메뉴 건너뛰기




Volumn 58, Issue 1, 2016, Pages 7-38

Cryptopolitik and the darknet

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84957549211     PISSN: 00396338     EISSN: 14682699     Source Type: Journal    
DOI: 10.1080/00396338.2016.1142085     Document Type: Article
Times cited : (151)

References (93)
  • 1
    • 84891637210 scopus 로고    scopus 로고
    • NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say
    • 30 October
    • Barton Gellman and Ashkan Soltani, ‘NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say’, Washington Post, 30 October 2013, https://www.washingtonpost.com/world/national-security/nsainfiltrates-links-to-yahoo-google-datacenters-worldwide-snowdendocuments-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html.
    • (2013) Washington Post
    • Gellman, B.1    Soltani, A.2
  • 2
    • 84896477029 scopus 로고    scopus 로고
    • Secret Contract Tied NSA and Security Industry Pioneer
    • 20 December
    • Joseph Menn, ‘Secret Contract Tied NSA and Security Industry Pioneer’, Reuters, 20 December 2013, http://www.reuters.com/article/us-usasecurity-rsa-idUSBRE9BJ1C220131221.
    • (2013) Reuters
    • Menn, J.1
  • 3
    • 84957537850 scopus 로고    scopus 로고
    • NSA Spying: Whom Do You Believe?
    • 23 December
    • Bruce Schneier, ‘NSA Spying: Whom Do You Believe?’, Schneier on Security, 23 December 2013, https://www.schneier.com/blog/archives/2013/12/nsa_spying_who.html.
    • (2013) Schneier on Security
    • Schneier, B.1
  • 4
    • 84897302609 scopus 로고
    • Cypherpunks, E-Money and the Technologies of Disconnection
    • Summer
    • Kevin Kelly, ‘Cypherpunks, E-Money and the Technologies of Disconnection’, Whole Earth Review, no. 79, Summer 1993, p. 48.
    • (1993) Whole Earth Review , Issue.79 , pp. 48
    • Kelly, K.1
  • 5
    • 84957537272 scopus 로고    scopus 로고
    • Intelligence and Security Committee, UK Parliament, HC 1075, 12 March
    • Intelligence and Security Committee, ‘Privacy and Security’, UK Parliament, HC 1075, 12 March 2015, p. 67.
    • (2015) Privacy and Security , pp. 67
  • 6
    • 84957557141 scopus 로고    scopus 로고
    • How Has David Cameron Caused a Storm Over Encryption?
    • 15 January
    • Alex Hern, ‘How Has David Cameron Caused a Storm Over Encryption?’, Guardian, 15 January 2015, http://www.theguardian.com/technology/2015/jan/15/davidcameron-encryption-anti-terror-laws.
    • (2015) Guardian
    • Hern, A.1
  • 7
    • 84957539689 scopus 로고    scopus 로고
    • Feds Challenged by Encrypted Devices of San Bernardino Attackers
    • 9 December
    • Pierre Thomas, ‘Feds Challenged by Encrypted Devices of San Bernardino Attackers’, ABC News, 9 December 2015, http://abcnews.go.com/US/feds-challenged-encrypteddevices-san-bernardino-attackers/story?id=35680875.
    • (2015) ABC News
    • Thomas, P.1
  • 8
    • 84957600558 scopus 로고    scopus 로고
    • Terminology reflects differences in culture: privacy enthusiasts and activists often refer to ‘crypto’ whereas intelligence agencies and law enforcement speak of ‘crypt’
    • Terminology reflects differences in culture: privacy enthusiasts and activists often refer to ‘crypto’ whereas intelligence agencies and law enforcement speak of ‘crypt’.
  • 9
    • 84957569001 scopus 로고    scopus 로고
    • Our baseline for ‘legitimate behaviour’ is simply what is considered legal in the most liberal democratic jurisdiction on a specific issue. For free speech, for instance, this would be the United States; for recreational drugs, the Netherlands; for LGBT rights, probably Denmark
    • Our baseline for ‘legitimate behaviour’ is simply what is considered legal in the most liberal democratic jurisdiction on a specific issue. For free speech, for instance, this would be the United States; for recreational drugs, the Netherlands; for LGBT rights, probably Denmark.
