Mass media and journalistic accounts of Darknets have focused disproportionately on their criminogenic aspects. Moreover, research has focused mainly on the Darknet technology Tor. We wish to expand scholars’ knowledge of Darknets by exploring a different Darknet technology, Freenet. Using a combination of content analysis and grounded theory, this research asked three progressively complex questions. First, we asked: What are the types of content and the distribution of content on Freenet ? Our findings show that Freenet fosters a singular distribution of content, with a high ratio of blogs (or flogs), child pornography, empty links, and Web 1.0 websites that archive information. We assumed that this content is not discrete points of data but instead produce sociologically interesting phenomena. Therefore, we ask: What are the content patterns on Freenet? Four patterns were identified. Freenet is (1) an archive of deviant data resistant to censorship, (2) a space dominated by content associated with masculinity, (3) a nonmarket space where commercial exchange is nonexistent, and (4) an empty space with many requests not returning information, and many flogs abandoned. We asked a third question: How does the analysis of Freenet inform current understandings of hacker culture? Freenet, we suggest, can be understood as a type of digital ‘wilderness’. It is a singular Darknet space, supporting a distinct set of hacker practices.

References

Anderson, BRO ( 2016 ) Imagined Communities: Reflections on the Origin and Spread of Nationalism. Revised edition . London; New York : Verso .

Google Scholar

Bancroft, A, Scott Reid, P ( 2016 ) Concepts of illicit drug quality among darknet market users: Purity, embodied experience, craft and chemical knowledge . International Journal of Drug Policy 35: 42 – 49 . DOI: 10.1016/j.drugpo.2015.11.008.

Google Scholar Crossref | Medline | ISI

Barlow, JP ( 2016 ) A Declaration of the Independence of Cyberspace . Available at: https://www.eff.org/cyberspace-independence (accessed 13 June 2018).

Google Scholar

Bartlett, J ( 2015 ) The Dark Net: Inside the Digital Underworld. Brooklyn : Melville House .

Google Scholar

Benkler, Y ( 2006 ) The Wealth of Networks: How Social Production Transforms Markets and Freedom. New Haven; London : Yale University Press .

Google Scholar

Broséus, J, Rhumorbarbe, D, Mireault, C, et al. ( 2016 ) Studying illicit drug trafficking on Darknet markets: Structure and organisation from a Canadian perspective . Forensic Science International 264: 7 – 14 . DOI: 10.1016/j.forsciint.2016.02.045.

Google Scholar Crossref | Medline

Cantelo, A ( 2016 ) Deeplight: Shining a Light on the Darkweb. Intelliag . Available at: https://media.scmagazine.com/documents/224/deeplight_(1)_55856.pdf (accessed 14 June 2018).

Google Scholar

Chertoff, M, Simon, T ( 2015 ) The Impact of the Dark Web on Internet Governance and Cyber Security, GCIG Paper No. 6, United Kingdom : The Royal Institute of International Affairs .

Google Scholar

Clarke, I, Miller, SG, Hong, TW, et al. ( 2002 ) Protecting free expression online with Freenet . IEEE Internet Computing 6(1): 40 – 49 .

Google Scholar Crossref | ISI

Coleman, EG ( 2013 ) Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton : Princeton University Press .

Google Scholar Crossref

Coleman, EG, Golub, A ( 2008 ) Hacker practice: Moral genres and the cultural articulation of liberalism . Anthropological Theory 8(3): 255 – 277 . DOI: 10.1177/1463499608093814.

Google Scholar SAGE Journals | ISI

Corbett, S ( 2014 ) Challenging the commodification of public spheres: The hacker work ethic in a free media lab . First Monday 19(12). Available at: http://ojphi.org/ojs/index.php/fm/article/view/3555 (accessed 6 January 2017).

Google Scholar

Corbin, JM, Strauss, AL ( 2015 ) Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory, 4th ed . Los Angeles : SAGE .

Google Scholar

Dafermos, G, Söderberg, J ( 2009 ) The hacker movement as a continuation of labour struggle . Capital and Class 33(1): 53 – 73 .

Google Scholar SAGE Journals

Daniels, J, Gregory, K, Cottom, TM (eds) ( 2017 ) Digital sociologies. Bristol; Chicago : Policy Press .

Google Scholar

Davies, SR ( 2018 ) Characterizing hacking: Mundane engagement in US hacker and makerspaces* . Science, Technology, and Human Values 43(2): 171 – 197 . DOI: 10.1177/0162243917703464.

Google Scholar SAGE Journals | ISI

Deseriis, M ( 2017 ) Hacktivism: On the use of botnets in cyberattacks . Theory, Culture and Society 34(4): 131 – 152 . DOI: 10.1177/0263276416667198.

Google Scholar SAGE Journals | ISI

Garden, M ( 2012 ) Defining blog: A fool’s errand or a necessary undertaking . Journalism: Theory, Practice and Criticism 13(4): 483 – 499 . DOI: 10.1177/1464884911421700.

