{"id":8107,"date":"2021-09-30T09:03:43","date_gmt":"2021-09-30T07:03:43","guid":{"rendered":"https:\/\/www.aleph-networks.com\/the-different-types-of-sites-on-the-dark-web-2-3\/"},"modified":"2023-05-10T09:06:12","modified_gmt":"2023-05-10T07:06:12","slug":"the-different-types-of-sites-on-the-dark-web-2-3","status":"publish","type":"post","link":"https:\/\/www.aleph-networks.eu\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/","title":{"rendered":"The Different Types of Sites on the Dark Web. 2\/3"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;1616px&#8221; custom_margin=&#8221;||-40px||false|false&#8221; custom_padding=&#8221;4px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;83px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h1 style=\"text-align: center;\">The Different Types of Sites on the Dark Web. 2\/3<\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row module_id=&#8221;Lessitesdedepotdecode&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#E09900&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; link_font=&#8221;Barlow Condensed||||||||&#8221; ul_font=&#8221;Barlow Condensed||||||||&#8221; ol_font=&#8221;Barlow Condensed||||||||&#8221; custom_padding=&#8221;|0px||22px||&#8221; locked=&#8221;off&#8221; inline_fonts=&#8221;Barlow Condensed&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>Repositories<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; link_font=&#8221;Barlow Condensed||||||||&#8221; ul_font=&#8221;Barlow Condensed||||||||&#8221; ol_font=&#8221;Barlow Condensed||||||||&#8221; custom_padding=&#8221;|27px||22px||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The dark web contains many sites that host source code. The equivalent on the clear web is GitHub, an online management and hosting service for software development.<\/p>\n<p>The dark web also features its own versions of these web services.<\/p>\n<p>This means we can find malicious people that offer ready-to-use malware<sup>3<\/sup> or personal backups of code repositories. The purpose is always the same: to find an uncensored space that offers freedom of expression. This philosophy, which is key to the dark web itself, means that repositories can easily be either malicious (like the screenshot below) or harmless, with communities of open source software developers or personal backups for educational purposes.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;25px|auto|-30px|auto|false|false&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#E09900&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; link_font=&#8221;Barlow Condensed||||||||&#8221; ul_font=&#8221;Barlow Condensed||||||||&#8221; ol_font=&#8221;Barlow Condensed||||||||&#8221; custom_margin=&#8221;||28px|||&#8221; custom_padding=&#8221;|0px|0px|22px||&#8221; global_colors_info=&#8221;{}&#8221;]The screenshot to the right\/above shows the personal site of a developer on the dark web. This person seems to still be active, for although the projects are several years old, some are regularly updated. Upon closer look, the code shown seems innocuous, and there\u2019s an identical copy of their GitHub4 on the clear web. <\/p>\n<p>The developer also mentioned that they prefer for the code associated with their projects to be consulted on the dark web to guarantee complete freedom.[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/09\/Screenshot_3.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; force_fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;100px&#8221; custom_margin=&#8221;|132px||-4px|false|false&#8221; custom_padding=&#8221;|16px|25px|15px||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Private repository containing various copies of source code.<\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/09\/Screenshot_1.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; width=&#8221;55%&#8221; min_height=&#8221;268px&#8221; custom_margin=&#8221;-19px|||||&#8221; custom_padding=&#8221;7px|||0px||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; link_font=&#8221;Barlow Condensed||||||||&#8221; ul_font=&#8221;Barlow Condensed||||||||&#8221; ol_font=&#8221;Barlow Condensed||||||||&#8221; custom_padding=&#8221;|0px||22px||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Example of malicious software that is freely accessible on the dark web \u2013 the source code can be accessed by any cyberattacker who wants to use it.<\/em><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/09\/Screenshot_4.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; width=&#8221;62%&#8221; custom_margin=&#8221;7px||14px|||&#8221; custom_padding=&#8221;27px|||||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; link_font=&#8221;Barlow Condensed||||||||&#8221; ul_font=&#8221;Barlow Condensed||||||||&#8221; ol_font=&#8221;Barlow Condensed||||||||&#8221; custom_padding=&#8221;|0px||22px||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Site of a community of open source developers <\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-20px||||false|false&#8221; custom_padding=&#8221;1px||17px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;9px||6px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; link_font=&#8221;Barlow Condensed||||||||&#8221; ul_font=&#8221;Barlow Condensed||||||||&#8221; ol_font=&#8221;Barlow Condensed||||||||&#8221; custom_margin=&#8221;|44px||||&#8221; custom_padding=&#8221;|0px||22px||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Lastly, on the borderline between source code repositories and file hosting sites, the dark web also contains online \u201cPaste\u201d services. They are usually referred to by the name of the most well-known tool: Pastebin. Pastebin is a web application that publicly and anonymously publishes a message in the form of text, generally source code or URLs.