  • 10
    • 34250726454 scopus 로고
    • Communications-Electronics Security Group
    • James Ellis, ‘The Story of Non-Secret Encryption’, Communications-Electronics Security Group, 1987, available at https://cryptome.org/jya/ellisdoc.htm.
    • (1987) The Story of Non-Secret Encryption
    • Ellis, J.1
  • 11
  • 12
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • Ronald L. Rivest, Adi Shamir and Leonard Adleman, ‘A Method for Obtaining Digital Signatures and Public-Key Cryptosystems’, Communications of the ACM, vol. 21, no. 2, 1978, p. 120.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 13
    • 84889277414 scopus 로고    scopus 로고
    • The Open Secret
    • April
    • Stephen Levy, ‘The Open Secret’, Wired, vol. 7, no. 4, April 1999, pp. 1-6.
    • (1999) Wired , vol.7 , Issue.4 , pp. 1-6
    • Levy, S.1
  • 14
    • 0003146062 scopus 로고
    • A New Kind of Cipher That Would Take Millions of Years to Break
    • August
    • Martin Gardner, ‘A New Kind of Cipher That Would Take Millions of Years to Break’, Scientific American, vol. 237, August 1977, pp. 120-4.
    • (1977) Scientific American , vol.237 , pp. 120-124
    • Gardner, M.1
  • 15
    • 56849108755 scopus 로고    scopus 로고
    • New York: Penguin
    • Stephen Levy, Crypto (New York: Penguin, 2000).
    • (2000) Crypto
    • Levy, S.1
  • 17
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
    • Februay
    • David L. Chaum, ‘Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms’, Communications of the ACM, vol. 24, no. 2, Februay 1981, p. 85.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 85
    • Chaum, D.L.1
  • 18
    • 0022145479 scopus 로고
    • Security Without Identification: Transaction Systems to Make Big Brother Obsolete
    • October
    • David L. Chaum, ‘Security Without Identification: Transaction Systems to Make Big Brother Obsolete’, Communications of the ACM, vol. 28, no. 10, October 1985, p. 1030.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030
    • Chaum, D.L.1
  • 19
    • 84957572409 scopus 로고
    • Worlds First Electronic Cash Payment Over Computer Networks’
    • press release, 26 May
    • David L. Chaum, ‘World’s First Electronic Cash Payment Over Computer Networks’, Digicash, press release, 26 May 1994.
    • (1994) Digicash
    • Chaum, D.L.1
  • 21
    • 84957549061 scopus 로고
    • email to cypherpunks@toad.com, 18 August
    • ‘Introduction to BlackNet’, email to cypherpunks@toad.com, 18 August 1993.
    • (1993) Introduction to Blacknet
  • 23
    • 84957535513 scopus 로고    scopus 로고
    • It is immensely difficult to accurately gauge darknet sizes, as metrics vary greatly, including traffic, services offered, users, relays and others
    • It is immensely difficult to accurately gauge darknet sizes, as metrics vary greatly, including traffic, services offered, users, relays and others.
  • 24
    • 69449103443 scopus 로고    scopus 로고
    • Moving Across to the Dark Side
    • Cath Everett, ‘Moving Across to the Dark Side’, Network Security, no. 9, 2009, pp. 10-12.
    • (2009) Network Security , Issue.9 , pp. 10-12
    • Everett, C.1
  • 25
    • 84957576528 scopus 로고    scopus 로고
    • Recent assessments by the Tor Project gauge hidden-services traffic to constitute 3-6% of the overall traffic in the Tor network. For a technical breakdown, see ‘asn’, Tor Project, 26 February, fora technical breakdown
    • Recent assessments by the Tor Project gauge hidden-services traffic to constitute 3-6% of the overall traffic in the Tor network. For a technical breakdown, see ‘asn’, ‘Some Statistics about Onions’, Tor Project, 26 February 2015, https://blog.torproject.org/blog/33 fora technical breakdown.
    • (2015) Some Statistics about Onions
  • 27
    • 78650349115 scopus 로고    scopus 로고
    • Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network
    • 1 September
    • Abdelberi Chaabane, Pere Manils and Mohamed Ali Kaafar, ‘Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network’, 2010 4th International Conference on Network and System Security (NSS), 1 September 2010, p. 167, http://planete.inrialpes.fr/papers/TorTraffic-NSS10.pdf.
