- 0x90. See James, Lance
- 4chan, 183
- Activists, 39, 69, 102, 138, 222, 228–229
- Actor-network theory, 9, 130, 132
- AFKindex, 145
- Agorism, 16, 89–91, 94–103, 108, 112–114, 116
- Agorism.info, 99, 119
- Ahmia, 134, 136–138, 140–141, 145, 147–149. See also Nurmi, Juha; Search engines
- Algorithm, 12–13, 64, 74–77, 92, 141, 145, 147, 149, 151
- Alongside Night, 99. See also Agorism
- AlphaBay, 67, 108, 112–113, 116–119, 228
- Alt-right, 187, 228
- Amazon, 39, 99, 110, 112, 141, 201
- Anarchism, 7–8, 46, 68, 96, 98, 101, 224
- Anarplex, 99
- Android, 64, 150
- Ano+, 184. See also Social networking sites
- anonCommFramework, 63. See also Invisible Internet Project; jrandom
- Anonymity, 45–46, 58, 140
- Clear Web and, 55
- networks and, 6, 54, 60, 62–63, 75, 91, 210
- politics and, 45, 67–70, 76, 225–230
- research and, 11, 58
- search engines and, 130, 134, 136, 149
- social networking sites and, 160, 188, 208–209
- theories of, 59, 74
- Anonymous, 227
- Antifa, 175–176, 187
- Apache, 91, 93, 141, 169
- Apache Lucene, 141
- Appelbaum, Jacob, 75–76, 195–196, 200, 204–207
- Apple, 198–200, 205–207, 226
- Appropriation, 15, 28, 66, 132–133, 162, 211. See also Symbolic economy
- of legitimacy, 19, 42–43
- of violence, 16, 45, 89–90, 94, 105, 112–116
- Arbitration, 97
- Archive.org, 18, 78
- Archives, 3, 10–11, 14, 17, 53, 90, 100, 133, 139, 146, 189, 204, 226
- Ashley Madison, 2, 45
- Aupers, Stef, 111–112
- Authentication, 162, 183, 189, 197
- Authenticity, 3, 14–17, 146, 195, 205, 230
- and Galaxy2, 174, 177, 179, 181–189
- and legitimacy, 161–168
- in markets, 100, 112, 118
- among network builders, 53–54, 73, 77
- symbolic economy and, 34–40, 42–44, 46
- Babenhauserheide, Arne, 137, 144
- Banet-Weiser, Sarah, 164
- Banning, 145, 170, 173, 186
- Barratt, Monica, 11, 18, 227
- Bartlett, Jamie, 4, 7–8
- Bastards, 40–41, 101
- Bauman, Zygmunt, 225–226
- BBC, 106
- Beast, 134, 150. See also Search engines
- Bendix, Regina, 187
- Bergman, Michael, 4
- Beyer, Jessica, 30, 170
- Bing, 149, 151
- Bitcoin, 92–93, 100, 111–112, 119, 175
- scams and, 109, 148
- surveillance and, 139
- and tumbling, 92, 107, 141
- BitTorrent, 9, 64, 119
- Black Lives Matter, 175, 225
- Blockchain, 93
- Blogs, 106
- on the Dark Web, 19, 58, 61, 135, 179
- Boellstorff, Tom, 11
- Bombe, 57
- Bonjour, 198, 200
- Bourdieu, Pierre, 35, 39–40, 42, 73, 165–167
- Bowan, Kate, 165
- Bowles, Samuel, 114
- boyd, danah, 185
- Branwen, Gwern, 10, 100
- Bratich, Jack, 115
- Browne, Harry, 99
- Bullshit, 34–35, 38, 46, 76, 108, 161, 164
- Callon, Michel, 9, 130–131
- Canada, 117–118, 140
- Candle, 134, 150
- Carding, 110
- Catfishing, 182–183
- Cazes, Alexandre, 117–119, 163
- Celebrity, 77
- Censorship, 66, 72, 74, 98, 185–186, 199, 222
- and the domain name system, 54, 199
- and search engines, 145–146
- and social networking sites, 170, 173
- Central Intelligence Agency, 209
- Centralization, 55–56, 62–63, 92–93, 137, 141, 169, 197, 199
- CERN, 78
- Certificate authorities, 201–202. See also Certificate Authority/Browser Forum
- Certificate Authority/Browser Forum, 202–207
- Chans, 174, 183
- Chat, 7, 10, 19, 61, 133, 135, 139, 174, 179
- Cheng, Vincent, 166
- Cheshire, Stuart, 197–199, 207
