{"id":7821,"date":"2022-10-07T12:57:44","date_gmt":"2022-10-07T10:57:44","guid":{"rendered":"https:\/\/www.aleph-networks.com\/what-is-the-dark-web\/"},"modified":"2023-05-03T13:10:23","modified_gmt":"2023-05-03T11:10:23","slug":"what-is-the-dark-web","status":"publish","type":"post","link":"https:\/\/www.aleph-networks.eu\/en\/what-is-the-dark-web\/","title":{"rendered":"What is the Dark Web?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Introduction&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||4px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221; &#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;H1&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1 style=\"text-align: center;\"><b>What is the Dark Web in Technical and Practical Terms?<\/b><\/h1>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;H2&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div class=\"et_pb_row et_pb_row_1\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_1 et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_1 et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<h2><span style=\"text-decoration: underline;\">The emergence of networks within the network<\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The 2000s saw the emergence of a need for technologies to guarantee anonymity on the Internet. A few pioneers came up with the idea of creating a \u201cnetwork within the network\u201d.<\/p>\n<p>First, Ian Clark launched the initial version of Freenet, a fully distributed network to store information anonymously. In 2003, the developer zzz launched the first version of I2P (Internet Invisible Protocol), a decentralised network to enable anonymous communication. Then Tor was developed based on research carried out in the 1990s, with its first public version released in 2004.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;H2&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"text-decoration: underline;\">Freenet, I2P and TOR: the three pillars of the dark web.<\/span><\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/10\/800px-Freenet_logo.svg_.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|92px|0px|112px||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text admin_label=&#8221;Texte&#8221; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Figure 1 &#8211; <a href=\"https:\/\/freenetproject.org\/fr\/index.html\">https:\/\/freenetproject.org<\/a><\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/10\/i2plogo.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|||47px||&#8221; custom_padding=&#8221;|29px||||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Figure 2- <a href=\"https:\/\/geti2p.net\">https:\/\/geti2p.net<\/a><\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/10\/Tor-logo-2011-flat.svg_.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;|100px||94px||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Figure 3- <a href=\"https:\/\/www.torproject.org\">https:\/\/www.torproject.org<\/a><\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;11px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]The dark web grew out of these three technologies, with anonymisation by design as the main technical difference from the regular web. These three technologies each offer different features.<br \/>\n[\/et_pb_text][et_pb_text admin_label=&#8221;Tableau&#8221; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|||71px||&#8221; custom_padding=&#8221;|102px||||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"109\">\n<p>&nbsp;<\/p>\n<\/td>\n<td width=\"100\">\n<p>Freenet<\/p>\n<\/td>\n<td width=\"99\">\n<p>I2P<\/p>\n<\/td>\n<td width=\"99\">\n<p>TOR<\/p>\n<\/td>\n<td width=\"99\">\n<p>Web<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">\n<p>Anonymous communication by design<\/p>\n<\/td>\n<td width=\"100\">\n<p>YES<\/p>\n<\/td>\n<td width=\"99\">\n<p>YES<\/p>\n<\/td>\n<td width=\"99\">\n<p>YES<\/p>\n<\/td>\n<td width=\"99\">\n<p>NO<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">\n<p>The hidden Internet<\/p>\n<\/td>\n<td width=\"100\">\n<p>CHK: \/ SSK:<\/p>\n<\/td>\n<td width=\"99\">\n<p>b32.i2p sites<\/p>\n<\/td>\n<td width=\"99\">\n<p>.onion sites<\/p>\n<\/td>\n<td width=\"99\">\n<p>Deep web<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">\n<p>Anonymous access to the web<\/p>\n<\/td>\n<td width=\"100\">\n<p>NO<\/p>\n<\/td>\n<td width=\"99\">\n<p>NO<\/p>\n<\/td>\n<td width=\"99\">\n<p>YES<\/p>\n<\/td>\n<td width=\"99\">\n<p>NO<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">\n<p>Anonymous storage<\/p>\n<\/td>\n<td width=\"100\">\n<p>YES<\/p>\n<\/td>\n<td width=\"99\">\n<p>NO<\/p>\n<\/td>\n<td width=\"99\">\n<p>NO<\/p>\n<\/td>\n<td width=\"99\">\n<p>NO<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">\n<p>Friend-to-Friend<\/p>\n<\/td>\n<td width=\"100\">\n<p>YES<\/p>\n<\/td>\n<td width=\"99\">\n<p>NO<\/p>\n<\/td>\n<td width=\"99\">\n<p>NO<\/p>\n<\/td>\n<td width=\"99\">\n<p>NO<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">\n<p>Type \/ Design<\/p>\n<\/td>\n<td width=\"100\">\n<p>Distributed<\/p>\n<\/td>\n<td width=\"99\">\n<p>Decentralised<\/p>\n<\/td>\n<td width=\"99\">\n<p>Decentralised<\/p>\n<\/td>\n<td width=\"99\">\n<p>Centralised<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/10\/Image1.