Warianty tytułu
Języki publikacji
Abstrakty
New technologies transform modern societies and create new threats related to anonymity on the Internet. The aim of the present paper is to outline the history, functioning and current scope of application of The Onion Router. The paper analyses the issue of anonymity on the Internet which triggered a number of international, social and political problems and became the driving force for the development of TOR network. The author discusses the significance of TOR network for free flow of information and freedom of social communication and shows the wide thematic range of its resources. Other issues presented in the paper include: the payment system used in TOR network which is based on Bitcoin, a cryptocurrency which proved to be an ideal form of payment in illegal transactions; the most frequently committed cybercrimes and new, previously unknown forms of illicit cyberbehaviour based on anonymizing technologies which pose a challenge for law enforcement agencies and the judicial systems. TOR network by offering full anonymity to the world of crime, considerably contributes to the development of cybercrime and takes the illegal activity in an entirely new dimension. TOR network although originally created with good intentions, has turned into a global threat.(original abstract)
Rocznik
Numer
Strony
26--31
Opis fizyczny
Twórcy
autor
- Universitas Opoliensis
Bibliografia
- Bergman, M. (2001). The Deep Web: Surfacing Hidden Value. Journal of Electronic Publishing.
- Golański, A. (2017). Upadek narkotyków bazarów AlpaBay i Hansa: prywatność jest za trudna?. Dobreprogramy.pl.
- Handlujbezpiecznie.pl. (2014). Polish Black Market.
- Hołyst, B. (2014). Bezpieczeństwo jednostki. Warszawa: PWN.
- Howell O'Neill, P. (2014). The darkest net. The Kernel Issues- kernelmag.dailydot.com.
- Howell O'Neill, P. (2014). The Deep Web's biggest child porn sites are closing ranks. The Kernel Issues- kernelmag.dailydot.com.
- Howell O'Neill, P. (2017). Tor's ex-director: The criminal use of Tor has become overwhelming. Cyberscoop.com.
- https://Dailymail.co.uk
- https://metrics.torproject.org/userstats-bridge-table.html https://new.secdev-foundation.org
- https://oedb.org/ilibrarian/invisible-web/
- https://web.archive.org/web/20130610072640/http://weirderweb.com/2013/06/06/back-in-booming-lolita-city-the-online-child-pornography-community-is- thriving
- https://www.torproject.org/about/sponsors.html.en
- Lake, E. (2013). Hitman network says it accepts Bitcoins to murder for hire. Thedailybeast.com.
- Majdan, K. (2016). Tu jest wszystko co nielegalne. Odsłaniamy tajemnice ukrytej sieci. Forsal.pl.
- Mazurczak, K. (2015). Anonimowe płatności internetowe wykorzystywane w cyberprzestępczości. Istota kryptowaluty Bitcoin. De Securitate et Defensione. O Bezpieczeństwie i Obronności.
- Moore, D. and Rid, T. (2016). Cryptopolitics and the Darknet. Survival.
- Szydłowski, T. (2018). Wszystko co trzeba wiedzieć o sieci cebulowej. Komputerswiat.pl.
- Szymankiewicz, M. (2014). Bitcoin. Wirtualna waluta Internetu. Warszawa.
- Watson, K. (2012). The Tor Network: A Global Inquiry into the Legal Status of Anonymity Networks. Washington University Global Studies Law Review.
- Weber, R. and Heinrich, U. (2012). Anonymization,. Springer.
- Wood, J. (2010). The Darknet: A Digital Copyright Revolution. Richmond Journal of Law and Technology
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000171552191