    • (2010) 2010 4Th International Conference on Network and System Security (NSS) , pp. 167
    • Chaabane, A.1    Manils, P.2    Kaafar, M.A.3
  • 29
    • 84957583793 scopus 로고    scopus 로고
    • A compromise successfully employed by the FBI to decloak users accessing illicit services in 2013
    • A compromise successfully employed by the FBI to decloak users accessing illicit services in 2013.
  • 30
    • 84978074189 scopus 로고    scopus 로고
    • FBI Admits It Controlled Tor Servers Behind Mass Malware Attack
    • 13 September
    • Kevin Poulsen, ‘FBI Admits It Controlled Tor Servers Behind Mass Malware Attack’, Wired, 13 September 2013, http://www.wired.com/2013/09/freedom-hosting-fbi/.
    • (2013) Wired
    • Poulsen, K.1
  • 31
    • 84957538788 scopus 로고    scopus 로고
    • The Tor Project’s commitment to security is exemplified by their extensive release notes for the Tor Browser Bundle, and Tor’s core
    • The Tor Project’s commitment to security is exemplified by their extensive release notes for the Tor Browser Bundle, and Tor’s core. See https://blog.torproject.org/category/tags/release.
  • 32
    • 84957838105 scopus 로고    scopus 로고
    • The Tor Network: A Global Inquiry into the Legal Status of Anonymity Networks
    • Keith D. Watson, ‘The Tor Network: A Global Inquiry into the Legal Status of Anonymity Networks’, Washington University Global Studies Law Review, no. 11, 2012, pp. 718-723.
    • (2012) Washington University Global Studies Law Review , Issue.11 , pp. 718-723
    • Watson, K.D.1
  • 33
    • 84957547764 scopus 로고    scopus 로고
    • SecDev Foundation, 27 October
    • SecDev Foundation, ‘Syrian Regime Tightens Access to Secure Online Communications’, 27 October 2015, http://new.secdev-foundation.org/syrian-regime-tightens-access-tosecure-online-communications.
    • (2015) Syrian Regime Tightens Access to Secure Online Communications
  • 34
    • 84957541714 scopus 로고    scopus 로고
    • Tor: Hidden Services and Deanonymisation
    • Gareth Owen, ‘Tor: Hidden Services and Deanonymisation’, presentation at Chaos Computer Club Conference 2004, https://www.youtube.com/watch?v=-oTEoLB-ses;Alex
    • Chaos Computer Club Conference 2004
    • Owen, G.1
  • 35
    • 84881248798 scopus 로고    scopus 로고
    • Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
    • 19 May
    • Biryukov, Ivan Pustogarov and R. Weinmann, ‘Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization’, 2013 IEEE Symposium on Security and Privacy, 19 May 2013, pp. 80-94, https://doi.org/10.1109/SP.2013.15
    • (2013) 2013 IEEE Symposium on Security and Privacy , pp. 80-94
    • Biryukov, I.P.1    Weinmann, R.2
  • 36
    • 84882252578 scopus 로고    scopus 로고
    • A Review of the Available Content on Tor Hidden Services: The Case Against Further Development
    • Clement Guitton, ‘A Review of the Available Content on Tor Hidden Services: The Case Against Further Development’, Computers in Human Behavior, vol. 29, no. 6, 2013, pp. 2805-15.
    • (2013) Computers in Human Behavior , vol.29 , Issue.6 , pp. 2805-2815
    • Guitton, C.1
  • 38
    • 84957576528 scopus 로고    scopus 로고
    • Tor Project, 26 February
    • ‘Some Statistics About Onions’, Tor Project, 26 February 2015, https://blog.torproject.org/blog/some-statistics-about-onions.
    • (2015) Some Statistics about Onions
  • 40
    • 84988360764 scopus 로고    scopus 로고
    • Content and Popularity Analysis of Tor Hidden Services
    • Madrid, 30 June
    • Alex Biryukov et al., ‘Content and Popularity Analysis of Tor Hidden Services’, Distributed Computing Systems Workshop, 2014 IEEE 34th International, Madrid, 30 June 2014, pp. 188-93, https://doi.org/10.1109/ICDCSW.2014.20.