- Child exploitation images, 2, 4, 67, 137, 222, 228–230
- removal from search engine results, 145–149
- and social networking sites, 161, 171, 186, 212
- Child pornography, 7, 143, 145–146, 170, 172, 186, 223. See also Child exploitation images
- China, 65–67
- Christin, Nicholas, 139, 186
- Chrome, 5
- Chun, Wendy, 12, 137
- Civility, 172–174, 186, 224, 228
- Clarke, Adele, 9–10, 13–14
- Clarke, Ian, 54–55, 57–58, 60, 65, 70, 74, 78
- Clear Web, 13, 18–19, 60, 91, 141, 160, 223, 230
- definition of, 5–7
- links to, 104, 177, 180
- mirror sites, 99, 228
- relationship to the Dark Web, 17, 46, 72, 93, 118, 151, 168, 208–213
- surveillance on, 140, 184–187, 226
- Clinton, Hillary, 43, 171
- Cloners, 147–149, 202, 210
- Closed Shell System, 178. See also Marianas Web
- CNN, 43, 172
- Coleman, Gabriella, 11, 227
- Comey, James, 2, 6, 19, 67
- Communication, 3, 28, 30, 46, 53, 72, 132, 137, 175, 177, 184, 186, 213
- and digital networks, 59, 61–64
- encryption of, 2, 6, 74
- organizational and managerial, 14, 31–32, 38, 128
- strategic, 33
- surveillance of, 17, 65–69, 140, 223–230
- and violence, 16, 89–90, 115–118, 229
- Communications Security Establishment Canada, 140
- Communism, 98
- Communities of practice, 15, 34, 74, 76–77
- Computer science, 3, 12, 17, 46, 54, 58, 73–74, 76, 138, 211
- Consecration, 42, 112, 150, 165–167, 177–178, 181, 211
- Cooren, François, 132
- Corporations, 1, 6, 17, 42, 46, 210–211, 223, 225–226
- corporate social media, 2, 160, 162, 171, 185, 187, 200–201
- and propriety, 3, 28–34, 37, 44, 69–70, 127–132, 163, 195–196
- surveillance by, 7, 55, 66–67, 136, 151
- Counter-economics, 96, 101. See also Agorism; Konkin, Samuel Edward, III
- Counterfeits, 25–27, 38, 46, 141, 164
- Cox, Joseph, 115
- Credit cards, 1–2, 7, 46, 93, 110, 226. See also Carding
- Crime, 39, 138–139, 228
- Cryptocurrencies, 92, 100, 118, 221
- CSS, 5–6, 57, 63, 99
- Cult of the Dead Cow, 204
- Cultural studies, 27
- Curation, 146
- CVS, 62
- Czarniawska, Barbara, 130–131
- Daily Stormer, 228
- Dark Matters, 160–161, 168, 173, 189. See also Social networking sites
- Dark Net, 4, 7, 9
- Darknet Counterfeit Forum, 109
- Darknet Market Archives, 10
- Darknet Market Avengers, 117
- Dark Web,
- agorism on, 99–100
- definitions of, 4–5, 7–9, 127
- and Facebook, 201, 209–214
- history of, 54–64
- Internet standards and, 195–197, 199
- markets on, 25, 89–94, 102–104, 117–119
- nonusers of, 135–137, 143
- OPSEC on, 107–116
- search engines on, 16, 130, 133
- social networking sites on, 16–17, 159–161, 168–170, 174, 184–187, 189
- trial of legitimacy, 26–28, 37–39, 44–46, 67, 223, 228–230
- Dark Web site administrators, 2, 16, 39, 46, 179, 210, 229–231
- arrests of, 117, 228
- interviews with, 3, 14, 19, 27, 221–223
- and markets, 6, 91–94, 100
- OPSEC among, 107, 111–113
- scams performed by, 109
- and search engines, 135, 142–143
- and social networking sites, 159–161, 168–169, 171–176, 186–189, 209, 228
- DARPA, 70, 139–140, 151
- Dash, 92. See also Cryptocurrencies
- Databases, 4, 93, 108, 110–111, 130, 141, 143, 149
- DDOS, 115, 142, 172
- Dealers, 2, 27, 39, 160, 186
- Deanonymization, 6, 69, 140, 180, 226
- Decentralization, 27, 92–93, 99, 144, 209
- Deep Dot Web, 93, 135, 141
- Deep Web, 4, 7–8, 19, 127, 213
