By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Sécurité Helvétique News | AmyrisSécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
  • Home
  • Compliance
    Compliance
    Show More
    Top News
    Ukraine approves second sanctions package targeting Russian nuclear industry
    23 February 2023
    SEC Climate Disclosure Rules Finally Come Out; Scope 3 Emissions Reporting Not Required
    11 March 2024
    Bank of America’s Corporate Culture Crisis: A Study in Failure
    19 September 2024
    Latest News
    How 2025 Redefined Telemarketing Compliance
    1 December 2025
    Advice for the AI Boom: Use the Tools, Not Too Much, Stay in Charge
    25 November 2025
    Strange Bedfellows: How a Supreme Court Ruling Found Its Perfect Match in the Trump Administration
    19 November 2025
    Where in the Loop? Testing AI Across 120 Compliance Tasks to Find Out Where Humans Are Most Needed
    13 November 2025
  • Cyber Security
    Cyber Security
    Show More
    Top News
    Prevent Account Takeover with Better Password Security
    6 June 2024
    Lessons from the Ticketmaster-Snowflake Breach
    12 June 2024
    2025 CISO Plans and Priorities
    18 June 2024
    Latest News
    North Korean Hackers Target Developers with Malicious npm Packages
    30 August 2024
    Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack
    29 August 2024
    Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32
    29 August 2024
    2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit
    29 August 2024
  • Technology
    Technology
    Show More
    Top News
    Folie à Deux Are All Over the Place
    4 September 2024
    Wordle today: The answer and hints for September 14
    14 September 2024
    Power Up Your Devices With Ease With This 6-in-1 Anker Power Strip for Just $15
    23 September 2024
    Latest News
    Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog
    9 September 2025
    Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | MSRC Blog
    28 August 2025
    Microsoft Bounty Program Year in Review: $16.6M in Rewards  | MSRC Blog
    27 August 2025
    postMessaged and Compromised | MSRC Blog
    26 August 2025
  • Businness
    Businness
    Show More
    Top News
    US stocks record worst day in two months on rate rise worries
    21 February 2023
    Putin’s war: how and when will it end?
    23 February 2023
    Yellen says U.S. inflation coming down but core measures remain elevated By Reuters
    24 February 2023
    Latest News
    Visa is moving its European headquarters to London’s Canary Wharf, FT reports
    5 December 2025
    Client Challenge
    4 December 2025
    Binance names cofounder Yi He as new co-CEO
    3 December 2025
    Analysis-Trump's push to end Ukraine war raises fears of 'ugly deal' for Europe
    2 December 2025
  • ÉmissionN
    Émission
    Cyber Security Podcasts
    Show More
    Top News
    Mastering Cyber. Watch Out For Sports Scams. Alissa “Dr Jay” Abdullah, Deputy CSO, Mastercard.
    26 September 2024
    Cyber Security Today for Friday, October 4, 2024
    4 October 2024
    White House Cyber Hiring Sprint. 500K Jobs To Be Filled. Sherrod DeGrippo, Top Cybersecurity Expert
    12 October 2024
    Latest News
    Stream episode Cybercrime Magazine Update: Cybercrime In India. Sheer Volume Overwhelming Police Forces. by Cybercrime Magazine podcast
    3 March 2025
    Autonomous SOC. Why It’s A Breakthrough For The Mid-Market. Subo Guha, SVP of Product, Stellar Cyber
    2 March 2025
    Cyber Safety. Protecting Families From Smart Toy Risks. Scott Schober, Author, "Hacked Again."
    2 March 2025
    Cybercrime News For Feb. 25, 2025. Hackers Steal $49M from Infini Crypto Fintech. WCYB Digital Radio
    2 March 2025
Search
Cyber Security
  • Application Security
  • Darknet
  • Data Protection
  • network vulnerability
  • Pentesting
Compliance
  • LPD
  • RGPD
  • Finance
  • Medical
Technology
  • AI
  • MICROSOFT
  • VERACODE
  • CHECKMARKX
  • WITHSECURE
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Reading: ‘Shadow Libraries’ Are Moving Their Pirated Books to The Dark Web After Fed Crackdowns
Share
Sign In
Notification Show More
Font ResizerAa
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Font ResizerAa
  • Home
  • Compliance
  • Cyber Security
  • Technology
  • Business
Search
  • Home
    • Compliance
    • Cyber Security
    • Technology
    • Businness
  • Legal Docs
    • Contact us
    • Disclaimer
    • Privacy Policy
    • About us
Have an existing account? Sign In
Follow US
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique par Amyris Sarl.
Sécurité Helvétique News | Amyris > Blog > Darknet > ‘Shadow Libraries’ Are Moving Their Pirated Books to The Dark Web After Fed Crackdowns
Darknet

‘Shadow Libraries’ Are Moving Their Pirated Books to The Dark Web After Fed Crackdowns

webmaster
Last updated: 2023/02/21 at 4:52 PM
webmaster
Share
5 Min Read
SHARE
A screen

Screenshot: Library Genesis

Library Genesis (LibGen), the largest pirate repository of academic papers, doesn’t seem to be doing so hot.

