Darknets Coming Soon? 288
Anonymous Stalwart writes "CIO.com is running a story on darknets and their implications for security. With the ruling against Grokster, darknets seem poised to become a reality. How this will impact the future of the workplace, from top-level IT/IS managers all the way to non-IT jobs will depend on how the tech community that is developing this technology treats it."
Ok, real response (Score:5, Insightful)
Once you know its happening, you know you have to identify the problem.
Unless somebody can root all the routers and IDS systems for every OS along the way, these darknets will always be detectable.
Re:Ok, real response (Score:3, Insightful)
Re:Ok, real response (Score:3, Interesting)
Re:Ok, real response (Score:4, Insightful)
TFA was focused on corporate espionage, which wouldn't necessarily consume huge bandwidth. Besides corporate types thnk nothing of sending huge files (video presentations, eg) around, so even sneaking out big files wouldn't necessarily make a blip. Of course, USB dongles and such are a much easier and right-now threat in that regard.
Re:Ok, real response (Score:2, Interesting)
A friend was streaming music at his new job recently. In less than a day they came to find out what he was doing. His 128kbit stream was 30% of the total bandw
Re:Ok, real response (Score:4, Interesting)
Unless you are actually ENGAGED IN RACKETEERING, you will not be charged with it. Wielding the equivalent of a Captain Midnight Secret Decoder Ring is still not illegal.
Here's some clarification of "racketeering" from Dictionary.com:
Main Entry: racketeering
Pronunciation: "ra-k&-'tir-i[ng]
Function: noun
1 : the extortion of money or advantage by threat or force
2 : a pattern of illegal activity (as extortion and murder) that is carried out in furtherance of an enterprise (as a criminal syndicate) which is owned or controlled by those engaged in such activity --see also Racketeer Influenced and Corrupt Organizations Act in the IMPORTANT LAWS section --compare ORGANIZED CRIME
But that's not a problem for IT managers (Score:4, Insightful)
I personally don't see any problems with Darknets that didn't already exist with SSH. If I work in an environment where we don't care what you do, unless it's a problem, then we'll ignore your traffic unless it's excessive. If I work in an environment where we restrict what you can do, then we'll monitor your traffic and if we see unknown encrypted traffic, you'll be asked what it was and your computer will be checked.
So I see Darknets as a problem for the RIAA maybe, and frankly I don't give a shit about them, but not for corperate IT.
Re:Ok, real response (Score:2)
No, but if darknets are detectable, I can just not pass the traffic. Or, perhaps, simply give the packets an exceedingly low priority.
So yeah, you might get your downloaded music... eventually.
Re:Ok, real response (Score:5, Insightful)
Re:Ok, real response (Score:5, Insightful)
Technically, they can look like any kind of encrypted connection, HTTPS, SSH or whatever. Besides, I think the idea of Darknets is flawed to begin with. It is taking current anonymous P2P networks (Freenet, Ants, I2P etc.) and tying both hands behind their back by no longer allowing all-to-all connections, but only connections to people you trust. That pretty much precludes any sensible routing and load balancing because people are selecting the available routes, and you can't create new connections. Say you are the only person with access to two different social groups, all info must flow over your connection creating a huge bottleneck that the software is not allowed to compensate for.
Re:Ok, real response (Score:5, Informative)
Not Really (Score:5, Informative)
Think of an IRC style web. Basically, a properly designed network would allow one party to inform another that it wanted to make a connection. Then it would make that connection. By pre-passing the keys and proof of identity, you would be able to make arbitrary connections within a "closed surface" of the net.
===
What I have been waiting to see make a comeback is the good old fashioned POTS modem. With all the internet wire-tap laws being generally weaker than the phone tapping laws, it would _really_ make sense to transfer authentications (etc) through a old-fashioned BBS style "drop sites" that were not really on the net.
So you downloaded some particular binary splash. To turn it into the song or whatever you would have to go get the key/completion-tidbit. Heck, the actual directores could be encoded so you _couldn't_ know what you were passing unless you were also in on the sideband/drop-site.
