terminology reflects differences in culture: privacy enthusiasts and activists often refer to ‘crypto’ whereas intelligence agencies and law enforcement speak of ‘crypt’
-
Terminology reflects differences in culture: privacy enthusiasts and activists often refer to ‘crypto’ whereas intelligence agencies and law enforcement speak of ‘crypt’.
-
-
-
-
9
-
-
84957569001
-
-
Our baseline for ‘legitimate behaviour’ is simply what is considered legal in the most liberal democratic jurisdiction on a specific issue. For free speech, for instance, this would be the United States; for recreational drugs, the Netherlands; for LGBT rights, probably Denmark
-
Our baseline for ‘legitimate behaviour’ is simply what is considered legal in the most liberal democratic jurisdiction on a specific issue. For free speech, for instance, this would be the United States; for recreational drugs, the Netherlands; for LGBT rights, probably Denmark.
-
-
-
-
10
-
-
34250726454
-
-
Communications-Electronics Security Group
-
James Ellis, ‘The Story of Non-Secret Encryption’, Communications-Electronics Security Group, 1987, available at https://cryptome.org/jya/ellisdoc.htm.
-
(1987)
The Story of Non-Secret Encryption
-
-
Ellis, J.1
-
11
-
-
0017018484
-
New Directions in Cryptography
-
November
-
Whitfield Diffie and Martin Hellman, ‘New Directions in Cryptography’, IEEE Transactions on Information Theory, vol. 22, no. 6, November 1976, p. 644.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644
-
-
Diffie, W.1
Hellman, M.2
-
12
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Ronald L. Rivest, Adi Shamir and Leonard Adleman, ‘A Method for Obtaining Digital Signatures and Public-Key Cryptosystems’, Communications of the ACM, vol. 21, no. 2, 1978, p. 120.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
13
-
-
84889277414
-
The Open Secret
-
April
-
Stephen Levy, ‘The Open Secret’, Wired, vol. 7, no. 4, April 1999, pp. 1-6.
-
(1999)
Wired
, vol.7
, Issue.4
, pp. 1-6
-
-
Levy, S.1
-
14
-
-
0003146062
-
A New Kind of Cipher That Would Take Millions of Years to Break
-
August
-
Martin Gardner, ‘A New Kind of Cipher That Would Take Millions of Years to Break’, Scientific American, vol. 237, August 1977, pp. 120-4.
-
(1977)
Scientific American
, vol.237
, pp. 120-124
-
-
Gardner, M.1
-
15
-
-
56849108755
-
-
New York: Penguin
-
Stephen Levy, Crypto (New York: Penguin, 2000).
-
(2000)
Crypto
-
-
Levy, S.1
-
17
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
Februay
-
David L. Chaum, ‘Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms’, Communications of the ACM, vol. 24, no. 2, Februay 1981, p. 85.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 85
-
-
Chaum, D.L.1
-
18
-
-
0022145479
-
Security Without Identification: Transaction Systems to Make Big Brother Obsolete
-
October
-
David L. Chaum, ‘Security Without Identification: Transaction Systems to Make Big Brother Obsolete’, Communications of the ACM, vol. 28, no. 10, October 1985, p. 1030.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030
-
-
Chaum, D.L.1
-
19
-
-
84957572409
-
Worlds First Electronic Cash Payment Over Computer Networks’
-
press release, 26 May
-
David L. Chaum, ‘World’s First Electronic Cash Payment Over Computer Networks’, Digicash, press release, 26 May 1994.
-
(1994)
Digicash
-
-
Chaum, D.L.1
-
21
-
-
84957549061
-
-
email to cypherpunks@toad.com, 18 August
-
‘Introduction to BlackNet’, email to cypherpunks@toad.com, 18 August 1993.
-
(1993)
Introduction to Blacknet
-
-
-
22
-
-
4544320163
-
The Darknet and the Future of Content Distribution
-
18 November
-
Peter Biddle, Paul England, Marcus Peinado and Bryan Willman, ‘The Darknet and the Future of Content Distribution’, ACM Workshop on Digital Rights Management, 18 November 2002, p. 54, https://crypto.stanford.edu/DRM2002/prog.html.
