SQL injections? Geez. Setting database permissions and escape parameters too hard for some of these database administrators and coders? They deserve to be hacked then.
Darknet isn't special and is not separated from the internet in any shape or form. It is only hidden through heavily encrypted nodes and connections between the nodes (client, server and end). Tor with Vidalia or whatever you want still requires a regular internet connection to access it, hence it is a part of the normal internet and also does not have MORE data than the internet considering it is PART of it anyhow. Just because a room in the house has a hidden door does not mean it is a separate house.
Now, a true separated network would be cool if they'd design a box you could plug into the wall and connect to a inter-connected network that way (like Innbox or something similar). A new internet where all you need is access to a power-line (through a wall outlet or something) and connect to servers that way, perhaps even having exit nodes to the normal internet.
I can guarantee you I can make a hack-proof computer and I'm not a hacker, just a geek. Take one computer, remove hard-drive, remove burner (if present). Install CD reader (read-only). Run some live CD (I use a self-customized solution but if you don't want to take the time to do so, use this:
SLAX). Have safe fun on the internet. Viruses attack data, trojans install hidden data, worms propagate payloads. All of these rely on a hard-drive or some other write-able storage medium. Too bad that the only way to inject malicious code on my net computer would be into volatile memory. A reboot and I'm clean. No part of the OS can be tampered with as it is pre-written to a CD and there is no way to write to it since there are no burning capabilities.
The hack-proof system would include two more computers. From the first computer, you sneakernet a jumpdrive over to a second computer that has every malicious code aware program made and run the jumpdrive against it to ensure the safety of the data is intact. This computer is generally not hooked up to the internet unless updating is needed of the malicious code databases, maybe once a week or so. Then unplug from the network.
Third computer is the expensive beast you do all your work on. This is NEVER, EVER hooked up to the internet. Considering most updates are security related, you can bypass those anyways. No need for security updates if you never hook it into a internet-accessible network. Any other updates should be able to be gotten directly from the OS manufacturer (i.e Microsoft, etc.). Most updates end up slowing the machine down in the end due to bloating anyways and so that fast computer should stay fast for years to come.
If you're a gamer, well then you probably game over the internet and so this is no solution for you. This would be for the person who just spent a ton of money on a computer that can render huge files (audio, huge photos, video, etc.) or play games solo. Its a pain in the butt going back and forth with the jumpdrive (you'll need a good-sized jumpdrive or a huge harddrive and a USB converter [sate/ide/eide/etc.]) but it will be worth it to have a computer that continues to operate the same as the day you got it.
No need for a firewall either (hardware or software). After-all, how can one hack into a computer that is physically unhooked when not in use?
*sitting here on my custom Slack box live cd using firefox. I didn't do the second computer because I have no need to constantly download software and subsequently check it for malicious code. Everything I need is installed off of discs or from reputable sources. Its a 800mhz system with a gig of ram. My net machine does the internet thang just fine. I can go anywhere on the internet and not worry. My main computer (2.20ghz Quadcore, 8gigs memory, 3.5TB storage) sits right by my legs and so there is no problem getting jumpdrive from puter to puter when needed. Using a 36" Sanyo LCD as the sole monitor. Have the net machine hooked up through VGA and the beast hooked up through HDMI. I have an old school KVM so I can just use the one mouse and keyboard for both puters.
You kids and your fancy domains. I was computer gaming before Slackware had a GUI.
Wait, Slackware has a GUI??? I thought you had to choose one first like Gnome (DM), KDE(DM), fluxbox(WM), or my favorite Enlightenment (WM) otherwise you'd be left alone with the proper way to run Slack, the command-line (even if you chose to modify the shell to use ncurses, GTK, or QT) Weren't the desktop and window managers on the second disk anyways? I refuse to believe Slackware now comes with its own desktop manager other than the add-ons.