Re:Not Really (Score:2)
At which point, you either have a) no scalability (all must trust all) or b) no trust, which negates the entire point of the darknet. Do you trust the friend of a friend of a friend of a friend of a friend or a friend? You've essentially reverted back to current P2P networks w
Scalable Trust Levels (Score:2, Interesting)
Recognizing that there is no such thing as an entirely trustworthy network (unless you know and implicitly trust each individual involved, and their security) couldn't you just implement a scalable trust level? By this I mean limiting the number of hops, or degrees of separation from who you implicitly trust (your 'friends'), to who they implicitly trust, and so on to the unkn
Re:Not Really (Score:3, Interesting)
The BBS's sysop is god, he sees all. But on a dialup BBS, no one other than the sender and recipient can see the content of a given local email. (Barring subpoena, of course.)
Conversely, any node along the internet could intercept and have its way with regular internet email packets.
Nasty thought: you've got BBS software on your c
Re:Not Really (Score:2)
I really hope that a solution like this takes off, I miss the BBS scene, perhaps we can find some way to make FIDOnet and doors into a trusted scheme too. Seriously though the BBS idea is great, with the execption of the Sysop, I've been on many a board (back in the day) that ran into troubles when the Sysop either lost interest, or got pissy. Is there a way to devel
Re:Not Really (Score:3, Informative)
Otherwise, and for maximum snoop-proofing against external forces, one has to be willing to make the phone call to transfer mail (both by users and BBS-to-BBS), which may involve a long distance call, and as with FIDO, often a considerable delay as packets hop from one BBS to the next. (As the old
Re:Not Really (Score:2)
Re:Ok, real response (Score:5, Interesting)
Try monitoring a campus network where you have several thousand users and an obscenely large amount of bandwidth. Oh, and you have live research data being generated on campus and moved to places like the NCSA etc... Bandwidth consumption may vary by tens of megabytes by the minute. So I ask you, in that situation (which I work in) what is an "increase in bandwidth" a sign of?
I don't understand why this article has such a tin foil hat slant to it. Darknets tell nothing about acceptable use, they primarily identify malware and misconfigurations.
Re:Ok, real response (Score:2)
Well, TFA took over 10 minutes to load so now that I have RTFAd I guess the darknets to which I refered are different than the author. However, the bandwidth comment stands.
Re:Ok, real response (Score:4, Interesting)
I have done this and it is much easier than you think. Warez traffic (let's drop this "darknet" term, I always think that it's an end-user-empowered network run over dark fibers) doesn't follow the typical 24-hour cycle in the traffic pattern. The number of legitimate hosts with such a traffic pattern is pretty small in my experience, so it's quite possible to spot the offenders.
Of course, as a network admin, there isn't much you can do when the host admin says that periodic transfers of multiple GB are perfectly legitimate and done for research purposes. But detection is not the real obstacle.
Part of the real issue is that so much traffic on research networks is filesharing and warez crap. If you started to enforce an AUP, the bandwidth would drop to minuscule levels, and you wouldn't have any plausible justification whatsoever for those fat pipes. And people feel they need them because of the dick size wars at some research conferences.
Re:Ok, real response (Score:2)
In other words, massive copyright infringement drives the demand for more bandwith, which drives research, investment and competition, benefitting the societ
Re:Ok, real response (Score:4, Insightful)
Interesting line of thought. But I don't think it's compelling. Contemporary file sharing protocols (especially the search component) are often rather inefficient. Making file sharing clearly legal would make it possible to offer more centralized services supporting it (where it makes sense), which would increase efficiency and reduce bandwidth usage.
On the other hand, if you outlaw file sharing completely and enforce it rigorously, as a user, you'd have to tunnel all file sharing traffic over secure anonymization networks (similar to what Tor does). Each packet would run back and forth through the network, in order to obscure its sender and receiver, tremendously increasing bandwidth requirements. So, following your argument, truly fascist copyright laws would advance networks even more.
Re:Ok, real response (Score:3, Interesting)
Monitoring traffic by source, destination and type (Score:3, Informative)
Effective monitoring is actually quite achievable with freely avalible software.
On a properly managed network you should be able to t
Re:Monitoring traffic by source, destination and t (Score:2)
Is that all you need to do? Ok, as I pointed out it is a university. People pay to be on that network. People who do things that you may find unacceptable are given grants to do those things. This means that when ou see 'bad' traffic, a certain amount of institutional knowledge has to be applied and perhaps investigative skills to determine if said traffic is bad or not
Re:Ok, real response (Score:2)
If you want to try monitoring your high-bandwidth campus network let me recommend our open source solution, Ourmon [pdx.edu]. We've been using it for several years with good results.