- Delegitimation, 17, 108, 111, 132–133, 195, 205, 210–212. See also Symbolic economy
- and authenticity, 174, 177, 186, 188, 224
- and symbolic economy, 40, 43–45, 162
- and violence, 65–68, 90, 97, 102–103, 116, 140, 144–145, 197, 229–230
- Demant, Jakob, 103
- DigiCert, 195, 202, 210–211
- Dingledine, Roger, 58–61, 65, 70, 74–75, 209–210
- Direct.i2p, 143, 146. See also Search engines
- Discourse, 9–10, 16, 66, 113, 131, 169, 197
- and agorism, 102–103
- and anonymity, 224, 227, 229
- and authenticity, 164, 166
- and organizations, 128
- and states, 30–31, 45–46
- Dissidents, 2, 7, 45, 58, 66–68, 74–75, 196, 202, 222
- Distributed Hash Table, 93
- Documentation, 12, 74–75, 106, 110, 141
- Domain name system (DNS), 54–56, 60, 64, 141, 196, 199–200, 204, 206, 211, 214
- Domain squatting, 203, 214
- Doxing, 11, 18, 54, 100, 102, 162, 181, 227
- Dread Pirate Roberts, 89, 101. See also Silk Road; Ulbricht, Ross
- DreamHost, 226
- Drugs, 25, 93–95, 105, 138, 160, 186, 197, 212
- and authenticity, 34, 46, 167
- and Grams, 6
- markets for, 7, 91, 107, 139, 187, 221
- and the Silk Road, 2, 16, 38, 89, 98–102, 137, 201, 222
- users of, 112
- vendors, 27, 141
- War on Drugs, 39, 109, 115–117, 229
- DuckDuckGo, 70, 223
- eBay, 39, 91, 99
- Eepsites, 26, 46, 75, 91, 99, 137, 141, 229
- development of, 63–64, 196–199
- Eepsites.i2p, 134, 150
- Electronic Frontier Foundation, 70, 137–138
- Elgg, 169, 174
- elgoog, 134, 149. See also Search engines
- E-mail, 59, 64, 70, 93, 204
- archives, 3, 53, 72, 200, 207–208
- and encryption, 107, 176, 180
- and OPSEC, 107, 117–118
- protocols, 9
- Encryption, 2, 4, 6, 19, 67–69, 105–106, 137, 180–181, 184, 224. See also PGP
- and algorithms, 12–13, 74–77, 92
- and Freenet, 55–56
- and the Invisible Internet Project, 64
- and onion routing, 59
- and SSL, 201, 210
- Enzo, 57, 134, 136, 140, 145, 150. See also Search engines
- Epsilon, 134, 150. See also Search engines
- Ethereum, 92. See also Cryptocurrencies
- Ethnography, 11, 186, 214, 227
- EuroGuns, 67
- Europol, 116–117
- Evolution, 109
- Exchange, 58, 62, 138, 176–178, 181, 222. See also Symbolic economy
- of legitimacy, 15, 19, 28, 40–42, 44–45, 64, 71, 77, 132–133, 150, 162, 167, 174, 204, 211, 230
- and markets, 89, 91–98, 102, 113–114
- Exit node, 65, 72, 180
- Exit scam, 109
- Extended Validation certificates, 17, 195, 197, 202, 205, 208–209
- Extremists, 4, 7
- Facebook, 5, 33, 37, 160, 162, 168–169, 184–185, 187, 223, 226–227, 230
- and markets, 2
- as a Tor hidden service, 7, 17, 195–197, 201, 207, 223
- Fairhurst, Gail, 132
- Fake news, 43, 212
- Fascism, 98, 102, 120, 176, 225
- Federal Bureau of Investigation, 67, 116–117
- Feminism, 9, 184, 222
- File sharing, 57, 62
- Firefox, 5–6
- Flaming, 75, 170–171
- Flogs, 58
- FMS, 99
- Forrest, Katherine, 103
- Forums, 7, 19, 26, 45, 135, 139, 148, 167, 174, 176, 179
- and archives, 10, 14, 74
- and markets, 25, 38, 89–90, 92–94, 99–104, 107–113, 117, 139
- and tc.i2p, 63, 78
- and the Youth Liberation Front, 221–223, 229–230
- and zzz.i2p, 200, 207
- Foucault, Michel, 9–10, 41
- Fproxy, 57
- Free and Open Source Software, 2, 77, 199–200, 204, 207, 228
- development of, 12, 55, 62
- and Elgg, 169
- and markets, 93
- and propriety, 69, 71–72