-
(2002)
ACM Workshop on Digital Rights Management
, pp. 54
-
-
Biddle, P.1
England, P.2
Peinado, M.3
Willman, B.4
-
23
-
-
84957535513
-
-
It is immensely difficult to accurately gauge darknet sizes, as metrics vary greatly, including traffic, services offered, users, relays and others
-
It is immensely difficult to accurately gauge darknet sizes, as metrics vary greatly, including traffic, services offered, users, relays and others.
-
-
-
-
24
-
-
69449103443
-
Moving Across to the Dark Side
-
Cath Everett, ‘Moving Across to the Dark Side’, Network Security, no. 9, 2009, pp. 10-12.
-
(2009)
Network Security
, Issue.9
, pp. 10-12
-
-
Everett, C.1
-
25
-
-
84957576528
-
-
Recent assessments by the Tor Project gauge hidden-services traffic to constitute 3-6% of the overall traffic in the Tor network. For a technical breakdown, see ‘asn’, Tor Project, 26 February, fora technical breakdown
-
Recent assessments by the Tor Project gauge hidden-services traffic to constitute 3-6% of the overall traffic in the Tor network. For a technical breakdown, see ‘asn’, ‘Some Statistics about Onions’, Tor Project, 26 February 2015, https://blog.torproject.org/blog/33 fora technical breakdown.
-
(2015)
Some Statistics about Onions
-
-
-
27
-
-
78650349115
-
Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network
-
1 September
-
Abdelberi Chaabane, Pere Manils and Mohamed Ali Kaafar, ‘Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network’, 2010 4th International Conference on Network and System Security (NSS), 1 September 2010, p. 167, http://planete.inrialpes.fr/papers/TorTraffic-NSS10.pdf.
-
(2010)
2010 4Th International Conference on Network and System Security (NSS)
, pp. 167
-
-
Chaabane, A.1
Manils, P.2
Kaafar, M.A.3
-
29
-
-
84957583793
-
-
A compromise successfully employed by the FBI to decloak users accessing illicit services in 2013
-
A compromise successfully employed by the FBI to decloak users accessing illicit services in 2013.
-
-
-
-
30
-
-
84978074189
-
FBI Admits It Controlled Tor Servers Behind Mass Malware Attack
-
13 September
-
Kevin Poulsen, ‘FBI Admits It Controlled Tor Servers Behind Mass Malware Attack’, Wired, 13 September 2013, http://www.wired.com/2013/09/freedom-hosting-fbi/.
-
(2013)
Wired
-
-
Poulsen, K.1
-
31
-
-
84957538788
-
-
The Tor Project’s commitment to security is exemplified by their extensive release notes for the Tor Browser Bundle, and Tor’s core
-
The Tor Project’s commitment to security is exemplified by their extensive release notes for the Tor Browser Bundle, and Tor’s core. See https://blog.torproject.org/category/tags/release.
-
-
-
-
32
-
-
84957838105
-
The Tor Network: A Global Inquiry into the Legal Status of Anonymity Networks
-
Keith D. Watson, ‘The Tor Network: A Global Inquiry into the Legal Status of Anonymity Networks’, Washington University Global Studies Law Review, no. 11, 2012, pp. 718-723.
-
(2012)
Washington University Global Studies Law Review
, Issue.11
, pp. 718-723
-
-
Watson, K.D.1
-
33
-
-
84957547764
-
-
SecDev Foundation, 27 October
-
SecDev Foundation, ‘Syrian Regime Tightens Access to Secure Online Communications’, 27 October 2015, http://new.secdev-foundation.org/syrian-regime-tightens-access-tosecure-online-communications.
-
(2015)
Syrian Regime Tightens Access to Secure Online Communications
-
-
-
34
-
-
84957541714
-
Tor: Hidden Services and Deanonymisation
-
Gareth Owen, ‘Tor: Hidden Services and Deanonymisation’, presentation at Chaos Computer Club Conference 2004, https://www.youtube.com/watch?v=-oTEoLB-ses;Alex
-
Chaos Computer Club Conference 2004
-
-
Owen, G.1
-
35
-
-
84881248798
-
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
-
19 May
-
Biryukov, Ivan Pustogarov and R. Weinmann, ‘Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization’, 2013 IEEE Symposium on Security and Privacy, 19 May 2013, pp. 80-94, https://doi.org/10.1109/SP.2013.15
-
(2013)
2013 IEEE Symposium on Security and Privacy
, pp. 80-94
-
-
Biryukov, I.P.1
Weinmann, R.2
-
36
-
-
84882252578
-
A Review of the Available Content on Tor Hidden Services: The Case Against Further Development
-
Clement Guitton, ‘A Review of the Available Content on Tor Hidden Services: The Case Against Further Development’, Computers in Human Behavior, vol. 29, no. 6, 2013, pp. 2805-15.
