Peter Biddle's research while affiliated with Microsoft and other places

Publications (2)

Article
We investigate the darknet - a collection of networks and technologies used to share digital content. The darknet is not a separate physical network but an application and protocol layer riding on existing networks. Examples of darknets are peer-to-peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. The last...
Conference Paper
We investigate the darknet - a collection of networks and technologies used to share digital content. The darknet is not a separate physical network but an application and protocol layer riding on exist- ing networks. Examples of darknets are peer to peer file sharing, CD and DVD copying, and key or password sharing on email and newsgroups. The las...

Citations

... The German journalist, activist, and scholar Moßbrucker (2019) emphasizes encrypted communication and the right to anonymity as a central task of 'journalists' digital self-defense.' He suggests that journalistic practice and technological innovations should encompass features of the 'darknet,' a collection of networks and technologies for sharing content (Biddle, England, Peinado, & Willman, 2003) attuned to privacy and anonymity that counters traceability and surveillance. Moßbrucker (2019) argues that darknet features should become basic components of journalistic tools and could be transformed, with political and economic support, into a standard infrastructure for current communication tools. ...
... As described by Masson and Bancroft in their paper, Dark Net is a growing cryptomarket for exchange of illicit drugs within the users which is not sort of scams, traps, hackers, and threats [9]. Privacy and security are part of the fundamental drivers for users to adopt the Dark Web [10], which has motivated our research to understand and analyze the existing research studying different aspects of privacy and security of the Dark Net, including but not limited to the illegal markets hosted in the Dark Web, the deanonymization techniques of Dark Net users, the attack landscapes, as well as the existing user studies since users are a critical component to the Dark Net architecture [11]. By examining the distinct aspects of Dark Net security and privacy, a comprehensive analysis of these aspects will contribute to the countermeasures taken to defend against malicious activities on the Dark Net promoted by unethical users. ...