{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T06:30:05Z","timestamp":1775716205938,"version":"3.50.1"},"reference-count":44,"publisher":"Proceedings of the National Academy of Sciences","issue":"50","license":[{"start":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T00:00:00Z","timestamp":1606694400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100007263","name":"Virginia Polytechnic Institute and State University","doi-asserted-by":"publisher","award":["N\/A"],"award-info":[{"award-number":["N\/A"]}],"id":[{"id":"10.13039\/100007263","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.pnas.org"],"crossmark-restriction":true},"short-container-title":["Proc. Natl. Acad. Sci. U.S.A."],"published-print":{"date-parts":[[2020,12,15]]},"abstract":"<jats:title>Significance<\/jats:title>\n          <jats:p>Measuring the proportion of Tor anonymity network users who employ the system for malicious purposes is important as this technology can facilitate child abuse, the sale of illicit drugs, and the distribution of malware. We show that only a small fraction of users globally (\u223c6.7%) likely use Tor for malicious purposes on an average day. However, this proportion clusters unevenly across countries, with more potentially malicious Tor users in \u201cfree\u201d countries (\u223c7.8%) than in \u201cnot free\u201d regimes (\u223c4.8%). These results suggest that the countries which host most of the infrastructure of the network and house the Tor Project plausibly experience a disproportional amount of harm from the Tor anonymity network.<\/jats:p>","DOI":"10.1073\/pnas.2011893117","type":"journal-article","created":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T01:32:39Z","timestamp":1606786359000},"page":"31716-31721","update-policy":"https:\/\/doi.org\/10.1073\/pnas.cm10313","source":"Crossref","is-referenced-by-count":26,"title":["The potential harms of the Tor anonymity network cluster disproportionately in free countries"],"prefix":"10.1073","volume":"117","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2041-314X","authenticated-orcid":false,"given":"Eric","family":"Jardine","sequence":"first","affiliation":[{"name":"Department of Political Science, Virginia Tech, Blacksburg, VA 24061;"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4347-8787","authenticated-orcid":false,"given":"Andrew M.","family":"Lindner","sequence":"additional","affiliation":[{"name":"Department of Sociology, Skidmore College, Saratoga Springs, NY 12866;"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9069-0003","authenticated-orcid":false,"given":"Gareth","family":"Owenson","sequence":"additional","affiliation":[{"name":"Cyber Espion Ltd, Portsmouth PO2 0TP, United Kingdom"}]}],"member":"341","published-online":{"date-parts":[[2020,11,30]]},"reference":[{"key":"e_1_3_4_1_2","doi-asserted-by":"crossref","first-page":"276","DOI":"10.7551\/mitpress\/11266.001.0001","volume-title":"Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P","author":"Gehl R. W.","year":"2018","unstructured":"R. W. Gehl, Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P (MIT Press, Cambridge, 2018), pp. 276."},{"key":"e_1_3_4_2_2","unstructured":"Project T Users. https:\/\/metrics.torproject.org\/userstats-relay-country.html. Accessed 13 November 2020."},{"key":"e_1_3_4_3_2","unstructured":"Project T Onion services. https:\/\/metrics.torproject.org\/hidserv-dir-onions-seen.html. Accessed 13 November 2020."},{"key":"e_1_3_4_4_2","first-page":"21","volume-title":"Proceedings of the 13th conference on USENIX Security Symposium","author":"Dingledine R.","year":"2004","unstructured":"R. Dingledine, N. Mathewson, P. Syverson, \u201cTor: The second-generation onion router\u201d in Proceedings of the 13th conference on USENIX Security Symposium (USENIX Association, San Diego, CA, 2004), pp. 21, Vol. 13."},{"key":"e_1_3_4_5_2","doi-asserted-by":"publisher","DOI":"10.1177\/1354856518806636"},{"key":"e_1_3_4_6_2","doi-asserted-by":"publisher","DOI":"10.1080\/02684527.2018.1528752"},{"key":"e_1_3_4_7_2","unstructured":"G. Owen N. Savage The Tor Dark Net. Global Commission on Internet Governance Paper Series (20) (2015) pp. 1\u201320."