-
(2013)
Computers in Human Behavior
, vol.29
, Issue.6
, pp. 2805-2815
-
-
Guitton, C.1
-
38
-
-
84957576528
-
-
Tor Project, 26 February
-
‘Some Statistics About Onions’, Tor Project, 26 February 2015, https://blog.torproject.org/blog/some-statistics-about-onions.
-
(2015)
Some Statistics about Onions
-
-
-
40
-
-
84988360764
-
Content and Popularity Analysis of Tor Hidden Services
-
Madrid, 30 June
-
Alex Biryukov et al., ‘Content and Popularity Analysis of Tor Hidden Services’, Distributed Computing Systems Workshop, 2014 IEEE 34th International, Madrid, 30 June 2014, pp. 188-93, https://doi.org/10.1109/ICDCSW.2014.20.
-
(2014)
Distributed Computing Systems Workshop, 2014 IEEE 34Th International
, pp. 188-193
-
-
Biryukov, A.1
-
42
-
-
84910678276
-
-
and the hidden-service repository Ahmia, which registers 5,197 active hidden services as of 10 January, These numbers approximately match our own
-
Biryukov et al., ‘Content and Popularity Analysis of Tor Hidden Services’; and the hidden-service repository Ahmia.fi, available at http://ahmia.fi, which registers 5,197 active hidden services as of 10 January 2016. These numbers approximately match our own.
-
(2016)
Content and Popularity Analysis of Tor Hidden Services
-
-
Biryukov1
-
43
-
-
84957575159
-
-
Our findings are comparable in scale to those using the previous approaches mentioned
-
Our findings are comparable in scale to those using the previous approaches mentioned.
-
-
-
-
45
-
-
84957570805
-
-
DDoS stands for Distributed Denial of Service, a technique in which the attacker floods the victim service with more traffic than it can handle, thereby preventing legitimate users from accessing it
-
DDoS stands for Distributed Denial of Service, a technique in which the attacker floods the victim service with more traffic than it can handle, thereby preventing legitimate users from accessing it.
-
-
-
-
47
-
-
84957578503
-
-
From the home page of a small vendor website named ‘Unique Notes’
-
From the home page of a small vendor website named ‘Unique Notes’.
-
-
-
-
48
-
-
84957606850
-
Dozens Nabbed in Takedown of Cybercrime Forum Darkode
-
In a recent example, the shuttering of the Darkode underground market and subsequent arrests have led to the site’s resurfacing as a hidden service. See , 15 July
-
In a recent example, the shuttering of the Darkode underground market and subsequent arrests have led to the site’s resurfacing as a hidden service. See Kim Zetter, ‘Dozens Nabbed in Takedown of Cybercrime Forum Darkode’, Wired, 15 July 2015, http://www.wired.com/2015/07/dozens-nabbed-takedown-cybercrime-forum-darkode/
-
(2015)
Wired
-
-
Zetter, K.1
-
49
-
-
84957591091
-
Hacker Forum Darkode is Back and Safer than Ever
-
28 July
-
Liat Clark, ‘Hacker Forum Darkode is Back and Safer than Ever’, Wired, 28 July 2015, http://www.wired.co.uk/news/archive/2015-07/28/darkode-back-and-more-secure.
-
(2015)
Wired
-
-
Clark, L.1
-
50
-
-
84957568078
-
-
Often called ‘Bitcoin mixers’, these services generate a stream of transactions to turn investigations into a highly complex procedure
-
Often called ‘Bitcoin mixers’, these services generate a stream of transactions to turn investigations into a highly complex procedure.
-
-
-
-
51
-
-
84957579475
-
-
Website named. Website named ‘Dark Tor Drugs’. Website named ‘paste.lolz’, a darknetbased clone of the popular textual posting site Pastebin
-
Website named ‘CleanCoin - Low-Fee Bitcoin Mixing/Tumbling/Laundry Service’, URL withheld. Website named ‘Dark Tor Drugs’, URL withheld. Website named ‘paste.lolz’, a darknetbased clone of the popular textual posting site Pastebin (http://pastebin.com), URL withheld.
