{"id":1364,"date":"2023-02-12T20:58:34","date_gmt":"2023-02-12T20:58:34","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1364"},"modified":"2023-02-12T20:58:34","modified_gmt":"2023-02-12T20:58:34","slug":"a-mely-web","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/anonimitas-online\/a-mely-web\/","title":{"rendered":"Az internet rejtett m\u00e9lys\u00e9geinek felfedez\u00e9se: A m\u00e9ly web meg\u00e9rt\u00e9se"},"content":{"rendered":"<p>The deep web is a huge portion of the internet that is inaccessible using traditional search engines. It comprises information, websites, and databases that are not indexed by search engines and can only be accessed via the use of specialized tools such as Tor software. The deep web contains the vast bulk of the internet\u2019s material, including court records, academic papers, library databases, and government information.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-dark-web\"><strong>A s\u00f6t\u00e9t web<\/strong><\/h2>\n\n\n<p>The Dark Web is a subsection of the Deep Web renowned for its links to criminal activities such as drug trafficking, identity theft, and the illegal trading of firearms and other products. This section of the Deep Web is only accessible with appropriate tools, and is populated by criminals as well as law enforcement. People sometimes use the words \u201cdeep\u201d and \u201cdark\u201d interchangeably, even though they don\u2019t mean the same thing. The Deep Web is the unsearchable portion of the Internet that is not indexed by search engines, while the Dark Web is the portion of the Deep Web linked to criminal activity.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"why-explore-the-deep-web-and-dark-web\"><strong>Mi\u00e9rt fedezz\u00fck fel a m\u00e9ly webet \u00e9s a s\u00f6t\u00e9t webet?<\/strong><\/h2>\n\n\n<p>Exploring the Internet anonymously has several advantages, especially for firms seeking a competitive edge by gaining insights about client behavior before their competitors. The Dark Web provides a place for genuine customer feedback, from which corporations may get important insights unavailable on the heavily controlled and filtered Clear Net. Although, the Dark Web\u2019s ethos, which is defined by a sense of adventure and unpredictability, may provide a problem for the data-driven business world.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-is-the-structure-of-the-deep-web-different-from-the-surface-web\"><strong>Hogyan k\u00fcl\u00f6nb\u00f6zik a m\u00e9ly web szerkezete a felsz\u00edni webt\u0151l?<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Structure-of-the-Deep-Web-banner-1.jpg\" alt=\"A m\u00e9ly web szerkezete\" class=\"wp-image-1405\" width=\"768\" height=\"396\"\/><\/figure>\n\n\n\n<p><br>A m\u00e9ly web \u00e1ltal haszn\u00e1lt nyelvi rendszer, a TCP\/IP (Transmission Control Protocol\/Internet Protocol), hasonl\u00f3 a felsz\u00edni web \u00e1ltal haszn\u00e1lt rendszerhez. Ez a rendszer lehet\u0151v\u00e9 teszi, hogy a sz\u00e1m\u00edt\u00f3g\u00e9pek kommunik\u00e1ljanak egym\u00e1ssal az interneten kereszt\u00fcl, h\u00e1l\u00f3zati csomagok form\u00e1j\u00e1ban t\u00f6rt\u00e9n\u0151 adat\u00e1tvitellel. A m\u00e9r\u00e9si rendszer legkisebb egys\u00e9ge egy csomag, amely lehet bitekb\u0151l, byte-okb\u00f3l, kilobyte-okb\u00f3l, megabyte-okb\u00f3l, gigabyte-okb\u00f3l vagy terabyte-okb\u00f3l \u00e1ll\u00f3.