In espionage parlance, a cutout is a mutually trusted intermediary, method or channel of communication that facilitates the exchange of information between agents.
Some computer protocols, like Tor, use the equivalent of cutout nodes in their communications networks.
The use of multiple layers of encryption usually stops nodes on such networks from knowing the ultimate sender or receiver of the data.
Darknets are distinct from other distributed peer-to-peer (P2P) networks, as sharing is anonymous, i.e., IP addresses are not publicly shared and nodes often forward traffic to other nodes.
Thus, with a darknet, users can communicate with little fear of governmental or corporate interference.