Re:Ok, real response (Score:2)
I might take a look at that, but for clarification I didn't mean to imply that we can't monitor the network. My point was simply that a 'blip' in bandwidth is in and of itself meaningless and not 'the way' to monitor.
Re:Ok, real response (Score:2)
these darknets will always be detectable.
While technically true, and usually is you can't tell what is going down the darknet. All you might get is a pair of IP address and quantity of traffic. So far many popular darknet's do not use crypto but many do. It is as simple as IPSec between two or more points. In fact, it is possible today to setup a completely private virtual network of friends over the internet by just configuring the operating environment.
Here is the problem for authorities and I/T se
Re:Ok, real response (Score:2)
Thats also the sign of a new spam source, or a new exploit in the wild, or that your little brother just discovered bittorrent. All it has to do is remain below the level of the rest of the noise out there.
Re:Ok, real response (Score:2)
Traffic modeling could be used to insure that the traffic sent across the Internet is not only encrypted, but that it looks like some other sort of traffic (fake game server or web cam traffic or something, anything that has pa
Dark Ambition (Score:5, Informative)
Re:Dark Ambition (Score:5, Interesting)
I have no problem with uniformly enforcing product liability laws. My problem is with the insanity of today's copyright laws. TFA was very sloppy starting off with a falsehood like
The Supreme Court said no such thing. But the RIAA/MPAA will of course do everything they can to take a mile from this very straightforward inch.
Re:Dark Ambition (Score:5, Interesting)
I don't believe that people who promote illegal acts, whether advertising products or mere advocacy, are liable for the actions of those who take them up on their promotion. I do believe that their free speech can be found to be contributory, a lesser liability, when they have either demonstrated expectations of satisfaction of their promotion, clearly reasonable expectations, willful neglect of developing prior expectations, or even negligent passive ignorance of such expectations. Yelling "fire" in a crowded (nonburning) theater is a lesser crime than shoving someone down the stairs. Liability, especially liability for speech to people with freedom of choice, is not quite so simple. The Supremes have made such speech even more complicated, by ignoring its absence, and finding liability where criminals act without even the speech, just the benefit. That's an economic argument, but not a legal one. And the economics of the industry now employ the prohibitive expense to keep new distributors they don't control out of the competition. With the Court as their enforcer.
Re:Dark Ambition (Score:2)
Hm. With that kind of logic, I guess gun some gun manufactures [bradycampaign.org] could be found libel.
Re:Dark Ambition (Score:2)
Re:Dark Ambition (Score:2)
Re:Dark Ambition (Score:2)
Re:Dark Ambition (Score:2)
Re:Dark Ambition (Score:2)
the RIAA needs to be careful... (Score:5, Insightful)
Just a thought.
Re:the RIAA needs to be careful... (Score:2)
Unless of course, ppl are using encryption methods that the gov. has the ability to crack in a realtime approach, and ppl talk more and do not attempt to hide the data in any other way. Then this will allow the gov. to easily seperate the signal from the noise, as the encrypted packets says where to look.
Re:the RIAA needs to be careful... (Score:2)
Re:the RIAA needs to be careful... (Score:2)
Ignorant AC. The https protocoll uses encryption, and various P2P/IM/VPN can use https to send/recieve data.
Darknets? Blame the RIAA!!! (Score:5, Insightful)
As reported by Darknet dot com [darknet.com], a darknet is nothing more than a place where illegal communication (filesharing/hacking talk/speaking badly of the US president) can take place.
I don't see how darknets will make things any different. For years we've had gopher, IRC and other communication channels that have been below the vision of the management elite.
I think lawyers are starting to learn that techies can't be bullied as easily as most, because techies are able to build new infrastructures. Instead of giving up, techies take threats as a challenge or motivation to dive further and further away from public vision.
Not necessarily illegal (Score:4, Insightful)
Re:Not necessarily illegal (Score:2)
This implies that every application for a VPN could be examined to see whether or not a darknet could do the job better.
