Atnaujinkite slapukų nuostatas

El. knyga: Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P

3.87/5 (17 ratings by Goodreads)
(The University of Utah)
  • Formatas: 288 pages
  • Serija: Information Society Series
  • Išleidimo metai: 20-Jul-2018
  • Leidėjas: MIT Press
  • Kalba: eng
  • ISBN-13: 9780262347587
Kitos knygos pagal šią temą:
  • Formatas: 288 pages
  • Serija: Information Society Series
  • Išleidimo metai: 20-Jul-2018
  • Leidėjas: MIT Press
  • Kalba: eng
  • ISBN-13: 9780262347587
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

An exploration of the Dark Web—websites accessible only with special routing software—that examines the history of three anonymizing networks, Freenet, Tor, and I2P. An exploration of the Dark Web—websites accessible only with special routing software—that examines the history of three anonymizing networks, Freenet, Tor, and I2P.The term “Dark Web” conjures up drug markets, unregulated gun sales, stolen credit cards. But, as Robert Gehl points out in Weaving the Dark Web, for each of these illegitimate uses, there are other, legitimate ones: the New York Timess anonymous whistleblowing system, for example, and the use of encryption by political dissidents. Defining the Dark Web straightforwardly as websites that can be accessed only with special routing software, and noting the frequent use of “legitimate” and its variations by users, journalists, and law enforcement to describe Dark Web practices (judging them “legit” or “sh!t”), Gehl uses the concept of legitimacy as a window into the Dark Web. He does so by examining the history of three Dark Web systems: Freenet, Tor, and I2P.Gehl presents three distinct meanings of legitimate: legitimate force, or the states claim to a monopoly on violence; organizational propriety; and authenticity. He explores how Freenet, Tor, and I2P grappled with these different meanings, and then discusses each form of legitimacy in detail by examining Dark Web markets, search engines, and social networking sites. Finally, taking a broader view of the Dark Web, Gehl argues for the value of anonymous political speech in a time of ubiquitous surveillance. If we shut down the Dark Web, he argues, we lose a valuable channel for dissent.
Acknowledgments ix
1 Introduction
1(24)
2 Violence, Propriety, Authenticity: A Symbolic Economy of the Dark Web
25(28)
3 The Dark Web Network Builders
53(36)
4 From Agorism to OPSEC: Dark Web Markets and a Shifting Relationship to the State
89(38)
5 Searching for the Google of the Dark Web
127(32)
6 Being Legit on a Dark Web Social Network
159(36)
7 Facebook and the Dark Web: A Collision
195(26)
8 Conclusion
221(14)
Bibliography 235(30)
Index 265