- Freedman, Michael, 58–59
- Freedom Hosting, 195
- Freegle, 134, 149. See also Search engines
- Free Haven, 58–60, 74, 209
- Freenet, 5–6, 11–12, 17–19, 26, 103, 127, 130, 147, 178, 213, 222–224, 227–230. See also Babenhauserheide, Arne; Bombe; Clarke, Ian; Enzo; Freesites; McNab, David
- and agorism, 98–99
- development of, 15, 25, 39, 45–46, 53–58, 209
- and legitimacy, 64
- and markets, 91, 103
- relationship to Invisible Internet Project, 61–64
- relationship to Tor Project, 58–60
- and search engines, 16, 133–137, 140–145, 147, 149–151
- social networking sites on, 2, 160–161, 184
- FreenetUser, 145
- Freesites, 26, 46, 57–58, 62, 91, 99, 143–145, 229. See also Fproxy; jSite
- Free speech, 27, 39, 45, 222
- FreeWeb, 57
- “Fuck you” messages, 160–161, 173, 187, 189
- Fullz, 110. See also Carding
- Galaxy, 168–170, 173, 209. See also Social networking sites
- Galaxy2, 16, 18, 161–162, 168, 209–210, 228, 230. See also Social networking sites
- Gawker, 99–100
- Genealogy, 10, 40–41, 102, 106
- Gintis, Herbert, 114
- Globaleaks, 45, 138
- Global War on Terror, 66, 224
- GNUnet, 5, 196, 200, 203, 205, 210
- Google, 149–151, 178–179, 226–227
- and the Deep Web, 4–5, 127
- Google Translate, 18
- indexing of Dark Web, 4, 16
- relation to Dark Web search engines, 46, 127, 134–142
- sponsorship of Dark Web projects, 70
- Google Summer of Code, 138
- Government Communications Headquarters, 140
- Grams, 6, 18, 134, 141, 150. See also Search engines
- Griffith, Virgil, 151
- Grothoff, Christian, 196–197, 199–201, 203–207, 211, 214
- Grugq, the, 104–110, 115, 118
- Guide Review Board, 112. See also AlphaBay
- Guitton, Clarence, 228
- Guns, 2, 67, 138, 197, 212
- Hacking, 12, 56, 137, 165, 211, 213, 227
- and authenticity, 37–38, 76, 165, 177–179
- and the Invisible Internet Project, 72–75, 77
- and legitimacy, 42, 44–46, 195–196, 204
- and markets, 110
- and violence, 68, 104–105, 115–116
- Hammer, M. C., 34
- Harassment, 160, 184, 187–189, 228
- Harper, David, 111–112
- Harvard, 58, 208
- Heavy metal, 167, 169
- Helmond, Anne, 12, 61
- Hermes Center for Transparency and Digital Human Rights, 138
- Heterogeneity, 9–10, 13, 130, 132, 135–137
- Hidden Answers, 3, 109
- Hidden Wiki, 60, 221
- Hierarchy, 36, 96, 151, 163, 209–210
- Hine, Christine, 186
- Hip hop, 35, 42, 167–168
- Holland, 117, 228
- Hosts.txt, 64
- HTML, 5–6, 9, 56–57, 143
- HTTPS, 78, 119, 189, 195, 201–202, 208–210, 214. See also Certificate authorities; Extended Validation certificates
- Hub, the, 107–108, 113, 117
- Human trafficking, 139
- Hunsinger, Jeremy, 2, 19, 167
- I2Phreak, 143. See also Direct.i2p
- ID3NT, 184. See also Social networking sites
- Identity, 142, 162, 164, 186
- and anonymity, 45, 55, 57, 59–60, 70–71, 74, 77, 136, 223–225
- and authenticity, 37–38
- and Extended Validation certificates, 7, 196–197, 201
- and Facebook, 208–211, 213
- and gender, 175, 182–184, 187–189
- and Internet Protocol addresses, 6
- online and offline, 11
- and OPSEC, 107
- and PGP, 92, 169
- and pseudonymity, 168, 173–174, 179–181
- theft of, 7, 93, 110–111, 117
- Ignatious Toopie, 72
- Infrastructure, 9, 30, 55, 59, 131, 214
- Inheritance, 15–16, 40–41, 64, 71, 90, 114, 162, 168–169, 211. See also Symbolic economy