Re:Darknets? Blame the RIAA!!! (Score:2, Insightful)
Oh, a place like say...
Re:Darknets? Blame the RIAA!!! (Score:2)
Re:Darknets? Blame the RIAA!!! (Score:2)
while lawyers otoh, get paid by the hour. sit back and grab a beer, this fight ain't going nowhere.
seriously, it's like the cold war, it's against lawyers interests for either side to win, endless escalation is killer for billable hours. this kin
Re:Darknets? Blame the RIAA!!! (Score:4, Interesting)
That's the most reasonable bit of U.S.-bashing I've heard yet on Slashdot. At least you didn't single out all of us as being warmongers or evil or Bush-lovers or whatever. And you're right: we're becoming a remarkably litigious society. Not that I have any idea how to cure the problem.
But your average corporate attorney isn't the problem, he or she is simply a tool, and a symptom of a larger problem. It is bad law, admittedly written by a bunch of lawyers (collectively known as "Congress"), combined with corporate executives who see nothing but dollar signs. Corporate lawyers just don't sit around suing people and companies for fun: somebody has to pay them to do it, and pay them handsomely. Those people are the ones you need to worry about.
You know, like the good folks in charge of Lexmark, Diebold and DirecTV. Laws like the DMCA just gave them an opportunity to put their lawyers to work. All Congress did was give a loaded gun to a bunch of idiots.
Re:Darknets? Blame the RIAA!!! (Score:2)
The obvious, if paradoxical, solution is to sue anyone prepared to resort to litigation....
Um...
I'll get my coat
Re:Darknets? Blame the RIAA!!! (Score:2)
Re:Darknets? Blame the RIAA!!! (Score:3, Interesting)
Another thing that sets the USA apart in a legal sense is
Re:Darknets? Blame the RIAA!!! (Score:2)
Of course, I'm assuming you're talking about the United States. Other countries with a president as head of state may not have the same freedom of speech clauses in their governing documents.
not a new thing! (Score:2)
Just because some random article suddenly applied a new word to a private invitation-only network of individuals doesn't make them new. In the mid-90's when I first went online, I would (try to) hang out with the hacker/phreaker/warez types. Because a lot of what they did was illegal (and btw, they got punished back them just as they d
Re:not a new thing! (Score:3, Interesting)
Sorry, but if you're using the same network and infrastructure as the rest of us then those connections can be monitored, your endpoints mapped, and your packets and traffic patterns analyzed.
I'm quite sure, however, that the NSA appreciates your
Re:Darknets? Blame the RIAA!!! (Score:2)
Dude. If gopher [wikipedia.org] is the only way you can support your argument, no matter what that argument is, you really need to reevaluate your position
But seriously. The US Government was one of the biggest supporters of Gopher. I'd hardly call that 'below the vision'.
Article Text && Coral Cache URI (Score:5, Informative)
---
FILE SHARING
Spies in the Server Closet
BY MICHAEL JACKMAN
The Supreme Court might have stirred up a bigger problem than it settled when it ruled last June that file-sharing networks such as Grokster could be sued if their members pirated copyrighted digital music and video.
Since then, some programmers have announced they would pursue so-called darknets. These private, invitation-only networks can be invisible to even state-of-the-art sleuthing. And although they're attractive as a way to get around the entertainment industry's zeal in prosecuting digital piracy, they could also create a new channel for corporate espionage, says Eric Cole, chief scientist for Lockheed Martin Information Technology.
Cole defines a darknet as a group of individuals who have a covert, dispersed communication channel. While file-sharing networks such as Grokster and even VPNs use public networks to exchange information, with a darknet, he says, "you don't know it's there in the first place."
All an employee has to do to set one up is install file-sharing software written for darknets and invite someone on the outside to join, thus creating a private connection that's unlikely to be detected. "The Internet is so vast, porous and complex, it's easy to set up underground networks that are almost impossible to find and take down," says Cole.
He advises that the best--and perhaps only--defense against darknets is a combination of network security best practices (such as firewalls, intrusion detection systems and intrusion prevention systems) and keeping intellectual property under lock and key. In addition, he says, companies should enact a security policy called "least privilege," which means users are given the least amount of access they need to do their jobs. "Usually if a darknet is set up it's because an individual has too much access," Cole says.
