• Complain

Gehl Robert W. - Weaving the dark web: legitimacy on freenet, Tor, and I2P

Here you can read online Gehl Robert W. - Weaving the dark web: legitimacy on freenet, Tor, and I2P full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Cambridge;MA, year: 2018, publisher: MIT Press, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Gehl Robert W. Weaving the dark web: legitimacy on freenet, Tor, and I2P

Weaving the dark web: legitimacy on freenet, Tor, and I2P: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Weaving the dark web: legitimacy on freenet, Tor, and I2P" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Intro; Contents; Acknowledgments; 1 Introduction; What Is the Dark Web?; Methodology: Dark Web Situational Analysis; Pragmatic Keyword Analysis; Plan of the Book; Caveats and Shortcomings; Notes; 2 Violence, Propriety, Authenticity: A Symbolic Economy of the Dark Web; Three Legitimacies; Objects and Power; Further Articulating Legitimacy and Dark Web; A Symbolic/Material Economy of Legitimacy; The Dark Webs Trials of Legitimacy; Notes; 3 The Dark Web Network Builders; Freenet: The Web, Decentralized and Anonymized; The Tor Project: From Free Haven to Hidden Services;An exploration of the Dark Web--websites accessible only with special routing software--that examines the history of three anonymizing networks, Freenet, Tor, and I2P.

Gehl Robert W.: author's other books


Who wrote Weaving the dark web: legitimacy on freenet, Tor, and I2P? Find out the surname, the name of the author of the book and a list of all author's works by series.

Weaving the dark web: legitimacy on freenet, Tor, and I2P — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Weaving the dark web: legitimacy on freenet, Tor, and I2P" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

The Information Society Series

Laura DeNardis and Michael Zimmer, Series Editors

Interfaces on Trial 2.0, Jonathan Band and Masanobu Katoh

Opening Standards: The Global Politics of Interoperability, Laura DeNardis, editor

The Reputation Society: How Online Opinions Are Reshaping the Offline World, Hassan Masum and Mark Tovey, editors

The Digital Rights Movement: The Role of Technology in Subverting Digital Copyright, Hector Postigo

Technologies of Choice? ICTs, Development, and the Capabilities Approach, Dorothea Kleine

Pirate Politics: The New Information Policy Contests, Patrick Burkart

After Access: The Mobile Internet and Inclusion in the Developing World, Jonathan Donner

The World Made Meme: Public Conversations and Participatory Media, Ryan Milner

The End of Ownership: Personal Property in the Digital Economy, Aaron Perzanowski and Jason Schultz

Digital Countercultures and the Struggle for Community, Jessica Lingel

Protecting Children Online? Cyberbullying Policies of Social Media Companies, Tijana Milosevic

Authors, Users, and Pirates: Copyright Law and Subjectivity, James Meese

Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P, Robert W. Gehl

Weaving the Dark Web
Legitimacy on Freenet, Tor, and I2P

Robert W. Gehl

The MIT Press

Cambridge, Massachusetts

London, England

2018 Robert W. Gehl

All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher.

This book was set in ITC Stone Serif Std by Toppan Best-set Premedia Limited. Printed and bound in the United States of America.

Library of Congress Cataloging-in-Publication Data is available.

ISBN: 978-0-262-03826-3

eISBN 9780262347570

ePub Version 1.0

I wrote parts of this while looking around for my father, who died while I wrote this book. I miss seeing him sitting at his desk among his books, looking over his glasses, typing, thinking, smiling.

Acknowledgments

Multiple people read portions of this book and offered generous and critical feedback. Nathalie Marchal read chapter 3 and offered copious amounts of correction to factual errors, for which Im grateful. Shes also been a great panel mate at meetings of the Association of Internet Researchers (AOIR), and Im looking forward to reading more of her work. Megan Cullinan, Oscar Mejia, and Jeremy Freed, all PhD students at Utah, read early versions of the manuscript and helped me clarify the legitimacies. Michael Stevenson, Maria Bakardjieva, and Fenwick McKelvey, who have become great collaborators and friends, also provided lengthy feedback on the manuscript or advice at key stages. And of course, I am deeply indebted to the editors and peer reviewers at the MIT Press. Gita Manaktala, Michael Zimmer, and Laura DeNardis have been tremendously supportive of this project, and the three peer reviewers did a thorough job examining a later draft of the manuscript. One of them later revealed himself to be Nicholas John, and I am very flattered that the author of The Age of Sharing supported the publication of my book. The staff at the MIT Press, including Virginia Crossman, Kyle Gipson, and Susan Clark, have been wonderful to work with. Special thanks goes to Melanie Mallon who copyedited the manuscript, checking up on every linkno small task in a book about the Dark Web.