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text disabled_on=&#8221;on|on|on&#8221; admin_label=&#8221;Texte &#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;53.4px&#8221; disabled=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h4>\u00a0<\/h4>\n<p>\u00ab\u00a0<em>Qu\u2019elles soient cons\u00e9cutives \u00e0 des\u00a0attaques par ran\u00e7ongiciel ou \u00e0 de la n\u00e9gligence, mises en vente par des cybercriminels ou expos\u00e9es dans le cadre d\u2019op\u00e9rations informationnelles associ\u00e9es \u00e0 des revendications id\u00e9ologiques ou politiques, les divulgations de donn\u00e9es constituent une opportunit\u00e9 d\u2019agir pour les attaquants.\u00a0<\/em>\u00bb Panorama de la menace 2022 &#8211; ANSSI<\/p>\n<p>D\u2019apr\u00e8s le 8<sup>e<\/sup>\u00a0barom\u00e8tre du CESIN\u00a0de 2023, <span style=\"color: #ff9900;\">74% des entreprises <span style=\"color: #000000;\">d\u00e9clarent le Phishing comme vecteur d\u2019entr\u00e9e principal pour les attaques subies.<\/span><\/span><\/p>\n<p>Dans cet oc\u00e9an de donn\u00e9es du Web, il est primordiale de bien comprendre que c\u2019est bien l\u2019humain qui est en premi\u00e8res lignes et tous les salari\u00e9s doivent prendre conscience de l\u2019impact qu\u2019ils peuvent avoir sur l\u2019organisation avec les donn\u00e9es qu\u2019ils traitent quotidiennement.<\/p>\n<p>Il faut mettre en place les \u00e9quipes d\u2019analystes, de s\u00e9curit\u00e9 et les <strong>outiller<\/strong> pour cartographier les donn\u00e9es de l\u2019entreprise qui circulent en dehors de l\u2019entreprise et comme pour tous les risques,<strong> planifier<\/strong> les actions \u00e0 mener en cas d\u2019attaques pour garantir la r\u00e9silience des services. Tout comme vous vous \u00e9quipez contre le risque incendie de d\u00e9tecteurs, de sprinklers et d\u2019extincteurs, vous avez des \u00e9quipes form\u00e9es pour qualifier l\u2019alerte lorsque le d\u00e9tecteur de fum\u00e9e se d\u00e9clenche. Ces \u00e9quipes transversales doivent faire fi des silos internes de l\u2019organisation pour la prot\u00e9ger, car <span style=\"color: #ff9900;\">en cyber tous les services peuvent donner les cl\u00e9s d\u2019une porte qui permettra \u00e0 un pirate de d\u00e9truire de l\u2019int\u00e9rieur l\u2019\u00e9difice<\/span>.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.18.0&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-14px|||||&#8221; custom_padding=&#8221;25px||8px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Freenet&#8221; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;H2&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"text-decoration: underline;\">Freenet: The strongest anonymity.<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;Texte&#8221; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>It is very resilient, offering the greatest anonymity of the three. It stores information anonymously using a distributed network and distributed data storage. It led to the creation of a dark web comprising sites made exclusively of files. It also enables communication via forums or social networks. The fact that it is fully distributed makes it very resilient, but also slow.<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;H3&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><a href=\"https:\/\/freenetproject.org\/fr\/pages\/documentation.html\">How can you access the Freenet dark web?<\/a><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]The Freenet home page has several entry points.<br \/>\n[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/10\/Image2.jpg&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;I2P&#8221; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;H2&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"text-decoration: underline;\">I2P : Anonymity with flexibility.<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>It is very flexible and can anonymise other technologies such as the torrent download protocol. It allows users to use torrent-based download tools discreetly.<\/p>\n<p>Like Tor and Freenet, I2P has its own dark web made of micro websites hosted on your computer (ending in b32.i2p). It can only be accessed via the anonymous I2P network.<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;H3&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><a href=\"https:\/\/geti2p.net\/en\/download#windows\">How can you access the I2P dark web?<\/a> ?<\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]Several sites on the I2P dark web are available through the interface.<br \/>\n[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2022\/10\/Image3.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;TOR&#8221; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;H2&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"text-decoration: underline;\">Tor: The most used network.<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Like I2P, Tor comprises several websites with names ending in .onion. It is the largest network in terms of content. Sites on the Tor network are formatted almost exactly like sites on the clear web, but its success stems from its ability to anonymise web access.