- of Google’s legitimacy, 46, 128, 149–150
- Internet Archive, 57. See also Archive.org
- Internet Assigned Names Authority, 196
- Internet Corporation for Assigned Names and Numbers, 196–200, 203, 211, 213
- Internet Engineering Task Force, 195–201, 203–207, 210, 214
- Internet Freedom, 68, 151
- Internet Relay Chat, 3, 9–10, 61–62, 70, 72, 99, 133
- Invisible Internet Project, 2–3, 5–6, 15. See also Invisible IRC Project; James, Lance; jrandom; zzz
- development of, 15, 45–46, 53, 61, 195–200
- relation to Tor Project, 211
- and search engines, 134–137, 142
- Invisible IRC Project, 61–64, 69, 72
- IP addresses, 5–6, 55, 62, 140–142, 200, 226
- Iraq War, 106
- Israel, 171, 184
- James, Lance, 60–65, 67, 69, 72–73
- Jargon, 46, 74
- Java, 55, 63–64, 143, 178
- John, Nicholas A., 13
- Journalists, 27, 36, 38, 42, 46, 70, 115
- coverage of the Dark Web, 90, 99, 100, 110, 137, 195
- definitions of the Dark Web, 4, 7
- and legitimacy exchange, 42, 46
- jrandom, 63–68, 70, 73, 75–76, 195, 214
- jSite, 57
- Keyword analysis, 13–14, 26
- König, Rene, 149, 151
- Konkin, Samuel Edward, III, 90, 94–100, 113–114, 119. See also Agorism
- Krochmal, Marc, 197–199, 214
- Krueger, 209. See also Galaxy
- Lameth, 169–170, 172–177, 181, 184–189, 228. See also Galaxy2
- Latency, 59, 61–63, 91, 211
- Latzko-Toth, Guillaume, 26
- Law, John, 9, 130, 132, 147
- Law enforcement, 2–3, 16, 27, 43, 70, 105, 110, 167, 170, 228–229
- and the Dark Web, 13, 45
- and markets, 89–91, 93, 107, 109–112, 117–118
- and search engines, 134–140, 144
- and social networking sites, 159–161
- and violence, 28–29, 31, 95, 97, 116, 129, 175
- Lawson, Sean, 42, 115
- LeFevre, Robert, 95, 98
- Legitimacy, 53, 89–90, 95–96, 185–189, 197, 199, 204, 211. See also Authenticity; Propriety; Symbolic economy; Violence
- definitions of, 28–46
- and delegitimation, 97
- as a keyword, 9–11, 13–17, 26
- and network builders, 64–74, 76–78
- and organizations, 127–134, 138, 147, 161–170
- and self-legitimation, 19, 30, 33
- and social networking sites, 173–175
- and technical knowledge, 177, 195–196
- trial of, 2–4, 26–27, 44, 67, 223, 227–230
- Legitimists, 40
- LGBTQ, 175
- Libertarianism, 16, 46, 89, 94–96, 98–99, 101, 108, 114, 119
- Linux, 169, 175, 177–178
- .local, 198, 200, 205–207. See also RFC 6762
- localhost, 5, 62, 198
- Machine learning, 148
- Maddox, Alexia, 11, 18, 100, 102, 227
- Mailing lists, 73–75, 78, 133, 135, 204, 206–207
- archives, 10, 14, 133
- and Freenet, 25, 39
- and the Invisible Internet Project, 62–63
- and the Tor Project, 59, 200
- Malcolm, Jeremy, 137–138
- Mallein, Phillipe, 26, 44
- Manichaean science, 69, 116, 118
- Manifesto.i2p, 222
- Man-in-the-middle attack, 148. See also Cloners
- Maréchal, Nathalie, 68
- Marianas Web, 178. See also Closed Shell System
- Marines United, 212
- Marketplace, 67, 91, 99, 118, 212
- Markets, 2, 6–7, 13, 15–16, 19, 61, 78, 129, 135, 139, 167, 187, 221, 226, 228. See also Agorism; AlphaBay; Darknet Counterfeit Forum; EuroGuns; Grams; Silk Road
- black, 45, 67, 94, 96, 100, 102, 138
- gray, 96, 102
- politics of, 103
- prohibitions against, 170
- sociotechnical features of, 91–94
- Martin, James, 12, 32, 119, 139
- Marwick, Alice, 36, 185
- Masculinity, 46, 167, 183, 187–188