<\/p>\n<p>These applications are popular and easy to use, making it possible to quickly post and publish text. They also exist on the dark web, guaranteeing greater anonymity and freedom of expression.<\/p>\n<p>\u00a0These services can be used to quickly share malware source code between ill-intended people, post links for downloading data leaks, or publish classified ads to sell weapons or drugs.\u00a0<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/09\/Screenshot_8.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;297.6px&#8221; custom_margin=&#8221;||28px|14px||&#8221; custom_padding=&#8221;52px|15px||43px||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; link_font=&#8221;Barlow Condensed||||||||&#8221; ul_font=&#8221;Barlow Condensed||||||||&#8221; ol_font=&#8221;Barlow Condensed||||||||&#8221; custom_padding=&#8221;|0px||22px||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>DeepPaste, one of the main paste tools on the dark web.<br \/>\nThis service also offers several display and publication options.<br \/>\n<\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;13px||11px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row module_id=&#8221;Lessitesdhebergementdefichiers&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#E09900&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; link_font=&#8221;Barlow Condensed||||||||&#8221; ul_font=&#8221;Barlow Condensed||||||||&#8221; ol_font=&#8221;Barlow Condensed||||||||&#8221; min_height=&#8221;55.7px&#8221; custom_margin=&#8221;-25px||||false|false&#8221; custom_padding=&#8221;0px|0px||22px||&#8221; locked=&#8221;off&#8221; inline_fonts=&#8221;Barlow Condensed&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>File Hosting Sites<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; link_font=&#8221;Barlow Condensed||||||||&#8221; ul_font=&#8221;Barlow Condensed||||||||&#8221; ol_font=&#8221;Barlow Condensed||||||||&#8221; custom_padding=&#8221;|33px||22px||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>File hosting sites are the next-to-last category of sites on the dark web. This type of digital service is also similar to what is available on the clear web while adding new elements.<\/p>\n<p>As a result, the data posted on these sites can vary greatly, from the most trivial to the most sensitive. We can find anything from press reviews to malware to data leaks. There are as many types of hosting sites as there are types of files to host.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/09\/Screenshot_9.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; width=&#8221;61%&#8221; max_width=&#8221;59%&#8221; module_alignment=&#8221;center&#8221; min_height=&#8221;295.4px&#8221; custom_margin=&#8221;||40px|||&#8221; custom_padding=&#8221;10px|1px|0px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-24px|||||&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Showcase site for a group of cybercriminals<\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; link_font=&#8221;Barlow Condensed||||||||&#8221; ul_font=&#8221;Barlow Condensed||||||||&#8221; ol_font=&#8221;Barlow Condensed||||||||&#8221; custom_padding=&#8221;22px|7px||22px||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>The screenshot to the top shows public projects for a group of cybercriminals, Darkmode Repository. The file names (like\u00a0\u201chall of shame\u201d and \u201cmarketplace\u201d) are fairly clear, and we can easily imagine what the group does.<\/p>\n<p>This example of a file hosting site may serve as a showcase for a community of pirates to gain exposure to sell more hacking or cyberattack services or simply to boost their reputation and legitimacy in a competitive environment.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_4,1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|auto|-2px|auto||&#8221; custom_padding=&#8221;||9px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; link_font=&#8221;Barlow Condensed||||||||&#8221; ul_font=&#8221;Barlow Condensed||||||||&#8221; ol_font=&#8221;Barlow Condensed||||||||&#8221; custom_margin=&#8221;33px|||||&#8221; custom_padding=&#8221;|13px||22px||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Another example of illegal activity includes websites that host some or all the files from a data breach. These data leaks resulting from a cyberattack are exposed on the dark web as a means of coercion to obtain a ransom payment (as with a ransomware attack). These attacks, which became popular during the Covid-19 pandemic, have dramatically increased the attack surface of information systems, and consequently the vulnerability to and occurrence of even further attacks.