---
Something really smells here (Score:2)
This method also has the advantage of not hooking peopl
Darknets (Score:5, Interesting)
Reminds me of something me and my brother used to do. We wanted to play a game online over the Internet but didn't want to sign up to yet-another online gaming service (The Zone or something it was called). We both had legit copies of the game, we both had internet connections and we just wanted to play online against each other. We couldn't do a straight TCP/IP connection for some reason or another so the only options left in the software were LAN, Modem or this Zone thing.
So what we did was set up PPTP between our routers, assigned nearby IP addresses on both sides that routed across the connection and played a "LAN" game over the Internet. As far as I can see this was a type of darknet if you like.
If we'd had non-legit copies, many games of the era would let you plan LAN without the CD so long as one player had the CD but not across the Internet. Or, say we'd cracked or VirtualCD'd the CD so that neither of us had a legit copy but could still play online. Then this sort of "PPTP darknet" would be used to let groups of friends without the legit CD to play over the Internet without needing the authorisation or intervention of the person running the gaming servers.
A further thought, bringing it up to the modern day, would suggest that things like Steam could be played over this sort of "PPTP darknet" as a LAN game (connecting to PC's spread over the internet, all disconnected from the "real" internet and bypassing restrictions on who / what is allowed to play)?
It's a interesting idea, sort of like a hidden black market for the internet (which I'm assuming is where the name comes from). As companies crack down on people lending movies to their friends and similar other quite legitimate activities, things like this are going to appear, translated from the real world where this happens all the time to the Internet.
It seems to me that these sorts of things have existed for a while, though. I've heard that things like paedophile rings are already using such tactics? Detection is much, much harder than for a centrally administered P2P network. The only way to detect is to infiltrate the network itself, which is basically social engineering?
Re:Darknets (Score:2)
They'll Never Learn! (Score:5, Insightful)
There are a lot of very talented techies out there who can come up with some astonishing new tech. A fully encrypted P2P service that masks a user's IP address would make it hard for "the man" to find those who are illegally filesharing. Also, the hacker community can adapt to changing situations faster than any corporation. This is because they aren't hindered by office politics, ethics, patant and copyright compliance and legal compliance. They operate above the law, so it was really no surprise to me when Slashdot ran the story of the trojan that exploited the cloaking ability of Sony's DRM.
I wasn't surprised one bit.
Because of Grokster and others the RIAA bring down a new, bigger, and better P2P service will emerge with multiple layers of custom encryption, IP address masking, and no central server that can be distrupted. You could even block ports at the ISP level and they'll adapt again to support multiple ports at once. Its a loosing battle they just don't get it yet.
Why do you think Internet Security and Antivirus Industies are racking in so much money these days. They DON'T want to see the hacker put in jail because if all the security threats cease and no more viruses are being made they are all out of a job. It a multi-billion dollar industry.
The RIAA is utter and completely out of their league.
Comment removed (Score:4, Insightful)
And the MPAA/RIAA's response will be... (Score:2, Insightful)
Hell, they'll probably set up a few darknets of their own, as "loss leaders" in their quest to fuck as many people out of as much money as possible. And they'll start
Re:And the MPAA/RIAA's response will be... (Score:2)
Re:And the MPAA/RIAA's response will be... (Score:3, Informative)
Re:And the MPAA/RIAA's response will be... (Score:2)
Hmm. Is there a lobbyist in the house? we need you to elucidate that concept in Washington.
Re:And the MPAA/RIAA's response will be... (Score:2)
Re:And the MPAA/RIAA's response will be... (Score:2)
If you had said the RIAA aren't doing anything illegal. >>, then I'd have said "I don't know you're wrong." You made a very different, and to my mind false, assertion.
Coming? They've always been here. (Score:2)
Small affinity groups always have and always will be more successful at this type of activity than the general public, even when "competition" from the public draws attention, making it difficult for everyone.
Honestly, I love watching p2p networks fall.
Wrong Premise (Score:5, Interesting)
``The Supreme Court might have stirred up a bigger problem than it settled when it ruled last June that file-sharing networks such as Grokster could be sued if their members pirated copyrighted digital music and video.
Since then, some programmers have announced they would pursue so-called darknets.