},{"key":"e_1_3_4_8_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-019-56704-4"},{"key":"e_1_3_4_9_2","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1145\/2488388.2488408","volume-title":"Proceedings of the 22nd international conference on World Wide Web","author":"Christin N.","year":"2013","unstructured":"N. Christin, \u201cTraveling the silk road: A measurement analysis of a large anonymous online marketplace\u201d in Proceedings of the 22nd international conference on World Wide Web (ACM, Rio de Janeiro, Brazil, 2013), pp. 213\u2013224."},{"key":"e_1_3_4_10_2","first-page":"33","volume-title":"24th USENIX Security Symposium","author":"Soska K.","year":"2015","unstructured":"K. Soska, N. Christin, \u201cMeasuring the longitudinal evolution of the online anonymous marketplace ecosystem\u201d in 24th USENIX Security Symposium (2015), pp. 33\u201348."},{"key":"e_1_3_4_11_2","doi-asserted-by":"publisher","DOI":"10.1177\/1748895813505234"},{"key":"e_1_3_4_12_2","doi-asserted-by":"publisher","DOI":"10.1057\/9781137399052"},{"key":"e_1_3_4_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2019.102627"},{"key":"e_1_3_4_14_2","doi-asserted-by":"publisher","DOI":"10.1080\/01639625.2019.1596465"},{"key":"e_1_3_4_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78440-3_17"},{"key":"e_1_3_4_16_2","first-page":"12","article-title":"Online content moderation and the dark web: Policy responses to radicalizing hate speech and malicious content on the darknet","volume":"24","author":"Jardine E.","year":"2019","unstructured":"E. Jardine, Online content moderation and the dark web: Policy responses to radicalizing hate speech and malicious content on the darknet. First Monday 24, 12 (2019).","journal-title":"First Monday"},{"key":"e_1_3_4_17_2","doi-asserted-by":"publisher","DOI":"10.1177\/2329496520919165"},{"key":"e_1_3_4_18_2","unstructured":"Project T Tor: Overview. https:\/\/2019.www.torproject.org\/about\/overview. Accessed 13 November 2020."},{"key":"e_1_3_4_19_2","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816639976"},{"key":"e_1_3_4_20_2","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817733134"},{"key":"e_1_3_4_21_2","doi-asserted-by":"crossref","unstructured":"E. Jardine The Dark Web Dilemma: Tor Anonymity and Online Policing. Global Commission on Internet Governance Paper Series (21) (2015) pp. 1\u201324.","DOI":"10.2139\/ssrn.2667711"},{"key":"e_1_3_4_22_2","doi-asserted-by":"publisher","DOI":"10.1108\/PIJPSM-07-2019-0124"},{"key":"e_1_3_4_23_2","volume-title":"Freedom in the world comparative and historial data: Country and territory ratings and statuses, 1973-2019","author":"House F.","year":"2019","unstructured":"F. House, Freedom in the world comparative and historial data: Country and territory ratings and statuses, 1973-2019 (Freedom House, Washington, DC, 2019)."},{"key":"e_1_3_4_24_2","unstructured":"F. House \u201cFreedom in the world: Country and territory ratings and statuses 1973-2019\u201d (Freedom House Washington DC 2019)."},{"key":"e_1_3_4_25_2","unstructured":"Peace CfS Polity V: Political regime characteristics and transitions 1800-2018. https:\/\/www.systemicpeace.org\/inscrdata.html. Accessed 13 November 2020."},{"key":"e_1_3_4_26_2","unstructured":"The World Bank World Bank Data | Indicators. https:\/\/data.worldbank.org\/indicator. Accessed 12 November 2020."},{"key":"e_1_3_4_27_2","unstructured":"N. Christin Dream traderoute Berlusconi and Valhalla marketplaces 2017-2018: Anonymized datasets. https:\/\/www.impactcybertrust.org\/dataset_view?idDataset=1200. Accessed 14 October 2020."},{"key":"e_1_3_4_28_2","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2016.1142085"},{"key":"e_1_3_4_29_2","volume-title":"Custodians of the Internet Platforms, Content Moderation, and the Hidden Decisions that Shape Social Media","author":"Gillespie T.","year":"2018","unstructured":"T. Gillespie, Custodians of the Internet Platforms, Content Moderation, and the Hidden Decisions that Shape Social Media (Yale University Press, New Haven, 2018)."