    • (2014) Distributed Computing Systems Workshop, 2014 IEEE 34Th International , pp. 188-193
    • Biryukov, A.1
  • 42
    • 84910678276 scopus 로고    scopus 로고
    • and the hidden-service repository Ahmia, which registers 5,197 active hidden services as of 10 January, These numbers approximately match our own
    • Biryukov et al., ‘Content and Popularity Analysis of Tor Hidden Services’; and the hidden-service repository Ahmia.fi, available at http://ahmia.fi, which registers 5,197 active hidden services as of 10 January 2016. These numbers approximately match our own.
    • (2016) Content and Popularity Analysis of Tor Hidden Services
    • Biryukov1
  • 43
    • 84957575159 scopus 로고    scopus 로고
    • Our findings are comparable in scale to those using the previous approaches mentioned
    • Our findings are comparable in scale to those using the previous approaches mentioned.
  • 45
    • 84957570805 scopus 로고    scopus 로고
    • DDoS stands for Distributed Denial of Service, a technique in which the attacker floods the victim service with more traffic than it can handle, thereby preventing legitimate users from accessing it
    • DDoS stands for Distributed Denial of Service, a technique in which the attacker floods the victim service with more traffic than it can handle, thereby preventing legitimate users from accessing it.
  • 47
    • 84957578503 scopus 로고    scopus 로고
    • From the home page of a small vendor website named ‘Unique Notes’
    • From the home page of a small vendor website named ‘Unique Notes’.
  • 48
    • 84957606850 scopus 로고    scopus 로고
    • Dozens Nabbed in Takedown of Cybercrime Forum Darkode
    • In a recent example, the shuttering of the Darkode underground market and subsequent arrests have led to the site’s resurfacing as a hidden service. See , 15 July
    • In a recent example, the shuttering of the Darkode underground market and subsequent arrests have led to the site’s resurfacing as a hidden service. See Kim Zetter, ‘Dozens Nabbed in Takedown of Cybercrime Forum Darkode’, Wired, 15 July 2015, http://www.wired.com/2015/07/dozens-nabbed-takedown-cybercrime-forum-darkode/
    • (2015) Wired
    • Zetter, K.1
  • 49
    • 84957591091 scopus 로고    scopus 로고
    • Hacker Forum Darkode is Back and Safer than Ever
    • 28 July
    • Liat Clark, ‘Hacker Forum Darkode is Back and Safer than Ever’, Wired, 28 July 2015, http://www.wired.co.uk/news/archive/2015-07/28/darkode-back-and-more-secure.
    • (2015) Wired
    • Clark, L.1
  • 50
    • 84957568078 scopus 로고    scopus 로고
    • Often called ‘Bitcoin mixers’, these services generate a stream of transactions to turn investigations into a highly complex procedure
    • Often called ‘Bitcoin mixers’, these services generate a stream of transactions to turn investigations into a highly complex procedure.
  • 51
    • 84957579475 scopus 로고    scopus 로고
    • Website named. Website named ‘Dark Tor Drugs’. Website named ‘paste.lolz’, a darknetbased clone of the popular textual posting site Pastebin
    • Website named ‘CleanCoin - Low-Fee Bitcoin Mixing/Tumbling/Laundry Service’, URL withheld. Website named ‘Dark Tor Drugs’, URL withheld. Website named ‘paste.lolz’, a darknetbased clone of the popular textual posting site Pastebin (http://pastebin.com), URL withheld.
    • Cleancoin - Low-Fee Bitcoin Mixing/Tumbling/Laundry Service
  • 52
    • 84957538399 scopus 로고    scopus 로고
    • The front page of a website named ‘Meet My Sisters’
    • The front page of a website named ‘Meet My Sisters’, URL withheld.
  • 53
    • 84957550092 scopus 로고    scopus 로고
    • Website named ‘Pedo List’, discussion named ‘13 Year-Olds Have Sex’
    • Website named ‘Pedo List’, discussion named ‘13 Year-Olds Have Sex’, URL withheld.
