{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2018:A4BWXSJG6LANH7MLJX6HVMOBIC","short_pith_number":"pith:A4BWXSJG","canonical_record":{"source":{"id":"1811.01348","kind":"arxiv","version":2},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2018-11-04T11:36:59Z","cross_cats_sorted":["cs.CR","cs.SI"],"title_canon_sha256":"1d1a55e89ded11c70e24d7df622b9bba767afb9de4f3bf92a3752671e062d698","abstract_canon_sha256":"619e720fb08d57decd650d4b637fb56cb2a7c617e9531eb2c4375a9dc1baeac5"},"schema_version":"1.0"},"canonical_sha256":"07036bc926f2c0d3fd8b4dfc7ab1c140be80bb5c45b45c99344c67f085f6ceed","source":{"kind":"arxiv","id":"1811.01348","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1811.01348","created_at":"2026-05-18T00:01:21Z"},{"alias_kind":"arxiv_version","alias_value":"1811.01348v2","created_at":"2026-05-18T00:01:21Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1811.01348","created_at":"2026-05-18T00:01:21Z"},{"alias_kind":"pith_short_12","alias_value":"A4BWXSJG6LAN","created_at":"2026-05-18T12:32:13Z"},{"alias_kind":"pith_short_16","alias_value":"A4BWXSJG6LANH7ML","created_at":"2026-05-18T12:32:13Z"},{"alias_kind":"pith_short_8","alias_value":"A4BWXSJG","created_at":"2026-05-18T12:32:13Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2018:A4BWXSJG6LANH7MLJX6HVMOBIC","target":"record","payload":{"canonical_record":{"source":{"id":"1811.01348","kind":"arxiv","version":2},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2018-11-04T11:36:59Z","cross_cats_sorted":["cs.CR","cs.SI"],"title_canon_sha256":"1d1a55e89ded11c70e24d7df622b9bba767afb9de4f3bf92a3752671e062d698","abstract_canon_sha256":"619e720fb08d57decd650d4b637fb56cb2a7c617e9531eb2c4375a9dc1baeac5"},"schema_version":"1.0"},"canonical_sha256":"07036bc926f2c0d3fd8b4dfc7ab1c140be80bb5c45b45c99344c67f085f6ceed","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T00:01:21.406811Z","signature_b64":"40ydOcM6zubuZKuXulO027hzsY1CKraxYZ1M2dejqYdgX1geICO8w2mKJ7PRAFQ2dyvLyKvF42pyNqBesvUfCg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"07036bc926f2c0d3fd8b4dfc7ab1c140be80bb5c45b45c99344c67f085f6ceed","last_reissued_at":"2026-05-18T00:01:21.406346Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T00:01:21.406346Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1811.01348","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:01:21Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"QRuHshLbdNI+Rh/sdivOFzgE6AZfhizya4qr2bNsD/BAng2x5yQaWVNXih3MlWws7niM/EDF1MvKHJAcOsZBCg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T18:12:25.966859Z"},"content_sha256":"1df416d770e3bd244ade51c1e484b1c42db3f250ca7c389fbe359445393fa8f8","schema_version":"1.0","event_id":"sha256:1df416d770e3bd244ade51c1e484b1c42db3f250ca7c389fbe359445393fa8f8"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2018:A4BWXSJG6LANH7MLJX6HVMOBIC","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Structure and Content of the Visible Darknet","license":"http://creativecommons.org/licenses/by/4.0/","headline":"","cross_cats":["cs.CR","cs.SI"],"primary_cat":"cs.CY","authors_text":"Aggelos Kiayias, Dionysis Zindros, Georgia Avarikioti, Roger Wattenhofer, Roman Brunner","submitted_at":"2018-11-04T11:36:59Z","abstract_excerpt":"In this paper, we analyze the topology and the content found on the \"darknet\", the set of websites accessible via Tor. We created a darknet spider and crawled the darknet starting from a bootstrap list by recursively following links. We explored the whole connected component of more than 34,000 hidden services, of which we found 10,000 to be online. Contrary to folklore belief, the visible part of the darknet is surprisingly well-connected through hub websites such as wikis and forums. We performed a comprehensive categorization of the content using supervised machine learning. We observe that"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1811.01348","kind":"arxiv","version":2},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T00:01:21Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"/UAjytR5K6lsYUBlhl3+EXGFcjUAP+b1wuAmJ7VRExXfmmrSZVWCLFZx1XJEqHW7aendNl5bdYMmH3B7YMQmDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T18:12:25.967208Z"},"content_sha256":"aaa723a387d51869175f777f4ae00642f78e6989cc145157dff44c7b1e56a7a5","schema_version":"1.0","event_id":"sha256:aaa723a387d51869175f777f4ae00642f78e6989cc145157dff44c7b1e56a7a5"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/A4BWXSJG6LANH7MLJX6HVMOBIC/bundle.json","state_url":"https://