Defending privacy: The development and deployment of a darknet

Conor Mc Manamon, Fredrick Mtenzi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

New measures imposed by governments, Internet service providers and other third parties which threaten the state of privacy are also opening new avenues to protecting it. The unwarranted scrutiny of legitimate services such as file hosters and the BitTorrent protocol, once relatively unknown to the casual Internet user, is becoming more obvious. The darknet is a rising contender against these new measures and will preserve the default right to privacy of Internet users. A darknet is defined in the context of file sharing as a network which operates on top of another network such as the Internet for the purpose of secure and private distribution of digital material. While there are other darknet applications in existence, such as Freenet, WASTE again, and Relakks, they harbour some caveats. Whether they be proprietary solutions, depend on other services, are prone to feature creep or have security shortcomings, there is room for improvement. The aim of this paper is to address and improve on some of the problems of these alternative darknet clients with the development of a lightweight darknet application suite - Umbra. It is then demonstrated how its deployment can circumvent or defeat the draconian measures currently threatening privacy in the public domain.

Original languageEnglish
Title of host publication2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010
Publication statusPublished - 2010
Externally publishedYes
Event2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010 - London, United Kingdom
Duration: 8 Nov 201011 Nov 2010

Publication series

Name2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010

Conference

Conference2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010
Country/TerritoryUnited Kingdom
CityLondon
Period8/11/1011/11/10

Fingerprint

Dive into the research topics of 'Defending privacy: The development and deployment of a darknet'. Together they form a unique fingerprint.

Cite this