I met many of the above people through AOIR, and I need to acknowledge the support of that organization. When Im asked about writing, I often use the clich of the roller coaster: sometimes Im up, and sometimes Im down. At one very low point in writing this book, I got a surprise e-mail from AOIR informing me that my last book won that organizations Nancy Baym Book Award. Immediately, the writing roller coaster went back up, and I returned to this manuscript with new energy. I owe a lot to AOIR for that.

I am grateful to Graham Denyer Willis, Jaime Amparo Alves, and Jim Martin for discussions at the Policing the City symposium at Stanford University about legitimacy, the state, and trust in online interactions. Angele Christin served as a respondent to my presentation (an early version of chapter 4) and her comments were invaluable. Firat Bozcali deserves extra praise for all the work he did making Policing the City a success. I also presented parts of chapter 4 to the iSchool at the University of Texas. Daniel Carter, a PhD student who arranged my trip, has my thanks, as do the faculty and students there who attended my talk. Special thanks go to the dean of the iSchool, Andrew Dillon, who expressed enthusiasm for my work, and to Casey Boyle for feedback, beer, and ramen. Finally, my gratitude goes to the Critical Genealogies Workshop, particularly Brad Stone, Perry Zurn, Colin Koopman, Andrew Dilts, and Verena Erlenbusch.

Like my previous work, this book was influenced by my friends from my time at George Mason. Professor Paul Smith once gave me a D. In a moment I will never forget, he corrected me in class when I said legitimate use of force by reminding me that its legitimated use of force. Denise Albanese invited me to return to Mason to speak to the cultural studies program, where I got feedback on chapter 5 from my advisor Hugh Gusterson as well as faculty members Roger Lancaster and Tim Gibson. PhD students and alumni there, especially Fan Yang and Gavin Mueller, also provided comments. I owe a debt to Katy Razzano, who pointed out the link between state discourses of legitimated violence and nonstate, hacker appropriations of those discourses. She also allowed me to guest lecture in two of her media courses.

And, of course, I could not do this work without the support of my friends at my home university, the University of Utah. Several colleagues deserve special thanks: Kevin Coe for enthusiasm over my citation of M. C. Hammer; Avery Holton for generously helping research Twitter hashtags; Rachel Griffin for the best hallway conversations; Mike Freemole for help with computer meltdowns; David Roh and Lisa Swanstrom for inviting me to participate in digital humanities; Michael Middleton for all he doeswin; Ashley Givens for putting together the soccer team; Sean Lawson and Cynthia Love for their cooking, thinking, and friendship; and Lucas Moyer Horner for his calmness, camaraderie, and for letting me beat him at games on rare occasions. Above all others at Utah, I have to thank Kent Ono and Dianne Harris who provided career support that is increasingly rare in the academy. Their work made mine possible.

This book could not have been written without guides to the Dark Web. I found one such guide, as well as a collaborator, in G. M. H. His idea to host a literary magazine on Tor was brilliant, and I was honored to help with that project. Thanks for showing me all things counter, original, spare, strange. I found other guides on Galaxy and later Galaxy2, some now gone, but many still active. Thanks to Lameth for doing the work of keeping that social network alive for so long. And my gratitude goes to all those who took the time to talk Dark Web with me in interviews.

More than anyone, however, I have to thank my family. My son, Teddy, was patient with me, even as I became a grumpy writer-dad. He also helped me practice soccer. My partner, Jesse: I am not sure how to thank her. My best bet is to take her on a long vacation (consider this a promise!). I wrote portions of this book while visiting my in-laws, Joe and Karen, who have treated me like a son. I wrote other parts at my moms house. My mom taught me the importance of writing. I feel I did the best writing at her house.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Weaving the dark web: legitimacy on freenet, Tor, and I2P»

Look at similar books to Weaving the dark web: legitimacy on freenet, Tor, and I2P. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Weaving the dark web: legitimacy on freenet, Tor, and I2P»

Discussion, reviews of the book Weaving the dark web: legitimacy on freenet, Tor, and I2P and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.