- Mathewson, Nick, 60
- McKelvey, Fenwick, 30
- McNab, David, 57, 143
- McNaughton, Chris, 149
- Memes, 10, 30, 183
- Memex, 139–140. See also Search engines
- Milblogs, 106
- Military, 15, 31, 42–43, 70, 89, 103, 115–116, 184, 229. See also OPSEC (operations security), origins of
- United States, 16
- and violence, 29, 38, 65, 95, 97, 112
- Mises, Ludwig von, 98, 119
- MIT, 58, 201
- Mix-nets, 58–59
- Molnar, David, 58–59
- Monero, 92. See also Cryptocurrencies
- Money, 1, 7, 38, 101, 109, 113
- MoniTOR, 142, 146, 148. See also Search engines
- MP3s, 57, 62, 74, 143
- Muffett, Alec, 196, 202, 204–207
- MultiVerse, 159–161, 168, 189. See also “Fuck you” messages; Social networking sites
- Munksgaard, Rasmus, 103
- MySQL, 91, 169
- n00bs, 161, 178–179
- Namecoin, 196, 199–200, 203–205, 210–211
- Name collision, 198, 208
- Napster, 57
- Nationalism, 37–38
- National Security Agency, 68, 71, 105–106, 225–227
- Nazis, 98, 213, 228. See also Daily Stormer; White supremacism
- Neoliberalism, 113
- New York Times, 2, 55, 57, 212, 223
- NGINX, 93
- Nodes, 44, 55–56, 59, 65, 72, 74, 180. See also Topology
- Nonprofits, 2, 44, 195–196, 200, 210
- Freenet as, 69
- Invisible Internet Project as, 70–71
- and legitimacy, 31, 33–34, 69, 127–129, 211
- Tor Project as, 69, 71
- not Evil, 134–135, 148–149. See also Search engines
- Nurmi, Juha, 135, 137–138, 141, 145, 149. See also Ahmia
- Obligatory points of passage, 16, 131
- Onion.link, 127, 134, 150–151
- Onion routing, 59–60
- OpenBazaar, 93, 119
- OPSEC (operations security), 45, 94, 175, 179, 229
- origins of, 105–107
- politics of, 15–16, 111–119
- use on Dark Web markets, 89–90, 103–104, 107–111
- Organizations, 28, 38, 45–46, 65, 96, 102, 197, 203, 210–211, 229. See also Communication, organizational and managerial; Nonprofits; Propriety
- and Free and Open Source Software, 200
- legitimacy of, 15, 31–34, 53–54, 69–73, 77, 127–134
- and OPSEC, 106
- and power, 163, 165
- search engines as, 16
- Ormsby, Eileen, 100, 108–109
- Outlaw Market, 108
- Oxford English Dictionary, 34
- Pace, Jonathan, 109
- Palestine, 167, 171, 184, 213
- Papacharissi, Zizi, 224–225, 227
- Paranoia, 90, 103–104, 110–113, 116, 118. See also OPSEC (operations security), politics of
- Partyarchy, 96, 101. See also Libertarianism
- PDFs, 99, 112, 143
- Peer-to-peer software, 59, 119, 196, 199, 209, 214
- and Freenet, 55–56
- and the Invisible Internet Project, 72
- markets, 93
- search engines, 141
- Personal information, 7, 11, 212
- prohibitions on sharing of, 17, 168, 179–181, 185, 188
- sales of, 2, 110–111
- Pfajfar, Matej, 60
- PGP, 92, 107, 108, 141, 169, 176, 177
- Phillips, Whitney, 114
- PHP, 91, 169, 178
- Pinging, 142
- Playpen, 222, 228. See also Child exploitation images
- Pornography, 4, 8, 19, 135, 170, 172, 223
- Exposed, 183, 187–188
- revenge, 7, 212
- and search engines, 145
- Power, 58, 97, 105, 179, 195, 229
- and authenticity, 34, 112, 162–167, 173, 186
- and discourse, 10–11
- and legitimacy, 3, 15, 28, 37–40, 44, 53, 103
- practices of, 13
- and propriety, 31, 131–132, 210
- and software, 12, 72, 201
- and surveillance, 55
- and violence, 27, 29–30, 45, 65–67, 73, 89–90, 95, 109, 114, 116–118
- Principality of Sealand, 62
- Privacy, 2, 12, 204, 224
