Explore common weaknesses in darknet technologies like Tor and I2P in this comprehensive conference talk. Gain a practical understanding of how encrypted anonymizing networks can be subverted to reveal identities, presented in a manner accessible to security practitioners. Delve into topics including darknet fundamentals, threat models, encryption methods, common attacks, and mitigation strategies. Examine specific vulnerabilities like DNS leaks, HTTP proxies, BitTorrent usage, and metadata analysis. Learn about denial of service techniques, network splitting, correlation attacks, and local forensics approaches. Discover how to better protect darknet implementations and user privacy through various defensive measures and best practices.