<\/p>\n<p>Though Tor is by far the most widely used network on the dark web, each of these technologies has specific features that are useful:<\/p>\n<ul>\n<li>Tor: anonymous access to the regular web<\/li>\n<li>Freenet: resilient and anonymous storage<\/li>\n<li>I2P: multi-protocol anonymisation.<\/li>\n<\/ul>\n<p>It is because Tor (and more specifically the Tor Browser) grants access to the regular web that the dark web was able to develop as a set of hidden sites ending in .onion, which are accessible using the same browser.<\/p>\n<p>[\/et_pb_text][et_pb_text admin_label=&#8221;H3&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;10px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3><a href=\"https:\/\/www.torproject.org\/fr\/download\/\">How can you access the Tor dark web?<\/a><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>You must install the Tor Browser, which only gives you access to its home page. It then directs you to conduct searches on the Duck Duck Go search engine, which only shows results from the clear web. You\u2019ll then need to find an entry point (directories of onion sites or search engines specifically for the Tor network).<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Conclusion&#8221; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.19.5&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;H2&#8243; _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span style=\"text-decoration: underline;\">What about the web?<\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.20.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>\u2026 and the webs! The democratisation and rapid growth of the Internet have made search engines key to the web\u2019s accessibility. However, some sites are poorly referenced by these search engines, or not at all. They are either \u201clost\u201d in the vastness of the Internet (appearing in the last pages of results, which no one reads), or webmasters purposely design them so they are not found. This hard-to-access part of the web became the deep web, as opposed to the clear web (the web most people use). Unlike the dark web, clear and deep web sites use the same centralised non-anonymous by design technology.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.aleph-networks.eu\/en\/blog\/&#8221; button_text=&#8221;Read more articles&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The 2000s saw the emergence of a need for technologies to guarantee anonymity on the Internet. A few pioneers came up with the idea of creating a \u201cnetwork within the network\u201d. <\/p>\n","protected":false},"author":4,"featured_media":1905,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[41,42],"tags":[],"class_list":["post-7821","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-resources-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>- Aleph<\/title>\n<meta name=\"description\" content=\"What is the Dark Web? Few pioneers came up with the idea of creating a \u201cnetwork within the network\u201d.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"- Aleph\" \/>\n<meta property=\"og:description\" content=\"What is the Dark Web? Few pioneers came up with the idea of creating a \u201cnetwork within the network\u201d.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/\" \/>\n<meta property=\"og:site_name\" content=\"Aleph\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-07T10:57:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-03T11:10:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aleph-networks.eu\/\/wp-content\/uploads\/2020\/09\/ALEPH-2020-DARK-WEB-INFO-EN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"1073\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"laura\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"laura\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/\"},\"author\":{\"name\":\"laura\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#\/schema\/person\/76fe0c889df1c5cdcc1b35e42711a64b\"},\"headline\":\"What is the Dark Web?\",\"datePublished\":\"2022-10-07T10:57:44+00:00\",\"dateModified\":\"2023-05-03T11:10:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/\"},\"wordCount\":1886,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/09\/ALEPH-2020-DARK-WEB-INFO-EN.png\",\"articleSection\":[\"Blog\",\"Resources\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/\",\"url\":\"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/\",\"name\":\"- Aleph\",\"isPartOf\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/09\/ALEPH-2020-DARK-WEB-INFO-EN.png\",\"datePublished\":\"2022-10-07T10:57:44+00:00\",\"dateModified\":\"2023-05-03T11:10:23+00:00\",\"description\":\"What is the Dark Web? Few pioneers came up with the idea of creating a \u201cnetwork within the network\u201d.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/#primaryimage\",\"url\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/09\/ALEPH-2020-DARK-WEB-INFO-EN.png\",\"contentUrl\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/09\/ALEPH-2020-DARK-WEB-INFO-EN.png\",\"width\":1000,\"height\":1073},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aleph-networks.eu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is the Dark Web?