Am I the only one who thinks that if darknets are attractive vehicles for corporate espionage, they would be built no matter what the Supreme Court rules on filesharing?
Re:Wrong Premise (Score:2)
It would seem quite easy to use a more secure method of encryption (say a one time pad), and hide the message by sending it over a darkn
Two definitions (Score:3, Informative)
One definition is an encrypted protocol over the Internet. The other definition is using wireless technologies off the Internet. Oddly, the person quoted in the CIO article was trying to claim that encrypted, closed file sharing over the Internet was nothing like a VPN. That makes no sense to me, especially given the other definition of a darknet (the wireless one off the Internet) really is nothing like a VPN.
A wireless-off-the-Internet darknet could serve Thomas Paine purposes if the U.S. government ever shuts down the Internet in response to a terrorist attack. An encrypted, closed information sharing network on the Internet could not.
Re:Two definitions (Score:2)
We could fall back to the true Darknet (Score:2, Insightful)
SneakerNet (Score:2)
Already there (Score:4, Informative)
Picking Nits (Score:2)
Invisible or incomprehensible? Seems to me that as long as you're sending data over the same Internet as everybody else, others can see that there's traffic. In that case, this is just like a VPN (invite only, encrypted traffic between endpoints), right?
Re:Picking Nits (Score:2)
old news (Score:2, Informative)
At the next movie release... (Score:2)
Coming soon...to a darknet near you.
Can't stop the signal (Score:5, Insightful)
HOST1: ping -c 1 -p facedead12349876 host2
PATTERN: 0xfacedead12349876
HOST2: tcpdump -x ip proto \\icmp and src host host1 .R....EP$-...lwC
.4.v.....4.v....
.4.v.....4.v....
11:41:51.646216 IP host1 > host2: icmp 64: echo request seq 0
0x0000: 4500 0054 0000 4000 4001 1af7 8752 0886 E..T..@.@....R..
0x0010: 8752 0888 0800 4550 242d 0000 cf6c 7743
0x0020: 25e5 0900 face dead 1234 9876 face dead %........4.v....
0x0030: 1234 9876 face dead 1234 9876 face dead
0x0040: 1234 9876 face dead 1234 9876 face dead
0x0050: 1234
Sure, you'll see a lot of icmp traffic, but odds are most network folks won't considering the pad data in a ping to be payload.
It's like the old ppp over email implementations. Connectivity means data transfer. If some journalist or newbie network admin thinks otherwise, then it's just that much easier.
nah.. this is bunk (Score:2, Insightful)
Darknets have been around a long time (Score:4, Interesting)
That group has lists of what they have rather than the items themselves, so it's fairly easy to check for particular files. Sometimes they'll collaborate on new movies coming out. You bought Batman last month, we'll buy Mr. & Mrs. Smith next month. Maybe one of them has a coupon or gets a copy from a neighbor. And so on. They IM back and forth, but never the FTP address which everyone already knows.
It's not exactly a darknet but the principle is similar. Trusted users, encrypted files. If corporate snoops were going to try and catch that group they'd have to hack their way on to an FTP server, pull files pretty much at random then spend days trying to crack the PGP wrapper. Good luck with that. You might be surprised at how much material five or six different families actually have. Movies, music the differing tastes produce quite a wide selection. They save hundreds, maybe thousands a year and the risk is pretty minimal. And there's no special clients required, just a copy of PGP tools. If that group were 10 people or families instead of five, imagine how much more material would be available?
The real problem (Score:2)
Eventually the law will catch up to practice, but until it does the [RM]PAA will continue to drive it underground. I pr
Darknets have always been around, and always will. (Score:3, Interesting)
Say it with me: darknets have always been here, and they will always be.
Hackers have IRC and other invite-only forums, and all the ways in which they've used them to secretly pass information around without the squares being in on it. P2P networks are darknets (for YOU, anyway) if you don't have software which uses the protocols and don't know anyone who knows about them. ANY new network protocol can be a darknet. You can roll your own anytime you want.
Darknets are the modern equivalent of the Captain Midnight Secret Decoder Ring. They are NOT the Beginning Of The Fall Of Civilization(tm).
