{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2018:A4BWXSJG6LANH7MLJX6HVMOBIC","short_pith_number":"pith:A4BWXSJG","schema_version":"1.0","canonical_sha256":"07036bc926f2c0d3fd8b4dfc7ab1c140be80bb5c45b45c99344c67f085f6ceed","source":{"kind":"arxiv","id":"1811.01348","version":2},"attestation_state":"computed","paper":{"title":"Structure and Content of the Visible Darknet","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":["cs.CR","cs.SI"],"primary_cat":"cs.CY","authors_text":"Aggelos Kiayias, Dionysis Zindros, Georgia Avarikioti, Roger Wattenhofer, Roman Brunner","submitted_at":"2018-11-04T11:36:59Z","abstract_excerpt":"In this paper, we analyze the topology and the content found on the \"darknet\", the set of websites accessible via Tor. We created a darknet spider and crawled the darknet starting from a bootstrap list by recursively following links. We explored the whole connected component of more than 34,000 hidden services, of which we found 10,000 to be online. Contrary to folklore belief, the visible part of the darknet is surprisingly well-connected through hub websites such as wikis and forums. We performed a comprehensive categorization of the content using supervised machine learning. We observe that"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1811.01348","kind":"arxiv","version":2},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2018-11-04T11:36:59Z","cross_cats_sorted":["cs.CR","cs.SI"],"title_canon_sha256":"1d1a55e89ded11c70e24d7df622b9bba767afb9de4f3bf92a3752671e062d698","abstract_canon_sha256":"619e720fb08d57decd650d4b637fb56cb2a7c617e9531eb2c4375a9dc1baeac5"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:01:21.406811Z","signature_b64":"40ydOcM6zubuZKuXulO027hzsY1CKraxYZ1M2dejqYdgX1geICO8w2mKJ7PRAFQ2dyvLyKvF42pyNqBesvUfCg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"07036bc926f2c0d3fd8b4dfc7ab1c140be80bb5c45b45c99344c67f085f6ceed","last_reissued_at":"2026-05-18T00:01:21.406346Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:01:21.406346Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Structure and Content of the Visible Darknet","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":["cs.CR","cs.SI"],"primary_cat":"cs.CY","authors_text":"Aggelos Kiayias, Dionysis Zindros, Georgia Avarikioti, Roger Wattenhofer, Roman Brunner","submitted_at":"2018-11-04T11:36:59Z","abstract_excerpt":"In this paper, we analyze the topology and the content found on the \"darknet\", the set of websites accessible via Tor. We created a darknet spider and crawled the darknet starting from a bootstrap list by recursively following links. We explored the whole connected component of more than 34,000 hidden services, of which we found 10,000 to be online. Contrary to folklore belief, the visible part of the darknet is surprisingly well-connected through hub websites such as wikis and forums. We performed a comprehensive categorization of the content using supervised machine learning. We observe that"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1811.01348","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1811.01348","created_at":"2026-05-18T00:01:21.406431+00:00"},{"alias_kind":"arxiv_version","alias_value":"1811.01348v2","created_at":"2026-05-18T00:01:21.406431+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1811.01348","created_at":"2026-05-18T00:01:21.406431+00:00"},{"alias_kind":"pith_short_12","alias_value":"A4BWXSJG6LAN","created_at":"2026-05-18T12:32:13.499390+00:00"},{"alias_kind":"pith_short_16","alias_value":"A4BWXSJG6LANH7ML","created_at":"2026-05-18T12:32:13.499390+00:00"},{"alias_kind":"pith_short_8","alias_value":"A4BWXSJG","created_at":"2026-05-18T12:32:13.499390+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":2,"internal_anchor_count":2,"sample":[{"citing_arxiv_id":"2605.15345","citing_title":"Topical Shifts in the Dark Web: A Longitudinal Analysis of Content from the Cybercrime Ecosystem","ref_index":31,"is_internal_anchor":true},{"citing_arxiv_id":"2602.23560","citing_title":"A traffic analysis attack against Introduction Protocol and Onion Services","ref_index":2,"is_internal_anchor":true}]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/A4BWXSJG6LANH7MLJX6HVMOBIC","json":"https://pith.science/pith/A4BWXSJG6LANH7MLJX6HVMOBIC.json","graph_json":"https://pith.science/api/pith-number/A4BWXSJG6LANH7MLJX6HVMOBIC/graph.json","events_json":"https://pith.science/api/pith-number/A4BWXSJG6LANH7MLJX6HVMOBIC/events.json","paper":"https://pith.science/paper/A4BWXSJG"},"agent_actions":{"view_html":"https://pith.science/pith/A4BWXSJG6LANH7MLJX6HVMOBIC","download_json":"https://pith.science/pith/A4BWXSJG6LANH7MLJX6HVMOBIC.json","view_paper":"https://pith.science/paper/A4BWXSJG","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1811.01348&json=true","fetch_graph":"https://pith.science/api/pith-number/A4BWXSJG6LANH7MLJX6HVMOBIC/graph.json","fetch_events":"https://pith.science/api/pith-number/A4BWXSJG6LANH7MLJX6HVMOBIC/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/A4BWXSJG6LANH7MLJX6HVMOBIC/action/timestamp_anchor","attest_storage":"https://pith.science/pith/A4BWXSJG6LANH7MLJX6HVMOBIC/action/storage_attestation","attest_author":"https://pith.science/pith/A4BWXSJG6LANH7MLJX6HVMOBIC/action/author_attestation","sign_citation":"https://pith.science/pith/A4BWXSJG6LANH7MLJX6HVMOBIC/action/citation_signature","submit_replication":"https://pith.science/pith/A4BWXSJG6LANH7MLJX6HVMOBIC/action/replication_record"}},"created_at":"2026-05-18T00:01:21.406431+00:00","updated_at":"2026-05-18T00:01:21.406431+00:00"}