Statements (61)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Telecommunications_company
|
gptkbp:bfsLayer |
5
|
gptkbp:bfsParent |
gptkb:Ben_Percy
gptkb:Benjamin_Percy |
gptkbp:can_lead_to |
Cybercrime
|
gptkbp:contains |
Hidden services
|
gptkbp:facilitates |
Human trafficking
Political activism Fraudulent activities Data leaks |
gptkbp:has |
Forums for illegal goods
|
gptkbp:hosts |
Illegal gambling
Black markets Illegal arms sales |
https://www.w3.org/2000/01/rdf-schema#label |
The Dark Net
|
gptkbp:includes |
gptkb:Tor_network
Illegal drug sales |
gptkbp:is_accessible_by |
gptkb:I2_P
Journalists Special software VP Ns Specialized browsers |
gptkbp:is_associated_with |
Ransomware
Illegal activities Data privacy issues Cyber espionage |
gptkbp:is_considered |
A double-edged sword
A controversial topic A risk for users A tool for freedom of speech |
gptkbp:is_considered_as |
A haven for privacy advocates
|
gptkbp:is_discussed_in |
gptkb:film_production_company
|
gptkbp:is_explored_in |
gptkb:physicist
Academic research |
gptkbp:is_home_to |
Various forums
Hacker forums Anonymous marketplaces Child exploitation material |
gptkbp:is_known_for |
Privacy concerns
|
gptkbp:is_linked_to |
Anonymity
Identity theft Anonymous file sharing |
gptkbp:is_often_associated_with |
Conspiracy theories
|
gptkbp:is_often_compared_to |
In popular culture
|
gptkbp:is_often_depicted_as |
By the general public
|
gptkbp:is_often_used_in |
Privacy advocates
|
gptkbp:is_part_of |
gptkb:Community_Center
Cybersecurity discussions The broader concept of anonymity online |
gptkbp:is_related_to |
Cryptocurrency transactions
|
gptkbp:is_subject_to |
Law enforcement scrutiny
|
gptkbp:is_used_by |
Cybercriminals
|
gptkbp:is_used_for |
Whistleblowing
Secure communications Anonymous communication Political dissent Information sharing Secure whistleblowing Circumvent censorship |
gptkbp:is_utilized_in |
gptkb:political_movement
gptkb:Hacktivists |