The Darknet and the Future of Content Distribution by Shruthi B Krishnan Agenda Introduction What is darknet? Features of darknet Evolution of darknet Introducing content into darknet Methods of policing Conclusions Introduction Copying or distributing content in digital format is easier Legal vs. illegal distribution of content Terms used • Objects • Users • Hosts What is darknet? Darknet is a collection of networks and technologies used to share digital content Assumptions • Any widely distributed object is available to some users in a form that permits copying • Users copy available and interesting objects • Users have high-bandwidth channels Infrastructure requirements Input facilities Transmission facilities Output facilities Search mechanisms/ database Caching mechanism Target infrastructure requirements to fight darknet Evolution of darknet – Early Small-World networks “Sneaker net” of floppy disks and tapes Limitations • Latency • Lack of search engines Interconnected Small-World networks Evolution of darknet – contd Central Internet Servers Internet displaced sneaker net – reduced latency and powerful search mechanisms Centralized storage and search Efficient for legal online commerce Poor support for illegal object distribution Evolution of darknet – contd Peer-to-peer networks (Napster) Distributed storage of objects – injection, storage, distribution & consumption of objects done by users Centralized database for searching – became the legal target Evolution of darknet – contd Peer-to-peer networks (Gnutella) Distributed object storage and distributed database To reach any host on Gnutella darknet, a peer needs one or few participating peer-IP addresses Open protocol Fully distributed darknets How robust are they? Free riding • Downloading objects without sharing them • Some users sacrifice their resources, free-riders don’t Lack of anonymity • Server end-points can be determined Fully distributed darknets – Attacks Introducing content into darknet – Conditional Access systems Subscribers are given access to objects based on a service contract Customers have no access to channels they are not entitled to Can freely use channels subscribed for Introducing content into darknet (contd) – DRM systems Client obtains • Encrypted content • License specifying how to use BOBE-strong vs. BOBE-weak systems Renewability Introducing content into darknet (contd) – using software Mainly used to secure computer programs Bind software to a host – program won’t work on an unlicensed machine Machine id should not be virtualizable Code to perform bind-checks should be resistant to tampering Policing hosts – Watermarking Embeds an indelible, invisible mark on content Concerns about the robustness of the embedding layer Key management Watermark detectors in software or hardware Policing hosts (contd) – Fingerprinting Supplier marks the object with an individualized mark identifying the purchaser If shared on darknet, purchaser is identified No key-distribution needed Expensive Collusion attacks Conclusion Technological implications • Even strong DRM systems can fail • Watermark detectors have not made an impact Competition to legal commerce Evidence that darknet will continue to exist Questions….
© Copyright 2026 Paperzz