  • 54
    • 84957603005 scopus 로고    scopus 로고
    • Website named ‘Hitman Network- Hire Real Killers With Bitcoin, the Only True Hitman Site on the Deep Web’
    • Website named ‘Hitman Network- Hire Real Killers With Bitcoin, the Only True Hitman Site on the Deep Web’, URL withheld.
  • 55
    • 84957576498 scopus 로고    scopus 로고
    • email to Wei Dai, 4 March
    • Michael G. Reed, ‘Re: Onion Routing’, email to Wei Dai, 4 March 1997, http://www.onion-router.net/Archives/onions-1997.txt.
    • (1997) Re: Onion Routing
    • Reed, M.G.1
  • 56
    • 34948854809 scopus 로고    scopus 로고
    • Deploying Low-Latency Anonymity: Design Challenges and Social Factors
    • September/October
    • Roger Dingledine, Nick Mathewson and Paul Syverson, ‘Deploying Low-Latency Anonymity: Design Challenges and Social Factors’, IEEE Security & Privacy, vol. 5, no. 5, September/October 2007, pp. 83-7.
    • (2007) IEEE Security & Privacy , vol.5 , Issue.5 , pp. 83-87
    • Dingledine, R.1    Mathewson, N.2    Syverson, P.3
  • 58
    • 84957558618 scopus 로고
    • 20 February
    • Timothy May, ‘Re: Blacknet Worries’, email to cypherpunks@toad.com, 20 February 1994.
    • (1994) Re: Blacknet Worries
    • May, T.1
  • 59
    • 84957593039 scopus 로고
    • The line was commonly repeated among cypherpunks. See, for example, email to the Vice President of the United States, copied to, 21 July
    • The line was commonly repeated among cypherpunks. See, for example, Loren James Rittle, ‘The Clipper Chip Proposal’, email to the Vice President of the United States, copied to cypherpunks@toad.com, 21 July 1994.
    • (1994) The Clipper Chip Proposal
    • Rittle, L.J.1
  • 60
    • 0346771431 scopus 로고
    • Crypto Rebels
    • May/June
    • Stephen Levy, ‘Crypto Rebels’, Wired, May/June 1993, pp. 54-61.
    • (1993) Wired , pp. 54-61
    • Levy, S.1
  • 61
    • 84957546288 scopus 로고    scopus 로고
    • ‘We advocate encryption’, said Robert Hannigan, the director of the spy agency, in November 2015
    • ‘We advocate encryption’, said Robert Hannigan, the director of the spy agency, in November 2015.
  • 62
    • 84957584949 scopus 로고    scopus 로고
    • GCHQ Director Blasts Free Market, Says UK Must Be a “Sovereign Cryptographic Nation
    • 15 November
    • Alexander J. Martin, ‘GCHQ Director Blasts Free Market, Says UK Must Be a “Sovereign Cryptographic Nation”’, Register, 15 November 2015, http://www.theregister.co.uk/2015/11/10/gchq_director_speech/.
    • (2015) Register
    • Martin, A.J.1
  • 63
    • 84957588983 scopus 로고    scopus 로고
    • This is a counterproductive term. The controversial draft UK Investigatory Powers Bill, for example, does not call for back doors; instead, the government may demand that communicationservice providers remove end-to-end encryption from specific user accounts if presented with a warrant. Maintaining such a capability is not technically a back door
    • This is a counterproductive term. The controversial draft UK Investigatory Powers Bill, for example, does not call for back doors; instead, the government may demand that communicationservice providers remove end-to-end encryption from specific user accounts if presented with a warrant. Maintaining such a capability is not technically a back door.
  • 64
    • 85047930936 scopus 로고    scopus 로고
    • Obama Wont Seek Access to Encrypted User Data’
    • 11 October, Even before the White House’s decision, the Home Office had decided that the Investigatory Powers Bill would probably not change the legislative status quo on encryption in the UK. Thomas Rid, conversation with senior Home Office officials, 9 October 2015
    • Nicole Perlroth and David Sanger, ‘Obama Won’t Seek Access to Encrypted User Data’, New York Times, 11 October 2015, p. A24. Even before the White House’s decision, the Home Office had decided that the Investigatory Powers Bill would probably not change the legislative status quo on encryption in the UK. Thomas Rid, conversation with senior Home Office officials, 9 October 2015.