-
Cleancoin - Low-Fee Bitcoin Mixing/Tumbling/Laundry Service
-
-
-
52
-
-
84957538399
-
-
The front page of a website named ‘Meet My Sisters’
-
The front page of a website named ‘Meet My Sisters’, URL withheld.
-
-
-
-
53
-
-
84957550092
-
-
Website named ‘Pedo List’, discussion named ‘13 Year-Olds Have Sex’
-
Website named ‘Pedo List’, discussion named ‘13 Year-Olds Have Sex’, URL withheld.
-
-
-
-
54
-
-
84957603005
-
-
Website named ‘Hitman Network- Hire Real Killers With Bitcoin, the Only True Hitman Site on the Deep Web’
-
Website named ‘Hitman Network- Hire Real Killers With Bitcoin, the Only True Hitman Site on the Deep Web’, URL withheld.
-
-
-
-
55
-
-
84957576498
-
-
email to Wei Dai, 4 March
-
Michael G. Reed, ‘Re: Onion Routing’, email to Wei Dai, 4 March 1997, http://www.onion-router.net/Archives/onions-1997.txt.
-
(1997)
Re: Onion Routing
-
-
Reed, M.G.1
-
56
-
-
34948854809
-
Deploying Low-Latency Anonymity: Design Challenges and Social Factors
-
September/October
-
Roger Dingledine, Nick Mathewson and Paul Syverson, ‘Deploying Low-Latency Anonymity: Design Challenges and Social Factors’, IEEE Security & Privacy, vol. 5, no. 5, September/October 2007, pp. 83-7.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.5
, pp. 83-87
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
58
-
-
84957558618
-
-
20 February
-
Timothy May, ‘Re: Blacknet Worries’, email to cypherpunks@toad.com, 20 February 1994.
-
(1994)
Re: Blacknet Worries
-
-
May, T.1
-
59
-
-
84957593039
-
-
The line was commonly repeated among cypherpunks. See, for example, email to the Vice President of the United States, copied to, 21 July
-
The line was commonly repeated among cypherpunks. See, for example, Loren James Rittle, ‘The Clipper Chip Proposal’, email to the Vice President of the United States, copied to cypherpunks@toad.com, 21 July 1994.
-
(1994)
The Clipper Chip Proposal
-
-
Rittle, L.J.1
-
60
-
-
0346771431
-
Crypto Rebels
-
May/June
-
Stephen Levy, ‘Crypto Rebels’, Wired, May/June 1993, pp. 54-61.
-
(1993)
Wired
, pp. 54-61
-
-
Levy, S.1
-
61
-
-
84957546288
-
-
‘We advocate encryption’, said Robert Hannigan, the director of the spy agency, in November 2015
-
‘We advocate encryption’, said Robert Hannigan, the director of the spy agency, in November 2015.
-
-
-
-
62
-
-
84957584949
-
GCHQ Director Blasts Free Market, Says UK Must Be a “Sovereign Cryptographic Nation
-
15 November
-
Alexander J. Martin, ‘GCHQ Director Blasts Free Market, Says UK Must Be a “Sovereign Cryptographic Nation”’, Register, 15 November 2015, http://www.theregister.co.uk/2015/11/10/gchq_director_speech/.
-
(2015)
Register
-
-
Martin, A.J.1
-
63
-
-
84957588983
-
-
This is a counterproductive term. The controversial draft UK Investigatory Powers Bill, for example, does not call for back doors; instead, the government may demand that communicationservice providers remove end-to-end encryption from specific user accounts if presented with a warrant. Maintaining such a capability is not technically a back door
-
This is a counterproductive term. The controversial draft UK Investigatory Powers Bill, for example, does not call for back doors; instead, the government may demand that communicationservice providers remove end-to-end encryption from specific user accounts if presented with a warrant. Maintaining such a capability is not technically a back door.