- and Internet standards, 196, 199
- and network builders, 58–62, 71
- and research ethics, 18
- search engines and, 130, 138, 140
- and social networking sites, 11, 177, 183, 188, 195
- Propaganda, 38, 46, 67, 212
- Propriety, 3, 14–17, 31–35, 38–40, 53, 127–130, 161–162, 165, 230
- and corporations, 45, 195–196, 204, 210
- and network builders, 69–72
- and search engines, 133, 144, 147, 149
- ProPublica, 2, 210, 223
- Protocols, 9, 12, 16, 63–64, 135, 143, 151, 197–198
- and encryption, 176
- HTTP, 54
- Internet protocol, 5, 62, 184
- SMTP, 63
- Proxies, 57, 61, 148, 150–151, 155, 177, 202
- Purchase of legitimacy, 15, 40, 42, 44, 115, 129, 162, 211
- Purple Dragon, 106. See also OPSEC (operations security)
- Python, 141, 178
- Radical Faeries, 222
- Rasch, Miriam, 149, 151
- Reagan, Ronald, 106
- Reddit, 26, 93, 118, 135, 141, 175, 213
- Red rooms, 45, 212
- Rendezvous points, 60. See also Tor hidden services
- Revenge pornography, 7, 212
- RFC 6761, 197–200, 203–204, 206–207, 214
- RFC 6762, 198, 200, 214
- RFC 7686, 196, 206–208
- Rhetoric, 3, 32, 38, 41–42, 116, 164
- Rid, Thomas, 25, 223, 228
- Rider, Robert, 114
- Robots exclusion standard, 142. See also Search engines; User agent string
- Rothbard, Murray, 98
- Routing, 2, 5–7, 18–19, 59–60, 111, 143. See also Nodes; Topology
- Russia, 18, 148
- Satanism, 171
- Saudi Arabia, 66
- Scams, 13, 46, 116, 138, 144, 167, 202, 212
- on markets, 90, 109–113, 116
- Schulman, J. Neil, 99. See also Agorism; Alongside Night
- Script kiddie, 178
- Search engines, 6, 16, 32, 46, 53, 61, 93, 119, 133, 162, 210, 228
- and Deep Web, 4, 127, 145
- and indexes, 54, 57, 78, 127, 130, 137, 222, 230
- Second Life, 4, 11
- Secondrealm.i2p, 99
- SecureDrop, 45
- Security, 8, 27, 39, 42–44, 66–67, 148, 195, 224–226. See also OPSEC (operations security)
- and agorism, 16, 96–98, 102
- of the domain name system, 199
- of information, 2, 46, 68, 76, 78, 110, 181
- of networks, 62, 75, 202, 210
- of software, 12, 72, 93
- Seeker, 134, 140, 150. See also Search engines
- Selfies, 182–184, 189
- September 11, 2001 attacks, 66
- Serres, Michel, 132, 147
- Sessions, Jeff, 116, 118
- Silk Road, 2, 25, 38–39, 46, 89–92, 137, 139, 168, 201, 205, 211
- agorism on, 16, 99–103, 114–119
- seizure of, 103, 107–109, 195, 222
- Silk Road 2.0, 109
- Silk Road Reloaded, 91
- Snowden, Edward, 77, 91, 204, 225
- Social construction, 36, 41
- Social engineering, 38, 111
- Social justice, 222–223, 229–230
- Social media, 7, 226. See also Social networking sites
- and legitimacy, 31, 33, 36
- Social networking sites, 13, 19, 26, 119, 135, 151, 212. See also Dark Matters; Facebook; Galaxy; Galaxy2; ID3NT; MultiVerse; Sone
- on the Clear Web, 185, 187, 209
- on the Dark Web, 10–11, 45, 53, 58, 78, 222
- Sociology, 4, 9, 29–30, 32, 37–38, 41, 44, 128
- Sociotechnical systems, 89–91, 94, 100, 131
- Software studies, 12
- Sone, 184, 230
- Spam, 25, 27, 39, 45
- Special-Use Domain Name, 196–206
- SSL, 6, 201–202. See also Extended Validation certificates
- Star, Susan Leigh, 9, 130–131, 214
- Start-ups, 26, 38, 128
- Stats.i2p, 75
- Stevenson, Michael, 35
- Suchman, Mark, 32, 39, 128
- Surveillance, 17, 58, 94, 136, 151, 185, 195, 223–229
- corporate, 7