    • (2015) New York Times
    • Perlroth, N.1    Sanger, D.2
  • 66
    • 77049121293 scopus 로고    scopus 로고
    • Valet Services: Improving Hidden Servers with a Personal Touch
    • 1 January
    • Lasse Øverlier and Paul Syverson, ‘Valet Services: Improving Hidden Servers with a Personal Touch’, Privacy Enhancing Technologies, 1 January 2006, pp. 223-44.
    • (2006) Privacy Enhancing Technologies , pp. 223-244
    • Øverlier, L.1    Syverson, P.2
  • 67
    • 0001495881 scopus 로고    scopus 로고
    • The Eternity Service
    • October
    • Ross Anderson, ‘The Eternity Service’, Proceedings of PRAGOCRYPT, October 1996, pp. 242-52.
    • (1996) Proceedings of PRAGOCRYPT , pp. 242-252
    • Anderson, R.1
  • 71
    • 84957541384 scopus 로고    scopus 로고
    • Genuine Onion: Simple, Fast, Flexible, and Cheap Website Authentication
    • May
    • Paul Syverson and Griffin Boyce, ‘Genuine Onion: Simple, Fast, Flexible, and Cheap Website Authentication’, IEEE Workshop on Web 2.0 Security and Privacy, May 2015, http://www.nrl.navy.mil/itd/chacs/sites/www.nrl.navy.mil.itd.chacs/files/pdfs/15-1231-0478.pdf.
    • (2015) IEEE Workshop on Web 2.0 Security and Privacy
    • Syverson, P.1    Boyce, G.2
  • 72
    • 84957546613 scopus 로고    scopus 로고
    • For an overview, see, DuckDuckGo
    • For an overview, see ‘The Official SecureDrop Directory’, http://secrdrop5wyphb5x.onion/directory. DuckDuckGo is at http://3g2upl4pq6kufc4m.onion/
    • The Official Securedrop Directory
  • 73
    • 84957587564 scopus 로고    scopus 로고
    • ProPublica, the Darknet’s first major news site
    • ProPublica, the Darknet’s first major news site, is at http://www.propub3r6espa33w.onion/.
  • 74
    • 84957554112 scopus 로고    scopus 로고
    • The first news site was possibly Kavkaz Center, a Chechen jihadi site launched in 2013
    • The first news site was possibly Kavkaz Center, a Chechen jihadi site launched in 2013.
  • 75
    • 84957590084 scopus 로고    scopus 로고
    • conversation with authors, 1 April
    • Alec Muffett, conversation with authors, 1 April 2015.
    • (2015)
    • Muffett, A.1
  • 76
    • 84957593852 scopus 로고    scopus 로고
    • Strongbox and Aaron Swartz
    • For an introduction, see, 14 May
    • For an introduction, see Kevin Poulsen, ‘Strongbox and Aaron Swartz’, New Yorker, 14 May 2013.
    • (2013) New Yorker
    • Poulsen, K.1
  • 77
    • 84957546541 scopus 로고    scopus 로고
    • Tor Project, 31 December 2014, especially Roger Dingledine’s posts, as ‘arma’
    • See ‘Tor: 80 Percent of ??? Percent of 1-2 Percent Abusive’, Tor Project, 31 December 2014, especially Roger Dingledine’s posts, as ‘arma’, https://blog.torproject.org/blog/tor-80-percent-percent-1-2-percent-abusive.
    • Tor: 80 Percent of ??? Percent of 1-2 Percent Abusive
  • 79
    • 84957591988 scopus 로고    scopus 로고
    • Hidden Services Need Some Love
    • 22 April
    • ‘Hidden Services Need Some Love’, Tor Project, 22 April 2013, https://blog.torproject.org/blog/hidden-services-need-some-love.
    • (2013) Tor Project
  • 80
  • 81
    • 84957583251 scopus 로고    scopus 로고
    • Jeffersons Draft’
    • Princeton, NJ: Princeton University Press
    • Thomas Jefferson, ‘Jefferson’s Draft’, in The Papers of Thomas Jefferson, Volume 30: 1 January 1798 to 31 January 1799 (Princeton, NJ: Princeton University Press, 2003), pp. 536-43, available at https://jeffersonpapers.princeton.edu/selected-documents/jefferson%E2%80%99s-draft.
