Abstract

It is inevitable that the rules for using various sources of information in cyberspace keep changing. We are still searching for the best possible form. A form that would, on the one hand, provide us with reliable material, and on the other hand guarantee utmost security and ensure that our interests or any exchange of correspondence or opinion will not be seized by unauthorised individuals or even used against us. In order to meet such needs and expectations, Darknet has been created, in particular TOR network (The Onion Router). The starting point for this paper was the history and principles of TOR, as well as the issue of anonymity and payments with cryptocurrencies. In the further part of the article there is a discussion on the positive and negative opportunities that TOR offers. The paper ends with an indication of possible directions for further work and elaboration.

Highlights

  • Contemporary world is characterised by uncertainty and turbulent variability in science, technology, production as well as the speed of transmission and the significance of information in social life

  • The attitude of particular governments to the TOR network can be extreme in some cases

  • Internal documents in the USA National Security Agency (NSA) refer to Tor as “the king of high-secure, low latency internet anonymity” [3]. Other governments such as those of Saudi Arabia, the United Arab Emirates and Iraq openly condemn the operation of the TOR network and block its sites and access to entry nodes

Read more

Summary

Introduction

Contemporary world is characterised by uncertainty and turbulent variability in science, technology, production as well as the speed of transmission and the significance of information in social life. It is in front of our very eyes that the Fourth Industrial Revolution takes place as we speak. Network users do not wish for cybersecurity mechanisms to be expanded if they are to be used by public authorities through mass electronic surveillance. This problem is known in the literature on the subject as the “cybersecurity paradox” [2].

Objectives
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.