Three years ago, LibGen had on average five different HTTP mirror websites backing up every upload, to ensure that the repository can’t be easily taken down. But as Reddit users pointed out this week, that number now looks more like two. After the recent takedown of another pirate site, the downturn has caused concern among “shadow archivists,” the term for volunteer digital librarians who maintain online repositories like LibGen and Z-Library, which host massive collections of pirated books, research papers, and other text-based materials.

Earlier this month, the head librarians of Z-Library were arrested and charged in federal court for criminal copyright infringement, wire fraud, and money laundering. After the FBI seized several websites associated with Z-Library, shadow archivists rushed to create mirrors of the site to continue enabling user access to more than 11 million books and over 80 million articles. 

For many students and researchers strapped for cash, LibGen is to scholarly journal articles what Z-Library is to books. 

“It’s truly important work, and so sad that such a repository could be lost or locked away due to greed, selfishness, and pursuit of power,” one Reddit user commented on r/DataHoarder. “We are at a point in time where humanity could do so very much with the resources and knowledge that we have if it were only organized and accessible to all instead of kept under lock and key and only allowed access by a tiny percentage of the 8 billion people on this planet.”

There isn’t one clear explanation for what’s happening with LibGen’s HTTP mirrors. However, we do know that maintaining a shadow library is time-consuming and often isolating for the librarian or archivist. It makes perfect sense why a shadow librarian involved in this work for years may throw in the towel. This could also be the seed of a recruitment effort underway, much like we saw several years ago when archivists enacted a rescue mission to save Sci-Hub from disrepair. 

When news circulated that Z-Library was seized by the feds, some supporters stepped in with monetary donations to restore the repository. Members of the Z-Library team also expressed sadness about the arrests and thanked supporters in an official response, as reported by Torrent Freak.

“Thank you for each donation you make. You are the ones who making the existence of the Z-Library possible,” the Z-Library members wrote in the statement, which was posted to a site on the anonymized Tor network. “We believe the knowledge and cultural heritage of mankind should be accessible to all people around the world, regardless of their wealth, social status, nationality, citizenship, etc. This is the only purpose Z-Library is made for.” 

The usage of the anonymized network follows the movement of shadow libraries to more resilient hosting systems like the Interplanetary File System (IPFS), BitTorrent, and Tor. While there might be fewer HTTP mirrors of shadow libraries like LibGen, there are likely more mirrors on alternative networks that are slightly harder to access.

It’s unclear if LibGen will regain the authority it once had in the shadow library ecosystem, but as long as shadow librarians and archivists disagree with current copyright and institutional knowledge preservation practices, there will be shadow information specialists.

“Shadow library volunteers come and go, but the important part is that the content (books, papers, etc) is public, and mirrored far and wide,” Anna, the pseudonymous creator of Anna’s Archive, a site that lets users search shadow archives and “aims to catalog every book in existence,” told Motherboard in a statement. “As long as the content is widely available, new people can come in and keep the flame burning, and even innovate and improve—without needing anyone’s permission.”

Anna says the job of shadow librarians closely follows the ethos “information wants to be free,” which was famously put into practice by information activists like Aaron Swartz. 

“Once the content is out there, it’s hard to put the genie back in the bottle,” she added. “At a minimum, we have to make sure that the content stays mirrored, because if that flame dies, it’s gone. But that is relatively easy to do.” 

You Might Also Like

Ransomware gang Hunters International says it’s shutting down

Why have SaaS platforms on dark web marketplaces decreased?

Possible trend in cloud credential “oversaturation”

Research finds 56% increase in active ransomware groups

BitSight buys dark web security specialist Cybersixgill for $115M

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Reddit Telegram Email Copy Link Print
Share
Previous Article The Story Behind Line Vautrin’s Sculptural Mirrors
Next Article How the Silk Road Affair Changed Law Enforcement
Leave a comment Leave a comment

Comments (0) Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

235.3k Followers Like
69.1k Followers Follow
11.6k Followers Pin
56.4k Followers Follow
136k Subscribers Subscribe
4.4k Followers Follow
- Advertisement -
Ad imageAd image

Latest News

From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 5 December 2025
10 Best Sleep Masks That Are Than Blackout Shades (2025)
ARCHITECTURE 5 December 2025
Improper Output Handling Risks & Mitigations
VERACODE 5 December 2025
A new battle over the veil in Swiss schools
SWITZERLAND 5 December 2025
//

We influence 20 million users and is the number one business and technology news network on the planet

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Loading
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Follow US
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Amyris news letter
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Loading
Zero spam, Unsubscribe at any time.
login Amyris SH
Welcome Back!

Sign in to your account

Lost your password?