Google Scholar SAGE Journals | ISI

Gehl, RW ( 2016 ) Power/freedom on the dark web: A digital ethnography of the Dark Web Social Network . New Media and Society 18(7): 1219 – 1235 . DOI: 10.1177/1461444814554900.

Google Scholar SAGE Journals | ISI

Glenny, M ( 2012 ) DarkMarket: How Hackers became the New Mafia. New York : Vintage Books .

Google Scholar

Goldsmith, JL, Wu, T ( 2008 ) Who controls the Internet? Illusions of a Borderless World. New York : Oxford University Press .

Google Scholar

Henshaw, M, Ogloff, JR, Clough, JA ( 2017 ) Looking beyond the screen: A critical review of the literature on the online child pornography offender . Sexual Abuse 29(5): 416 – 445 .

Google Scholar SAGE Journals | ISI

Himanen, P ( 2001 ) The Hacker Ethic: And the Spirit of the Information Age. New York : Random House .

Google Scholar

Holt, TJ, Strumsky, D, Smirnova, O, et al. ( 2012 ) Examining the social networks of malware writers and hackers . International Journal of Cyber Criminology 6(1): 891 .

Google Scholar

Holt, TJ, Freilich, JD, Chermak, SM ( 2017 ) Exploring the subculture of ideologically motivated cyber-attackers . Journal of Contemporary Criminal Justice 33(3): 212 – 233 . DOI: 1043986217699100.

Google Scholar SAGE Journals | ISI

Horten, M ( 2016 ) The Closing of the Net. Cambridge; Malden : Polity Press .

Google Scholar

Hout, MCV, Bingham, T ( 2013 ) ‘Silk Road’, the virtual drug marketplace: A single case study of user experiences . International Journal of Drug Policy 24(5): 385 – 391 . DOI: 10.1016/j.drugpo.2013.01.005.

Google Scholar Crossref | Medline

Jardine, E ( 2015 ) The Dark Web Dilemma: Tor, Anonymity and Online Policing. Global Commission on Internet Governance Paper Series 21. Global Commission on Internet Governance . Available at: https://www.cigionline.org/sites/default/files/no.21.pdf (accessed 12 June 2018).

Google Scholar

Jardine, E ( 2016 ) Tor, what is it good for? Political repression and the use of online anonymity-granting technologies . New Media and Society 20(2): 435 – 452 . DOI: 1461444816639976.

Google Scholar SAGE Journals

Jardine, E ( 2017 ) Privacy, censorship, data breaches and Internet freedom: The drivers of support and opposition to Dark Web technologies . New Media and Society 20(8): 2824 – 2843 . DOI: 10.1177/1461444817733134.

Google Scholar SAGE Journals

Jordan, T ( 2008 ) Hacking: Digital Media and Technological Determinism. Digital Media and Society Series. Cambridge : Polity Press .

Google Scholar

Jordan, T ( 2017 ) A genealogy of hacking . Convergence: The International Journal of Research into New Media Technologies 23(5): 528 – 544 . DOI: 10.1177/1354856516640710.

Google Scholar SAGE Journals

Jordan, T, Taylor, P ( 1998 ) A sociology of hackers . The Sociological Review 46(4): 757 – 780 .

Google Scholar SAGE Journals | ISI

Kendall, L ( 2011 ) “White and nerdy”: Computers, race, and the nerd stereotype . The Journal of Popular Culture 44(3): 505 – 524 .

Google Scholar Crossref

Kitchin, R, Dodge, M ( 2011 ) Code/Space: Software and Everyday Life. Software Studies. Cambridge : MIT Press .

Google Scholar Crossref

Krebs, B ( 2017 ) Spam nation: the inside story of organized cybercrime--from global epidemic to your front door. Illionis : Sourcebooks .

Google Scholar

Kubitschko, S ( 2015 a) Hackers’ media practices: Demonstrating and articulating expertise as interlocking arrangements . Convergence: The International Journal of Research into New Media Technologies 21(3): 388 – 402 . DOI: 10.1177/1354856515579847.

Google Scholar SAGE Journals

Kubitschko, S ( 2015 b) The role of hackers in countering surveillance and promoting democracy . Media and Communication 3(2): 77 . DOI: 10.17645/mac.v3i2.281.

Google Scholar Crossref

Kushner, D ( 2015 ) The Darknet: Is the Government Destroying ‘the Wild West of the Internet? . Available at: https://www.rollingstone.com/politics/politics-news/the-darknet-is-the-government-destroying-the-wild-west-of-the-internet-198271/ (accessed 10 August 2018).

Google Scholar

Lacson, W, Jones, B ( 2016 ) The 21st century darkNet market: Lessons from the fall of silk road . International Journal of Cyber Criminology 10(1): 40 .

Google Scholar

Lessig, L ( 2006 ) Code Is Law: On Liberty in Cyberspace . Harvard Magazine. Available at: https://www.harvardmagazine.com/2000/01/code-is-law-html (accessed 14 June 2018).

Google Scholar

Levy, S ( 1984 ) Hackers: Heroes of the Computer Revolution. 1st ed. Garden City : Anchor Press/Doubleday .