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#website\",\"url\":\"https:\/\/www.aleph-networks.eu\/\",\"name\":\"Aleph\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aleph-networks.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#organization\",\"name\":\"Aleph\",\"url\":\"https:\/\/www.aleph-networks.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/06\/logo-Aleph.png\",\"contentUrl\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/06\/logo-Aleph.png\",\"width\":55,\"height\":55,\"caption\":\"Aleph\"},\"image\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#\/schema\/person\/76fe0c889df1c5cdcc1b35e42711a64b\",\"name\":\"laura\",\"url\":\"https:\/\/www.aleph-networks.eu\/en\/author\/cemile\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"- Aleph","description":"What is the Dark Web? Few pioneers came up with the idea of creating a \u201cnetwork within the network\u201d.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/","og_locale":"en_US","og_type":"article","og_title":"- Aleph","og_description":"What is the Dark Web? Few pioneers came up with the idea of creating a \u201cnetwork within the network\u201d.","og_url":"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/","og_site_name":"Aleph","article_published_time":"2022-10-07T10:57:44+00:00","article_modified_time":"2023-05-03T11:10:23+00:00","og_image":[{"width":1000,"height":1073,"url":"https:\/\/www.aleph-networks.eu\/\/wp-content\/uploads\/2020\/09\/ALEPH-2020-DARK-WEB-INFO-EN.png","type":"image\/png"}],"author":"laura","twitter_card":"summary_large_image","twitter_misc":{"Written by":"laura","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/#article","isPartOf":{"@id":"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/"},"author":{"name":"laura","@id":"https:\/\/www.aleph-networks.eu\/#\/schema\/person\/76fe0c889df1c5cdcc1b35e42711a64b"},"headline":"What is the Dark Web?","datePublished":"2022-10-07T10:57:44+00:00","dateModified":"2023-05-03T11:10:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/"},"wordCount":1886,"commentCount":0,"publisher":{"@id":"https:\/\/www.aleph-networks.eu\/#organization"},"image":{"@id":"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/#primaryimage"},"thumbnailUrl":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/09\/ALEPH-2020-DARK-WEB-INFO-EN.png","articleSection":["Blog","Resources"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/","url":"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/","name":"- Aleph","isPartOf":{"@id":"https:\/\/www.aleph-networks.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/#primaryimage"},"image":{"@id":"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/#primaryimage"},"thumbnailUrl":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/09\/ALEPH-2020-DARK-WEB-INFO-EN.png","datePublished":"2022-10-07T10:57:44+00:00","dateModified":"2023-05-03T11:10:23+00:00","description":"What is the Dark Web? Few pioneers came up with the idea of creating a \u201cnetwork within the network\u201d.","breadcrumb":{"@id":"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/#primaryimage","url":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/09\/ALEPH-2020-DARK-WEB-INFO-EN.png","contentUrl":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/09\/ALEPH-2020-DARK-WEB-INFO-EN.png","width":1000,"height":1073},{"@type":"BreadcrumbList","@id":"https:\/\/www.aleph-networks.eu\/\/en\/what-is-the-dark-web\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aleph-networks.eu\/en\/"},{"@type":"ListItem","position":2,"name":"What is the Dark Web?"}]},{"@type":"WebSite","@id":"https:\/\/www.aleph-networks.eu\/#website","url":"https:\/\/www.aleph-networks.eu\/","name":"Aleph","description":"","publisher":{"@id":"https:\/\/www.aleph-networks.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aleph-networks.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.aleph-networks.eu\/#organization","name":"Aleph","url":"https:\/\/www.aleph-networks.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aleph-networks.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/06\/logo-Aleph.png","contentUrl":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/06\/logo-Aleph.png","width":55,"height":55,"caption":"Aleph"},"image":{"@id":"https:\/\/www.aleph-networks.eu\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.aleph-networks.eu\/#\/schema\/person\/76fe0c889df1c5cdcc1b35e42711a64b","name":"laura","url":"https:\/\/www.aleph-networks.eu\/en\/author\/cemile\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/posts\/7821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/comments?post=7821"}],"version-history":[{"count":0,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/posts\/7821\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/media\/1905"}],"wp:attachment":[{"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/media?parent=7821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/categories?post=7821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/tags?post=7821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}