},{"key":"e_1_3_4_30_2","unstructured":"M. Faizan R. A. Khan Exploring and analyzing the dark Web: A new alchemy. First Monday 24 https:\/\/doi.org\/10.5210\/fm.v24i5.9473(2019)."},{"key":"e_1_3_4_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27576-0_2"},{"key":"e_1_3_4_32_2","first-page":"340","volume-title":"Look Who\u2019s Watching: Surveillance, Treachery and Trust Online","author":"Hampson F. O.","year":"2016","unstructured":"F. O. Hampson, E. Jardine, Look Who\u2019s Watching: Surveillance, Treachery and Trust Online (CIGI Press\/McGill-Queen\u2019s University Press, Waterloo, ed. 1, 2016), p. 340.","edition":"1"},{"key":"e_1_3_4_33_2","unstructured":"PBS News Hour The Web\u2019s biggest illegal drug marketplace is shut down by the FBI. https:\/\/www.pbs.org\/newshour\/nation\/the-webs-biggest-illegal-drug-marketplace-is-shut-down-by-the-fbi. Accessed 13 November 2020."},{"key":"e_1_3_4_34_2","unstructured":"FBI Darknet takedown. Authorities Shutter Online Criminal Market AlphaBay https:\/\/www.fbi.gov\/news\/stories\/alphabay-takedown. Accessed 13 November 2020."},{"key":"e_1_3_4_35_2","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2015.1093531"},{"key":"e_1_3_4_36_2","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814554900"},{"key":"e_1_3_4_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugpo.2016.04.021"},{"key":"e_1_3_4_38_2","doi-asserted-by":"publisher","DOI":"10.1177\/1057567718769719"},{"key":"e_1_3_4_39_2","unstructured":"M. Prince The trouble with tor. https:\/\/blog.cloudflare.com\/the-trouble-with-tor\/. Accessed 13 November 2020."},{"key":"e_1_3_4_40_2","first-page":"80","volume-title":"On liberty","author":"Mill J. S.","year":"2003","unstructured":"J. S. Mill, On liberty, D. Bromwich, G. Kateb, Eds. (Yale University Press, New Haven, 2003), p. 80."},{"key":"e_1_3_4_41_2","unstructured":"N. Marechal \u201cUse signal use tor: The political economy of digital rights technology \u201d PhD dissertation University of Southern California (2018)."},{"key":"e_1_3_4_42_2","volume-title":"Surveillance Valley: The Secret Military History of the Internet","author":"Levine Y.","year":"2018","unstructured":"Y. Levine, Surveillance Valley: The Secret Military History of the Internet (PublicAffairs, 2018)."},{"key":"e_1_3_4_43_2","first-page":"29","article-title":"Banning encryption to stop terrorists: A worse than futile exercise","volume":"10","author":"Brantly A.","year":"2017","unstructured":"A. Brantly, Banning encryption to stop terrorists: A worse than futile exercise. CTC Sentinel 10, 29\u201333 (2017).","journal-title":"CTC Sentinel"},{"key":"e_1_3_4_44_2","first-page":"69","article-title":"Keys under doormats: Mandating insecurity by requiring government access to all data and communications","volume":"1","author":"Abelson H.","year":"2015","unstructured":"H. Abelson ., Keys under doormats: Mandating insecurity by requiring government access to all data and communications. J. Cybersecurity 1, 69\u201379 (2015).","journal-title":"J. Cybersecurity"}],"container-title":["Proceedings of the National Academy of Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.pnas.org\/syndication\/doi\/10.1073\/pnas.2011893117","content-type":"unspecified","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/pnas.org\/doi\/pdf\/10.1073\/pnas.2011893117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,13]],"date-time":"2022-04-13T10:49:30Z","timestamp":1649846970000},"score":1,"resource":{"primary":{"URL":"https:\/\/pnas.org\/doi\/full\/10.1073\/pnas.2011893117"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,30]]},"references-count":44,"journal-issue":{"issue":"50","published-print":{"date-parts":[[2020,12,15]]}},"alternative-id":["10.1073\/pnas.2011893117"],"URL":"https:\/\/doi.org\/10.1073\/pnas.2011893117","relation":{},"ISSN":["0027-8424","1091-6490"],"issn-type":[{"value":"0027-8424","type":"print"},{"value":"1091-6490","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,30]]},"assertion":[{"value":"2020-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}