- by states, 29, 39, 66–68, 71, 78, 90, 111, 140
- Swartz, Aaron, 138
- Symbolic economy, 15, 17, 27–28, 40, 44, 46, 54, 65–66, 97, 129, 132, 167–168. See also Appropriation; Delegitimation; Exchange; Inheritance; Purchase of legitimacy
- Syverson, Paul, 59–60
- Taxes, 31, 42, 69, 95–96, 100–102
- tc.i2p, 63, 78
- TCP, 63
- Technical standards, 73, 200
- Techno-elitism, 177, 179, 184
- Terrorism, 2, 4, 7, 43, 160, 186, 212, 224
- Terrorist’s Handbook, 67–68
- Thailand, 117–118
- Thatcher, Margaret, 113
- Top-level domain, 196
- Topology, 73, 75–77, 119, 130, 143, 149, 178, 214. See also Nodes; Peer-to-peer software
- centralized, 93
- small-world, 55
- Tor2Web, 150–151
- Tor Child Protection Agency, 176
- Tor hidden services, 26, 46, 99, 212–213, 221–223, 228–229
- and cloners, 147–148
- and corporate sites, 2
- development of, 60
- and Extended Validation certificates, 17, 195–197, 201–205, 208–210
- lists of, 175
- and markets, 89, 91, 99
- renaming as “onions,” 8, 205
- and search engines, 127, 137–139, 141, 144
- and social networking sites, 168–170
- Tor Project, 15, 53, 58, 137, 196, 200, 203, 223. See also Free Haven
- finances of, 68, 71, 211
- history of, 58
- legitimacy and, 17, 74–77, 138
- marketing and, 8, 72
- as a nonprofit, 70, 195
- TorSearch, 149
- Toseland, Matthew, 135–136
- Toussaint, Yves, 26, 44
- Trolls, 4, 171–172, 202
- Trump, Donald J., 39, 43–44, 226
- Truth and Light, 1, 3, 13
- Twitter, 2, 33, 37, 64, 160, 169–172, 184–187, 200, 213
- Ulbricht, Ross, 89–90, 100–103, 107–109, 118, 163, 195. See also Dread Pirate Roberts; Silk Road
- Uniform Resource Locator (URL), 54, 64, 75, 99, 143, 146–147, 201, 209
- United States of America, 43, 69, 98, 105
- Unix philosophy, 75
- Urban Dictionary, 34
- U.S. Department of Justice, 116–117, 226
- U.S. Department of State, 68, 70
- User agent string, 142
- Van Leeuwen, Theo, 165
- Vendors, 13, 25, 91–93, 99, 107–108, 143, 167
- of drugs, 94, 139, 229
- and forums, 94
- and OPSEC, 91, 109–113, 117–118
- and search engines, 6, 134–136, 141
- of stolen information, 2
- Vietnam, 90, 105–106
- Violence, 14, 25, 165
- and agorism, 95–103
- appropriation of, 105, 111, 118
- and communication, 69, 90, 116
- and hacking, 115
- illegitimate, 68, 197, 221
- against pedophiles, 176
- by police, 175
- and the state, 3, 15–16, 28–35, 38, 40, 44–45, 53, 64–66, 77–78, 89, 94, 129, 161–162, 202, 225–230
- and white supremacy, 176
- Virtual private network, 93
- Visibility.i2p, 161, 168–169, 173, 179, 184, 230. See also Social networking sites
- Voice of America, 106
- War on drugs, 39, 109, 115
- Web browsers, 5–9, 57, 63–64, 100, 169, 179
- Weber, Max, 14, 28–31, 35, 37, 39–43, 89, 97, 129
- Web publishing, 15, 53, 57, 60, 63, 78
- Wedow, Suzanne, 112
- Weimann, Gabriel, 7–8
- Whistleblowing, 2, 45, 61, 77, 138
- White supremacism, 175, 187
- Wikileaks, 204
- Wikis, 10, 60, 214, 221–222
- Wire, 169, 172–178, 182, 186. See also Galaxy2
- World Wide Web, 4–6, 53–57, 61–63, 78, 99, 141, 142, 211. See also Clear Web
- Youth Liberation Front, 221–223, 229–230
- YouTube, 26, 41, 104, 172
- Zeitz, Gerald, 128, 130
- Zeronet, 5
- Zimmerman, Monica, 128, 130
- Zotero, 10
- Zuckerberg, Mark, 38, 208
- zzz, 64, 68, 71, 75–76, 146, 150, 200, 206–207