Don't believe me? Fine. Be that way. Try this fun experiment:
Write yourself a Java suite that:
CLIENT SIDE:
1. Briefly touches a server, downloads the current list of IP addresses that have announced themselves to the server, announces ITSELF to the server, and then logs off. The server IP is probably best implemented as one of a list of possible server sites, so that if one is compromised (doesn't give the correct handshake or whatever) you just move on to the next one. All communication should be encrypted using the server's public key and YOUR public key (RSA between the two points, or whatever is fashionable in your circle of friends).
2. Lets you compose messages, or file transfers, or whatever, destined for whatever IP address you want to communicate with, again encrypted with both public keys. Maybe you even compress the data first, to reduce bandwidth usage.
3. Lets you "blackball" any IP address you think is compromised. You could implement this as "My PC Only" or as a common blackball pool, which everyone could vote on, or as a common blackball pool which people could consider provisional and accept or not accept.
SERVER SIDE:
1. Manage lists of IP addresses and their status.
2. Provide a handshake which is meant to test whether your software is authentic and you are in fact an approved node. If you're not, you get sucked into a honeypot and studied. You are NOT given an actual IP address list; rather you are given a fake list full of false leads.
3. Allow certain admins to control the system to some extent, ousting problematic members (bans) and so forth. This could alternately be implemented on the client side, with a voting scheme, or whatever.
Bam. Instant darknet. And it's a piece of cake for anyone who's passed the junior-level networking course at any public university. THINK about it -- why do you think anyone studies computer science these days? It sure ain't to find a job... People study computer science to build themselves cool, weird things that stiff, stick-up-their-ass types don't approve of.
Deal, people. The world is not all simple and sparkly, like an amusement park. We are all grown-ups, and we can do grown up things even if it frightens The Man(tm). And, really, computer science is the closest thing any of us gets to wielding supernatural power. Us geeks can do things NOBODY else can do. Why not do them? Why be a boring square if you don't have to? Build something freaky, get yourself one of those weird, off-kilter cover photos in Wired that makes you look like Dr. Evil. Why not? You weren't put on this earth to make Sheeple feel comfy and warm. Fuck 'em.
Re:I know the question we're all asking ourselves: (Score:3, Interesting)
Re:I know the question we're all asking ourselves: (Score:2)
Maybe a darknet is UUCP running on voice-line modems.
Re:I know the question we're all asking ourselves: (Score:4, Informative)
I found this article [darknet.com] about "darknets" that I found informative, even though it's a book ad.
Re:I know the question we're all asking ourselves: (Score:5, Funny)
The first rule of the darknet is that you never talk about the darknet!
Re:I know the question we're all asking ourselves: (Score:2)
N Qnexarg vf n cevingr iveghny argjbex jurer hfref bayl pbaarpg gb crbcyr gurl gehfg. Glcvpnyyl fhpu argjbexf ner fznyy, bsgra jvgu srjre guna 10 hfref rnpu. Va vgf zbfg trareny zrnavat, n Qnexarg pna or nal glcr pybfrq, cevingr tebhc bs crbcyr pbzzhavpngvat, ohg gur anzr vf zbfg bsgra hfrq fcrpvsvpnyyl sbe svyr funevat argjbexf.
Gur grez bevtvangrq sebz Gur Qnexarg naq gur Shgher bs Pbagrag Qvfgevohgvba, na negvpyr ol Crgre Ovqqyr, Cnhy Ratynaq, Znephf Crvanqb, naq Oelna Jvyyzna, sbhe rzcy
Re:I know the question we're all asking ourselves: (Score:2)
Re:I know the question we're all asking ourselves: (Score:2)
And, by the way, the whole thing that starts in tr is a single line.
Re:I know the question we're all asking ourselves: (Score:2)
No, of course not. ROT-13 is the crypto equivalent of leaving the key under the doormat. The biggest use of it I've seen is in discussion groups to "hide" spoilers like movie endings or some such. A real darknet requires reasonably strong crypto. If the RIAA can pick up your traffic with a packet sniffer and trivially decode it, what's the point of doing it in the first place?
Re:was always going to happen (Score:4, Funny)
Re:was always going to happen (Score:2)
Re:Once a upon a time (Score:2)
Or not anymore. They scratched the article that said encryption was considered ammunition, right?
Re:How Fitting (Score:2)
Re:META-NET (Score:2)