<\/p>\n<p>The screenshot to the right illustrates a data leak resulting from ransomware that targeted a large company. Since the firm refused to pay the ransom, the group of cybercriminals provided open access to part of the stolen data.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/09\/Screenshot_11.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; width=&#8221;74%&#8221; module_alignment=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;5.7px&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Open-access site hosting private data from a cyberattack<\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;35px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; border_color_all=&#8221;#E09900&#8243; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/09\/Screenshot_10.png&#8221; alt=&#8221; &#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; width=&#8221;60%&#8221; max_width=&#8221;53%&#8221; module_alignment=&#8221;center&#8221; custom_margin=&#8221;|-57px|29px|462px||&#8221; custom_padding=&#8221;|0px||0px||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Online shop with open access to software <\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; link_font=&#8221;Barlow Condensed||||||||&#8221; ul_font=&#8221;Barlow Condensed||||||||&#8221; ol_font=&#8221;Barlow Condensed||||||||&#8221; custom_padding=&#8221;|21px||22px||&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Lastly, some sites host more \u201cstandard\u201d files. These software \u201cshop\u201d allow visitors to choose the programs they want from a variety of specific categories.<\/p>\n<p>&nbsp;<\/p>\n<p>The screenshot to left shows the site Digital Thrift Shop, where visitors can download data leaks, ransomware, or even educational books and videos.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; link_font=&#8221;Barlow Condensed||||||||&#8221; ul_font=&#8221;Barlow Condensed||||||||&#8221; ol_font=&#8221;Barlow Condensed||||||||&#8221; custom_padding=&#8221;|0px||22px||&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Ultimately, the dark web contains the same type of sites as the regular web. However, by guaranteeing freedom of expression and anonymity, it also allows criminal activity to flourish.<\/p>\n<p>&nbsp;<\/p>\n<p>The dark web is a lawless space that contains as many risks as it does freedoms. Thanks to this overview of these different sites, we can now see that although the dark web is an integral part of the Internet, it is a very different environment that gives free rein to anarchy, a mercenary spirit, and spaces for free expression.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Different Types of Sites on the Dark Web. 2\/3RepositoriesThe dark web contains many sites that host source code. The equivalent on the clear web is GitHub, an online management and hosting service for software development. The dark web also features its own versions of these web services. This means we can find malicious people [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3443,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[41,42],"tags":[],"class_list":["post-8107","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-resources-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>- Aleph<\/title>\n<meta name=\"description\" content=\"The Different Types of Sites on the Dark Web. 2\/3\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"- Aleph\" \/>\n<meta property=\"og:description\" content=\"The Different Types of Sites on the Dark Web. 2\/3\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/\" \/>\n<meta property=\"og:site_name\" content=\"Aleph\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-30T07:03:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-10T07:06:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aleph-networks.eu\/\/wp-content\/uploads\/2021\/09\/image-de-mise-en-avant-article.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Aleph\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aleph\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/\"},\"author\":{\"name\":\"Aleph\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#\/schema\/person\/8621ecf2e3704397abb59c4937bfc8d9\"},\"headline\":\"The Different Types of Sites on the Dark Web. 2\/3\",\"datePublished\":\"2021-09-30T07:03:43+00:00\",\"dateModified\":\"2023-05-10T07:06:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/\"},\"wordCount\":2170,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/09\/image-de-mise-en-avant-article.png\",\"articleSection\":[\"Blog\",\"Resources\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/\",\"url\":\"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/\",\"name\":\"- Aleph\",\"isPartOf\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/09\/image-de-mise-en-avant-article.png\",\"datePublished\":\"2021-09-30T07:03:43+00:00\",\"dateModified\":\"2023-05-10T07:06:12+00:00\",\"description\":\"The Different Types of Sites on the Dark Web. 2\/3\",\"breadcrumb\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/#primaryimage\",\"url\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/09\/image-de-mise-en-avant-article.png\",\"contentUrl\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/09\/image-de-mise-en-avant-article.png\",\"width\":2000,\"height\":1600,\"caption\":\"les diff\u00e9rents types de sites du Dark Web\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aleph-networks.eu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Different Types of Sites on the Dark Web. 2\/3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#website\",\"url\":\"https:\/\/www.aleph-networks.eu\/\",\"name\":\"Aleph\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aleph-networks.