-
-
-
-
64
-
-
85047930936
-
Obama Wont Seek Access to Encrypted User Data’
-
11 October, Even before the White House’s decision, the Home Office had decided that the Investigatory Powers Bill would probably not change the legislative status quo on encryption in the UK. Thomas Rid, conversation with senior Home Office officials, 9 October 2015
-
Nicole Perlroth and David Sanger, ‘Obama Won’t Seek Access to Encrypted User Data’, New York Times, 11 October 2015, p. A24. Even before the White House’s decision, the Home Office had decided that the Investigatory Powers Bill would probably not change the legislative status quo on encryption in the UK. Thomas Rid, conversation with senior Home Office officials, 9 October 2015.
-
(2015)
New York Times
-
-
Perlroth, N.1
Sanger, D.2
-
66
-
-
77049121293
-
Valet Services: Improving Hidden Servers with a Personal Touch
-
1 January
-
Lasse Øverlier and Paul Syverson, ‘Valet Services: Improving Hidden Servers with a Personal Touch’, Privacy Enhancing Technologies, 1 January 2006, pp. 223-44.
-
(2006)
Privacy Enhancing Technologies
, pp. 223-244
-
-
Øverlier, L.1
Syverson, P.2
-
67
-
-
0001495881
-
The Eternity Service
-
October
-
Ross Anderson, ‘The Eternity Service’, Proceedings of PRAGOCRYPT, October 1996, pp. 242-52.
-
(1996)
Proceedings of PRAGOCRYPT
, pp. 242-252
-
-
Anderson, R.1
-
68
-
-
0032074579
-
Anonymous Connections and Onion Routing
-
Michael G. Reed, Paul F. Syverson and David M. Goldschlag, ‘Anonymous Connections and Onion Routing’, IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, 1998, pp. 482-94, https://doi.org/10.1109/49.668972.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
71
-
-
84957541384
-
Genuine Onion: Simple, Fast, Flexible, and Cheap Website Authentication
-
May
-
Paul Syverson and Griffin Boyce, ‘Genuine Onion: Simple, Fast, Flexible, and Cheap Website Authentication’, IEEE Workshop on Web 2.0 Security and Privacy, May 2015, http://www.nrl.navy.mil/itd/chacs/sites/www.nrl.navy.mil.itd.chacs/files/pdfs/15-1231-0478.pdf.
-
(2015)
IEEE Workshop on Web 2.0 Security and Privacy
-
-
Syverson, P.1
Boyce, G.2
-
72
-
-
84957546613
-
-
For an overview, see, DuckDuckGo
-
For an overview, see ‘The Official SecureDrop Directory’, http://secrdrop5wyphb5x.onion/directory. DuckDuckGo is at http://3g2upl4pq6kufc4m.onion/
-
The Official Securedrop Directory
-
-
-
73
-
-
84957587564
-
-
ProPublica, the Darknet’s first major news site
-
ProPublica, the Darknet’s first major news site, is at http://www.propub3r6espa33w.onion/.
-
-
-
-
74
-
-
84957554112
-
-
The first news site was possibly Kavkaz Center, a Chechen jihadi site launched in 2013
-
The first news site was possibly Kavkaz Center, a Chechen jihadi site launched in 2013.
-
-
-
-
75
-
-
84957590084
-
-
conversation with authors, 1 April
-
Alec Muffett, conversation with authors, 1 April 2015.
-
(2015)
-
-
Muffett, A.1
-
76
-
-
84957593852
-
Strongbox and Aaron Swartz
-
For an introduction, see, 14 May
-
For an introduction, see Kevin Poulsen, ‘Strongbox and Aaron Swartz’, New Yorker, 14 May 2013.
-
(2013)
New Yorker
-
-
Poulsen, K.1
-
77
-
-
84957546541
-
-
Tor Project, 31 December 2014, especially Roger Dingledine’s posts, as ‘arma’
-
See ‘Tor: 80 Percent of ??? Percent of 1-2 Percent Abusive’, Tor Project, 31 December 2014, especially Roger Dingledine’s posts, as ‘arma’, https://blog.torproject.org/blog/tor-80-percent-percent-1-2-percent-abusive.
-
Tor: 80 Percent of ??? Percent of 1-2 Percent Abusive
-
-
-
79
-
-
84957591988
-
Hidden Services Need Some Love
-
22 April
-
‘Hidden Services Need Some Love’, Tor Project, 22 April 2013, https://blog.torproject.org/blog/hidden-services-need-some-love.
