57.
_standard_header _standard_header.cfm
31.
__Whiteboards
     Conversation History             1969-1984
... 668/3349 ...
January 2019    Dennis R. DuBe'     668/3349


$s$ .description ()

19730912_fleenor.jpg ()

20110508_fairplay.jpg ()

20110508_fairplay_vortex.jpg ()

20110810_pedigree_1.jpg ()

20110823_the_end_of_trust.jpg ()

20111122_DSCN7995.JPG structure permissions ()

20111122_truman_view.jpg ()

20111206_trends_try.jpg ()

20111221_real_world_games.jpg ()

20120117_Permissions.jpg ()

20120222_info_slope.jpg ()

20120326_Dark_Net.jpg ()

20120326_Scott_Protocol_Stack.jpg ()

20120410_magic_glasses.jp ()

20120412_How_to_kill_Facdbook.jpg ()

20120412_Kill_facebook_1. ()

20120412_Sharing_Moment.jpg ()

20120625_next_paradigm.jpg ()

20120625_VIDEO_CAFE_LIFE_GOOD_THNIG.jpg ()

20120626_FULLY_AUTOMATED_RADIOCAFE.jpg ()

20120627_Privacy_is_BAD.jpg ()

20120627_sit_there_and_twitch_cafe.jpg ()

20120712_How_to_reveal_structure.jpg ()

20120719_Can_you_phrase_3 ()

20120719_can_you_phrase_A...jpg ()

20120719_phrase_as_a_question.jpg ()

20120724_Closed_Pond_Comforts.jpg ()

20120724_Forbin_Project.jpg ()

20120724_Residue_of_Attention.jpg ()

20120726_attention_presence.jpg ()

20120802_how_to_kill_faceook_2.jpg ()

20120807_attention_produced_realities.jpg ()

20120809_attention_field_goals.jpg ()

20120821_black_hole_pay_your_own_way.jpg ()

20120821_velcroed_consumers.jpg ()

20120911_levels_of_content.jpg ()

20120911_SM_As_Attention_Layer.jpg ()

20120912_deconstructing_apple.jpg ()

20120918_Follow_The_money.jpg ()

20120918_Velcroed_Into_Mindless.jpg ()

20120926_An_API_For_Structure.jpg ()

20120926_API_for_theory.jpg ()

20120926_Consulting_plan.jpg ()

20120926_Structure_Content_Behavior.jpg ()

20121003_What_is_attention_field.jpg ()

20121010_triangles_of_property.jp ()

20121022_Structure_Dog.jpg ()

20121022_zen_of_privacy.jpg ()

20121024_Attention_vs_privacy.jpg ()

20121024_privacy_becmes_attention.jpg ()

20121105_The_Before_Time.jpg ()

20121105_What_Do_People_Want_of_Media.jpg ()

20121107_creation_of_property.jpg ()

20121107_Fanboy_Analysis.jpg ()

20121114_moment_of_consumption.jpg ()

20121114_structure_content_triangle.jpg ()

20121119_Binding_and_Un_Binding.jpg ()

20121119_Fanboys_Progress.jpg ()

20121119_fanboy_bindings.jpg ()

20121119_Gigapop_Power_Rangers.jpg ()

20121119_totem_characteristics.jpg ()

20130110_fanboy_ecosystem.jpg ()

20130110_fanboy_the_movie.jpg ()

20130118_Then_Now.jpg ()

IN-THE-MOMENT-GRID.jpg ()

Related Publishers:
736 Aftermath
710 Behavior
772 Catalogs
748 CFS -- Walter Beckert
459 Colorado Rocks
739 Consulting
669 Consulting
709 Content
707 Dennis R. DuBe'
741 Drafts
650 Energy News
344 HTML and Web Skills
742 Key Concepts
716 LFU test
717 LFU Test 2
729 My Latest Clippings
649 New Courses
744 News Panels
721 Position
658 PPV & Gadgets
77 Rocky Mountain Ghost Mines
708 Structure
731 Synthesis
726 Thesis Notes
666 _Aggregation
702 _Determinisms and authors
728 _Papers by Others
668 __Whiteboards
698 ___FanBoy (The Movie)
718 ___Gamification
20120326_Dark_Net.jpg
     Dark Nets as common and uncommon techniques for security and privacy.
           #3349   Created 04/26/2013   Updated 04/26/2013

Dark nets are non-discoverable. They are hidden from outside indexing through various methods, such as barriers erected at the interface between the servers and the internet.

Access is available only to trusted members.

This is not a new concept, and is widely implemented as standard practice on many corporate and governmental servers; they are visible to the net, but their contents are protected by security measures.

Dark nets are used to conceal both legal and illegal activities. Dark nets are appropriate for content that is not socially acceptable or embarrassing, or to conceal information for commercial advantage.

A consumer service might be subscription darknets which are designed to protect consumer information from being either distributed or lost. In such a fantasy world, a person's credit card transactions and purchasing history could be hidden or disguised by passage through a darknet service.



Images


20120326


Copyright Dennis R. DuBe'. All rights reserved. PageTwister and PubSource are registered trademarks.