It's simpler to just stick with facts. For example: Freenet, I2P, Tor onions, private LANs, other overlay networks with access control, systems and databases with access control.