pith.science/pith/A4BWXSJG6LANH7MLJX6HVMOBIC/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/A4BWXSJG6LANH7MLJX6HVMOBIC/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T18:12:25Z","links":{"resolver":"https://pith.science/pith/A4BWXSJG6LANH7MLJX6HVMOBIC","bundle":"https://pith.science/pith/A4BWXSJG6LANH7MLJX6HVMOBIC/bundle.json","state":"https://pith.science/pith/A4BWXSJG6LANH7MLJX6HVMOBIC/state.json","well_known_bundle":"https://pith.science/.well-known/pith/A4BWXSJG6LANH7MLJX6HVMOBIC/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2018:A4BWXSJG6LANH7MLJX6HVMOBIC","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"619e720fb08d57decd650d4b637fb56cb2a7c617e9531eb2c4375a9dc1baeac5","cross_cats_sorted":["cs.CR","cs.SI"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2018-11-04T11:36:59Z","title_canon_sha256":"1d1a55e89ded11c70e24d7df622b9bba767afb9de4f3bf92a3752671e062d698"},"schema_version":"1.0","source":{"id":"1811.01348","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1811.01348","created_at":"2026-05-18T00:01:21Z"},{"alias_kind":"arxiv_version","alias_value":"1811.01348v2","created_at":"2026-05-18T00:01:21Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1811.01348","created_at":"2026-05-18T00:01:21Z"},{"alias_kind":"pith_short_12","alias_value":"A4BWXSJG6LAN","created_at":"2026-05-18T12:32:13Z"},{"alias_kind":"pith_short_16","alias_value":"A4BWXSJG6LANH7ML","created_at":"2026-05-18T12:32:13Z"},{"alias_kind":"pith_short_8","alias_value":"A4BWXSJG","created_at":"2026-05-18T12:32:13Z"}],"graph_snapshots":[{"event_id":"sha256:aaa723a387d51869175f777f4ae00642f78e6989cc145157dff44c7b1e56a7a5","target":"graph","created_at":"2026-05-18T00:01:21Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In this paper, we analyze the topology and the content found on the \"darknet\", the set of websites accessible via Tor. We created a darknet spider and crawled the darknet starting from a bootstrap list by recursively following links. We explored the whole connected component of more than 34,000 hidden services, of which we found 10,000 to be online. Contrary to folklore belief, the visible part of the darknet is surprisingly well-connected through hub websites such as wikis and forums. We performed a comprehensive categorization of the content using supervised machine learning. We observe that","authors_text":"Aggelos Kiayias, Dionysis Zindros, Georgia Avarikioti, Roger Wattenhofer, Roman Brunner","cross_cats":["cs.CR","cs.SI"],"headline":"","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2018-11-04T11:36:59Z","title":"Structure and Content of the Visible Darknet"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1811.01348","kind":"arxiv","version":2},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:1df416d770e3bd244ade51c1e484b1c42db3f250ca7c389fbe359445393fa8f8","target":"record","created_at":"2026-05-18T00:01:21Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"619e720fb08d57decd650d4b637fb56cb2a7c617e9531eb2c4375a9dc1baeac5","cross_cats_sorted":["cs.CR","cs.SI"],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CY","submitted_at":"2018-11-04T11:36:59Z","title_canon_sha256":"1d1a55e89ded11c70e24d7df622b9bba767afb9de4f3bf92a3752671e062d698"},"schema_version":"1.0","source":{"id":"1811.01348","kind":"arxiv","version":2}},"canonical_sha256":"07036bc926f2c0d3fd8b4dfc7ab1c140be80bb5c45b45c99344c67f085f6ceed","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"07036bc926f2c0d3fd8b4dfc7ab1c140be80bb5c45b45c99344c67f085f6ceed","first_computed_at":"2026-05-18T00:01:21.406346Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T00:01:21.406346Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"40ydOcM6zubuZKuXulO027hzsY1CKraxYZ1M2dejqYdgX1geICO8w2mKJ7PRAFQ2dyvLyKvF42pyNqBesvUfCg==","signature_status":"signed_v1","signed_at":"2026-05-18T00:01:21.406811Z","signed_message":"canonical_sha256_bytes"},"source_id":"1811.01348","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:1df416d770e3bd244ade51c1e484b1c42db3f250ca7c389fbe359445393fa8f8","sha256:aaa723a387d51869175f777f4ae00642f78e6989cc145157dff44c7b1e56a7a5"],"state_sha256":"ee422370e6deffb7cd9db282707730bf4057f1abeebc41a4236482b2cef41531"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"CdFBPm0uql8sqn6wHo6glhKt7AjXR/6LU6GWe0ao3FoTg4QHVr9q3t9dIjonxChaeDCKpjSBSgMvczgEATf3AQ==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T18:12:25.969635Z","bundle_sha256":"a6a8be42dd5df8b68f600fe4a257beee338d369be81edf5d6cfb96cabae31901"}}