Difference between revisions of "Template:Hidden services 2016"
Jump to navigation
Jump to search
imported>Tga.D ("hidden service" -> "onion service") |
imported>Frietjes (replace per tfd outcome) |
||
| Line 14: | Line 14: | ||
# "Nexus" = "Illicit links" | # "Nexus" = "Illicit links" | ||
--> | --> | ||
| − | </noinclude> | + | </noinclude>{{Bar chart |
| − | {{Bar chart | ||
| title = Web-based [[onion services]] in February 2016<ref> {{cite journal | last1 = Moore | first1 = Daniel | title = Cryptopolitik and the Darknet | journal = Survival: Global Politics and Strategy | url = http://www.tandfonline.com/doi/abs/10.1080/00396338.2016.1142085 | accessdate = 2016-03-20}}</ref><ref> {{cite news | last1 = Cox | first1 = Joseph | title = Study Claims Dark Web Sites Are Most Commonly Used for Crimes | url = https://motherboard.vice.com/read/study-claims-dark-web-sites-are-most-commonly-used-for-crimes | accessdate = 2016-03-20 | date = 2016-02-01}}</ref> | | title = Web-based [[onion services]] in February 2016<ref> {{cite journal | last1 = Moore | first1 = Daniel | title = Cryptopolitik and the Darknet | journal = Survival: Global Politics and Strategy | url = http://www.tandfonline.com/doi/abs/10.1080/00396338.2016.1142085 | accessdate = 2016-03-20}}</ref><ref> {{cite news | last1 = Cox | first1 = Joseph | title = Study Claims Dark Web Sites Are Most Commonly Used for Crimes | url = https://motherboard.vice.com/read/study-claims-dark-web-sites-are-most-commonly-used-for-crimes | accessdate = 2016-03-20 | date = 2016-02-01}}</ref> | ||
| label_type = Category | | label_type = Category | ||
| Line 21: | Line 20: | ||
| float = right | | float = right | ||
| data_max = 30 | col2_data_max = 56.8 | | data_max = 30 | col2_data_max = 56.8 | ||
| − | | label1 = {{ | + | | label1 = {{abbr | Violence | Murder for hire, instructions for violent attacks}} | data1 = 0.3 | col2_data1 = 0.6 |
| − | | label2 = {{ | + | | label2 = {{abbr | Arms | Weapon trades }} | data2 = 0.8 | col2_data2 = 1.5 |
| − | | label3 = {{ | + | | label3 = {{abbr | Illicit Social | Forums, social networks, & boards sharing illicit materials }} | data3 = 1.2 | col2_data3 = 2.4 |
| − | | label4 = {{ | + | | label4 = {{abbr | Hacking | Hacking for hire, malware/DDoS capabilities trades & distributions }}| data4 = 1.8 | col2_data4 = 3.5 |
| − | | label5 = {{ | + | | label5 = {{abbr | Illicit links | Links to illicit websites and resources within darknet }} | data6 = 2.3 | col2_data5 = 4.3 |
| − | | label6 = {{ | + | | label6 = {{abbr | Illicit pornography | Pornography involving children, violence, animals or obtained without consent }} | data5 = 2.3 | col2_data6 = 4.5 |
| − | | label7 = {{ | + | | label7 = {{abbr | Extremism | Extremist ideologies including texts, support for violence, how-to guides, and forums }} | data7 = 2.7 | col2_data7 = 5.1 |
| − | | label9 = {{ | + | | label9 = {{abbr | Illicit Other | Misc. illicit materials including illegal goods and fake identities }} | data9 = 3.8 | col2_data9 = 7.3 |
| − | | label10 = {{ | + | | label10 = {{abbr | Illicit Finance | Money laundering, counterfeit notes, stolen accounts/credit cards}} | data10 = 6.3 | col2_data10 = 12 |
| − | | label11 = {{ | + | | label11 = {{abbr | Illicit Drugs | Illegal drugs including prescription medicine obtained illegally}} | data11 = 8.1 | col2_data11 = 15.5 |
| − | | label12 = {{ | + | | label12 = {{abbr | Non-illicit+Unknown | Includes ideological/political sites, secure drop sites, information depositories, other legitimate services, and unknown/uncategorized contents}} | data12 = 22.6 | col2_data12 = 43.2 |
| label13 = Illicit total | data13 = 29.7 | col2_data13 = 56.8 | | label13 = Illicit total | data13 = 29.7 | col2_data13 = 56.8 | ||
| − | | label14 = {{ | + | | label14 = {{abbr | Inactive | Inaccessible or no visible content including placeholder sites}} | data14 = 47.7 |
| label15 = Active | data15 = 52.3 | | label15 = Active | data15 = 52.3 | ||
}} | }} | ||
Revision as of 14:11, 11 May 2020
| Category | % of total | % of active |
|---|---|---|
| Violence | 0.3 |
0.6
|
| Arms | 0.8 |
1.5
|
| Illicit Social | 1.2 |
2.4
|
| Hacking | 1.8 |
3.5
|
| Illicit links | 2.3 |
4.3
|
| Illicit pornography | 2.3 |
4.5
|
| Extremism | 2.7 |
5.1
|
| Illicit Other | 3.8 |
7.3
|
| Illicit Finance | 6.3 |
12
|
| Illicit Drugs | 8.1 |
15.5
|
| Non-illicit+Unknown | 22.6 |
43.2
|
| Illicit total | 29.7 |
56.8
|
| Inactive | 47.7
| |
| Active | 52.3
|
- ↑ Moore, Daniel. "Cryptopolitik and the Darknet". Survival: Global Politics and Strategy. Retrieved 2016-03-20.
- ↑ Cox, Joseph (2016-02-01). "Study Claims Dark Web Sites Are Most Commonly Used for Crimes". Retrieved 2016-03-20.