If you are old enough, you probably remember Napster, a music downloading service using peer-to-peer (P2P) technology. Before Napster, file sharing, or any network service for that matter, used the client-server model, where a server is responsible for handling client requests. If there are many clients requesting services simultaneously, the server will be overloaded and unable to respond in time. On the contrary, in a P2P system, everyone in the network (a node) is both a client and a server. Every node has something that others want. Many communications between two nodes can take place at the same time, thus eliminating the server bottleneck.
However, one critical thing remains to be done: determining who has something that somebody wants. Napster was a service for locating the data or resources that existed in a node. Therefore, when the data (for example, music in MP3 form) violated copyright law, Napster became an easy target for law enforcement bureaus. As a result, various techniques have been developed to distribute the data location information in the network itself. Still, law enforcement officials could infiltrate the P2P network and find all of the machines distributing the illegal material.
To prevent such a scenario from happening, some P2P networks adopt a policy that requires users to register to use the P2P network, isolating it from nonregistered users. This is called a darknet. This paper tries to find out some statistical data from these darknets.
Alas, the data dissected seemed to be too intuitive. For example, since becoming a user in a darknet requires an invitation and approval, users in a darknet feel safer exchanging copyrighted material. Therefore, they put the data online for a longer amount of time, making it readily available and reducing the downloading time. It would be interesting to know what types of content are exchanged most often in a darknet. What kind of people use darknets? Is anonymity allowed and protected?