    • (2003) The Papers of Thomas Jefferson, Volume 30: 1 January 1798 to 31 January 1799 , pp. 536-543
    • Jefferson, T.1
  • 82
    • 84946210077 scopus 로고    scopus 로고
    • New York: OR
    • Julian Assange, Cypherpunks (New York: OR, 2012), p. 4.
    • (2012) Cypherpunks , pp. 4
    • Assange, J.1
  • 83
    • 84957571122 scopus 로고    scopus 로고
    • ISIS Now Has a Propaganda Site on the Dark Web
    • 16 November
    • Joseph Cox, ‘ISIS Now Has a Propaganda Site on the Dark Web’, Motherboard, 16 November 2015, http://motherboard.vice.com/read/isis-now-has-a-propaganda-site-onthe-dark-web.
    • (2015) Motherboard
    • Cox, J.1
  • 84
    • 84957545520 scopus 로고    scopus 로고
    • Learning More About the GFWs Active Probing System’
    • For details, see, 14 September
    • For details, see ‘Learning More About the GFW’s Active Probing System’, Tor Project, 14 September 2015.
    • (2015) Tor Project
  • 85
    • 84957554894 scopus 로고    scopus 로고
    • Russia Wants to Block Tor, but it Probably Cant’
    • 18 February
    • Kari Paul, ‘Russia Wants to Block Tor, but it Probably Can’t’, Motherboard, 18 February 2015, http://motherboard.vice.com/read/russia-wants-to-blocktor-but-it-probably-cant.
    • (2015) Motherboard
    • Paul, K.1
  • 86
    • 84957559584 scopus 로고    scopus 로고
    • Russia Moves to Ban Tor and Anonymous Web Surfing
    • 10 February
    • Oren Dotan, ‘Russia Moves to Ban Tor and Anonymous Web Surfing’, Vocativ, 10 February 2015, http://www.vocativ.com/tech/internet/dark-net-russia/.
    • (2015) Vocativ
    • Dotan, O.1
  • 87
    • 84957582835 scopus 로고    scopus 로고
    • For an introduction, see, New York: Oxford University Press
    • For an introduction, see John Bew, Realpolitik: A History (New York: Oxford University Press, 2016).
    • (2016) Realpolitik: A History
    • Bew, J.1
  • 88
    • 85056405754 scopus 로고    scopus 로고
    • The Trust Machine
    • See, 31 October
    • See ‘The Trust Machine’, The Economist, 31 October 2015, http://www.economist.com/news/leaders/21677198-technologybehind-bitcoin-could-transformhow-economy-works-trust-machine.
    • (2015) The Economist
  • 89
    • 84957565150 scopus 로고    scopus 로고
    • One caveat that does not affect our argument: some commercial products, such as Symantec Encryption Desktop, use open-source code; and some non-profit crypto systems are not open-source, such as Wickr, an endto-end encrypted app. Some large communication-service providers also argue that their system architecture may not allow them to remove encryption. Author conversations with three global end-to-end encryption providers, November-December
    • One caveat that does not affect our argument: some commercial products, such as Symantec Encryption Desktop, use open-source code; and some non-profit crypto systems are not open-source, such as Wickr, an endto-end encrypted app. Some large communication-service providers also argue that their system architecture may not allow them to remove encryption. Author conversations with three global end-to-end encryption providers, November-December 2015.
    • (2015)
  • 90
    • 84957549378 scopus 로고    scopus 로고
    • Brazil Restores WhatsApp Service After Brief Ban
    • 18 December
    • Vindu Goel and Vinod Sreeharsha, ‘Brazil Restores WhatsApp Service After Brief Ban’, New York Times, 18 December 2015, p. A10.
    • (2015) New York Times
    • Goel, V.1    Sreeharsha, V.2
  • 92
    • 84957574950 scopus 로고    scopus 로고
    • [director-general for cyber security at GCHQ], witness statement to Investigatory Powers Tribunal, IPT/14/85/CH, 16 November
    • Ciaran Martin [director-general for cyber security at GCHQ], witness statement to Investigatory Powers Tribunal, IPT/14/85/CH, 16 November 2015, pp. 4-8.
    • (2015) , pp. 4-8
    • Martin, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.