-
(2013)
Tor Project
-
-
-
81
-
-
84957583251
-
Jeffersons Draft’
-
Princeton, NJ: Princeton University Press
-
Thomas Jefferson, ‘Jefferson’s Draft’, in The Papers of Thomas Jefferson, Volume 30: 1 January 1798 to 31 January 1799 (Princeton, NJ: Princeton University Press, 2003), pp. 536-43, available at https://jeffersonpapers.princeton.edu/selected-documents/jefferson%E2%80%99s-draft.
-
(2003)
The Papers of Thomas Jefferson, Volume 30: 1 January 1798 to 31 January 1799
, pp. 536-543
-
-
Jefferson, T.1
-
82
-
-
84946210077
-
-
New York: OR
-
Julian Assange, Cypherpunks (New York: OR, 2012), p. 4.
-
(2012)
Cypherpunks
, pp. 4
-
-
Assange, J.1
-
83
-
-
84957571122
-
ISIS Now Has a Propaganda Site on the Dark Web
-
16 November
-
Joseph Cox, ‘ISIS Now Has a Propaganda Site on the Dark Web’, Motherboard, 16 November 2015, http://motherboard.vice.com/read/isis-now-has-a-propaganda-site-onthe-dark-web.
-
(2015)
Motherboard
-
-
Cox, J.1
-
84
-
-
84957545520
-
Learning More About the GFWs Active Probing System’
-
For details, see, 14 September
-
For details, see ‘Learning More About the GFW’s Active Probing System’, Tor Project, 14 September 2015.
-
(2015)
Tor Project
-
-
-
85
-
-
84957554894
-
Russia Wants to Block Tor, but it Probably Cant’
-
18 February
-
Kari Paul, ‘Russia Wants to Block Tor, but it Probably Can’t’, Motherboard, 18 February 2015, http://motherboard.vice.com/read/russia-wants-to-blocktor-but-it-probably-cant.
-
(2015)
Motherboard
-
-
Paul, K.1
-
86
-
-
84957559584
-
Russia Moves to Ban Tor and Anonymous Web Surfing
-
10 February
-
Oren Dotan, ‘Russia Moves to Ban Tor and Anonymous Web Surfing’, Vocativ, 10 February 2015, http://www.vocativ.com/tech/internet/dark-net-russia/.
-
(2015)
Vocativ
-
-
Dotan, O.1
-
87
-
-
84957582835
-
-
For an introduction, see, New York: Oxford University Press
-
For an introduction, see John Bew, Realpolitik: A History (New York: Oxford University Press, 2016).
-
(2016)
Realpolitik: A History
-
-
Bew, J.1
-
88
-
-
85056405754
-
The Trust Machine
-
See, 31 October
-
See ‘The Trust Machine’, The Economist, 31 October 2015, http://www.economist.com/news/leaders/21677198-technologybehind-bitcoin-could-transformhow-economy-works-trust-machine.
-
(2015)
The Economist
-
-
-
89
-
-
84957565150
-
-
One caveat that does not affect our argument: some commercial products, such as Symantec Encryption Desktop, use open-source code; and some non-profit crypto systems are not open-source, such as Wickr, an endto-end encrypted app. Some large communication-service providers also argue that their system architecture may not allow them to remove encryption. Author conversations with three global end-to-end encryption providers, November-December
-
One caveat that does not affect our argument: some commercial products, such as Symantec Encryption Desktop, use open-source code; and some non-profit crypto systems are not open-source, such as Wickr, an endto-end encrypted app. Some large communication-service providers also argue that their system architecture may not allow them to remove encryption. Author conversations with three global end-to-end encryption providers, November-December 2015.
-
(2015)
-
-
-
90
-
-
84957549378
-
Brazil Restores WhatsApp Service After Brief Ban
-
18 December
-
Vindu Goel and Vinod Sreeharsha, ‘Brazil Restores WhatsApp Service After Brief Ban’, New York Times, 18 December 2015, p. A10.
-
(2015)
New York Times
-
-
Goel, V.1
Sreeharsha, V.2
-
92
-
-
84957574950
-
-
[director-general for cyber security at GCHQ], witness statement to Investigatory Powers Tribunal, IPT/14/85/CH, 16 November
-
Ciaran Martin [director-general for cyber security at GCHQ], witness statement to Investigatory Powers Tribunal, IPT/14/85/CH, 16 November 2015, pp. 4-8.
-
(2015)
, pp. 4-8
-
-
Martin, C.1
|