Google Scholar

Lindgren, S, Lundström, R ( 2011 ) Pirate culture and hacktivist mobilization: The cultural and social protocols of# WikiLeaks on Twitter . New Media and Society 13(6): 999 – 1018 .

Google Scholar SAGE Journals | ISI

Lu, T, Lin, Z, Zhao, L, et al. ( 2016 ) On privacy and anonymity in freenet system . International Journal of Security and Its Applications 10(5): 41 – 56 . DOI: 10.14257/ijsia.2016.10.5.04.

Google Scholar Crossref

Lupton, D ( 2015 ) Digital sociology. Abingdon : Routledge, Taylor & Francis Group .

Google Scholar

Massanari, A ( 2017 ) #Gamergate and The Fappening: How Reddit’s algorithm, governance, and culture support toxic technocultures . New Media and Society 19(3): 329 – 346 .

Google Scholar SAGE Journals | ISI

Maxigas ( 2017 ) Hackers against technology: Critique and recuperation in technological cycles . Social Studies of Science 47(6): 841 – 860 . DOI: 10.1177/0306312717736387.

Google Scholar SAGE Journals | ISI

Moore, D, Rid, T ( 2016 ) Cryptopolitik and the Darknet . Survival 58(1): 7 – 38 . DOI: 10.1080/00396338.2016.1142085.

Google Scholar Crossref

Nikitina, S ( 2012 ) Hackers as tricksters of the digital age: Creativity in hacker culture . The Journal of Popular Culture 45(1): 133 – 152 .

Google Scholar Crossref | ISI

Nissenbaum, H ( 2004 ) Hackers and the contested ontology of cyberspace . New Media and Society 6(2): 195 – 217 . DOI: 10.1177/1461444804041445.

Google Scholar SAGE Journals | ISI

Nycyk, M ( 2016 ) The new computer hacker’s quest and contest with the experienced hackers: A qualitative study applying Pierre Bourdieu’s field theory . International Journal of Cyber Criminology 10(2): 92 .

Google Scholar

Orton-Johnson, K, Prior, N (eds) ( 2013 ) Digital Sociology: Critical Perspectives. Basingstoke : Palgrave Macmillan .

Google Scholar Crossref

Owen, G, Savage, N ( 2015 ) The Tor Dark Net. Global Commission on Internet Governance Paper Series 20. Available at: https://www.cigionline.org/sites/default/files/no20_0.pdf (accessed 12 June 2018).

Google Scholar

Postill, J ( 2014 ) Freedom technologists and the new protest movements: A theory of protest formulas . Convergence: The International Journal of Research into New Media Technologies 20(4): 402 – 418 . DOI: 10.1177/1354856514541350.

Google Scholar SAGE Journals

Richardson, M ( 2016 ) Pre-hacked: Open Design and the democratisation of product development . New Media and Society 18(4): 653 – 666 . DOI: 10.1177/1461444816629476.

Google Scholar SAGE Journals | ISI

Shirky, C ( 2009 ) Here comes everybody: The power of organizing without organizations: [with an updated epilogue] . Nachdr. New York; Toronto; London : Penguin Books .

Google Scholar

Söderberg, J, Delfanti, A ( 2015 ) Hacking Hacked! The life cycles of digital innovation . Science, Technology, and Human Values 40(5): 793 – 798 . DOI: 10.1177/0162243915595091.

Google Scholar SAGE Journals | ISI

Steinmetz, KF ( 2015 ) Craft(y)ness: An ethnographic study of hacking . British Journal of Criminology 55(1): 125 – 145 . DOI: 10.1093/bjc/azu061.

Google Scholar Crossref

Tanczer, LM ( 2016 ) Hacktivism and the male-only stereotype . New Media and Society 18(8): 1599 – 1615 .

Google Scholar SAGE Journals | ISI

Thomas, J ( 2005 ) The moral ambiguity of social control in cyberspace: A retro-assessment of the ‘golden age’of hacking . New Media and Society 7(5): 599 – 624 .

Google Scholar SAGE Journals | ISI

Turkle, S ( 2005 ) The Second Self: Computers and the Human Spirit. 20th anniversary ed. 1st MIT Press ed . Cambridge : MIT Press .

Google Scholar Crossref

van Hardeveld, GJ, Webber, C, O’Hara, K ( 2017 ) Deviating from the cybercriminal script: Exploring tools of anonymity (Mis) used by carders on cryptomarkets . American Behavioral Scientist 61: 1244 – 1266 . DOI: 0002764217734271.

Google Scholar SAGE Journals | ISI

Wilkinson, E ( 2017 ) The diverse economies of online pornography: From paranoid readings to post-capitalist futures . Sexualities 20(8): 981 – 998 . DOI: 10.1177/1363460716675141.

Google Scholar SAGE Journals | ISI

Yar, M ( 2005 ) Computer hacking: Just another case of juvenile delinquency? The Howard Journal of Crime and Justice 44(4): 387 – 399 .

Google Scholar Crossref