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#organization\",\"name\":\"Aleph\",\"url\":\"https:\/\/www.aleph-networks.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/06\/logo-Aleph.png\",\"contentUrl\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/06\/logo-Aleph.png\",\"width\":55,\"height\":55,\"caption\":\"Aleph\"},\"image\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#\/schema\/person\/8621ecf2e3704397abb59c4937bfc8d9\",\"name\":\"Aleph\",\"url\":\"https:\/\/www.aleph-networks.eu\/en\/author\/280520aes\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"- Aleph","description":"The Different Types of Sites on the Dark Web. 2\/3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/","og_locale":"en_US","og_type":"article","og_title":"- Aleph","og_description":"The Different Types of Sites on the Dark Web. 2\/3","og_url":"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/","og_site_name":"Aleph","article_published_time":"2021-09-30T07:03:43+00:00","article_modified_time":"2023-05-10T07:06:12+00:00","og_image":[{"width":2000,"height":1600,"url":"https:\/\/www.aleph-networks.eu\/\/wp-content\/uploads\/2021\/09\/image-de-mise-en-avant-article.png","type":"image\/png"}],"author":"Aleph","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Aleph","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/#article","isPartOf":{"@id":"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/"},"author":{"name":"Aleph","@id":"https:\/\/www.aleph-networks.eu\/#\/schema\/person\/8621ecf2e3704397abb59c4937bfc8d9"},"headline":"The Different Types of Sites on the Dark Web. 2\/3","datePublished":"2021-09-30T07:03:43+00:00","dateModified":"2023-05-10T07:06:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/"},"wordCount":2170,"commentCount":0,"publisher":{"@id":"https:\/\/www.aleph-networks.eu\/#organization"},"image":{"@id":"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/09\/image-de-mise-en-avant-article.png","articleSection":["Blog","Resources"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/","url":"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/","name":"- Aleph","isPartOf":{"@id":"https:\/\/www.aleph-networks.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/#primaryimage"},"image":{"@id":"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/09\/image-de-mise-en-avant-article.png","datePublished":"2021-09-30T07:03:43+00:00","dateModified":"2023-05-10T07:06:12+00:00","description":"The Different Types of Sites on the Dark Web. 2\/3","breadcrumb":{"@id":"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/#primaryimage","url":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/09\/image-de-mise-en-avant-article.png","contentUrl":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/09\/image-de-mise-en-avant-article.png","width":2000,"height":1600,"caption":"les diff\u00e9rents types de sites du Dark Web"},{"@type":"BreadcrumbList","@id":"https:\/\/www.aleph-networks.eu\/\/en\/the-different-types-of-sites-on-the-dark-web-2-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aleph-networks.eu\/en\/"},{"@type":"ListItem","position":2,"name":"The Different Types of Sites on the Dark Web. 2\/3"}]},{"@type":"WebSite","@id":"https:\/\/www.aleph-networks.eu\/#website","url":"https:\/\/www.aleph-networks.eu\/","name":"Aleph","description":"","publisher":{"@id":"https:\/\/www.aleph-networks.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aleph-networks.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.aleph-networks.eu\/#organization","name":"Aleph","url":"https:\/\/www.aleph-networks.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aleph-networks.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/06\/logo-Aleph.png","contentUrl":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/06\/logo-Aleph.png","width":55,"height":55,"caption":"Aleph"},"image":{"@id":"https:\/\/www.aleph-networks.eu\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.aleph-networks.eu\/#\/schema\/person\/8621ecf2e3704397abb59c4937bfc8d9","name":"Aleph","url":"https:\/\/www.aleph-networks.eu\/en\/author\/280520aes\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/posts\/8107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/comments?post=8107"}],"version-history":[{"count":0,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/posts\/8107\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/media\/3443"}],"wp:attachment":[{"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/media?parent=8107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/categories?post=8107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/tags?post=8107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}