<\/p>\n\n\n\n<p>A TCP nagy mennyis\u00e9g\u0171 adatot t\u00f6m\u00f6r\u00edt kezelhet\u0151 csomagokk\u00e1, m\u00edg az IP jel\u00f6l\u0151k\u00e9nt m\u0171k\u00f6dik, hogy seg\u00edtse a csomagok c\u00e9lba juttat\u00e1s\u00e1t az internet hatalmas h\u00e1l\u00f3zat\u00e1n kereszt\u00fcl. <\/p>\n\n\n\n<p>Az eredeti TCP\/IP rendszer n\u00e9gy r\u00e9tegb\u0151l \u00e1llt: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Az alkalmaz\u00e1si r\u00e9teg<\/strong><\/li>\n\n\n\n<li><strong>A sz\u00e1ll\u00edt\u00e1si r\u00e9teg <\/strong><\/li>\n\n\n\n<li><strong>Az internet r\u00e9teg<\/strong> <\/li>\n\n\n\n<li><strong>A kapcsolat r\u00e9teg<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Az internethez val\u00f3 kapcsol\u00f3d\u00e1s m\u00f3dja egy alkalmaz\u00e1si r\u00e9teg nev\u0171 r\u00e9tegen kereszt\u00fcl t\u00f6rt\u00e9nik. Ez a r\u00e9teg seg\u00edti a kommunik\u00e1ci\u00f3t a k\u00fcl\u00f6nb\u00f6z\u0151 weboldalak k\u00f6z\u00f6tt, m\u00e9g akkor is, ha ugyanazon a weboldalon vannak, k\u00e9t k\u00fcl\u00f6nb\u00f6z\u0151 weboldalon, vagy k\u00f6zel vagy t\u00e1vol helyezkednek el egym\u00e1st\u00f3l. A h\u00e1l\u00f3zati r\u00e9teg \u00f6sszek\u00f6ti ezeket a weboldalakat, \u00e9s a kapcsolat r\u00e9teg k\u00e9pviseli a fizikai eszk\u00f6z\u00f6ket, amelyeket az internet el\u00e9r\u00e9s\u00e9hez haszn\u00e1l.<\/p>\n\n\n\n<p>A felsz\u00edni web \u00e9s a m\u00e9ly web k\u00fcl\u00f6nb\u00f6z\u0151 t\u00edpus\u00fa weboldal list\u00e1z\u00e1sokkal rendelkezik. A felsz\u00edni weben tal\u00e1lhat\u00f3 weboldalak a DNS nyilv\u00e1ntart\u00e1sban szerepelnek, \u00e9s k\u00f6nnyen megtal\u00e1lhat\u00f3k olyan \u00e1ltal\u00e1nos webb\u00f6ng\u00e9sz\u0151kkel, mint a Chrome \u00e9s a Firefox. Azonban a m\u00e9ly weben tal\u00e1lhat\u00f3 weboldalak nem jelennek meg a DNS nyilv\u00e1ntart\u00e1sban, \u00e9s nem tal\u00e1lhat\u00f3k meg hagyom\u00e1nyos m\u00f3dszerekkel. <\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-origin-of-the-tor-project\"><strong>A TOR projekt eredete<\/strong><\/h2>\n\n\n<p>The TOR Project, had its beginnings at the US Naval Research Laboratory. In the 1990s, Paul Syverson, David Goldschlag, and Michael Reed came up with the idea of \u201conion routing.\u201d Roger Dingledine and Nick Mathewson later refined the concept and officially launched the TOR Project on September 20th, 2002. The Electronic Frontier Foundation (EFF) continued funding the project to further its development.<\/p>\n\n\n\n<p>A TOR-t eredetileg az\u00e9rt fejlesztett\u00e9k ki, hogy megv\u00e9dje a k\u00fclf\u00f6ld\u00f6n \u00e1llom\u00e1soz\u00f3 katonai szem\u00e9lyzet identit\u00e1s\u00e1t. Hogy tov\u00e1bb rejtse identit\u00e1sukat \u00e9s hely\u00fcket, a TOR-t 2003 okt\u00f3ber\u00e9ben nyilv\u00e1nosan kiadt\u00e1k ingyenes, ny\u00edlt forr\u00e1sk\u00f3d\u00fa b\u00f6ng\u00e9sz\u0151k\u00e9nt. A c\u00e9l az volt, hogy a katonai szem\u00e9lyzet beleolvadjon a civil felhaszn\u00e1l\u00f3k anonim forgalm\u00e1ba.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"understanding-the-working-of-tor-network\"><strong>A Tor h\u00e1l\u00f3zat m\u0171k\u00f6d\u00e9s\u00e9nek meg\u00e9rt\u00e9se<\/strong><\/h2>\n\n\n<p>Tor, or The Onion Router, is a network consisting of thousands of volunteer routers, also known as nodes. The functioning of Tor is relatively simple. When a user\u2019s data is sent through Tor, it is encrypted at least three times, or relays, before reaching its destination. This makes it difficult, if not impossible, to trace the user or client as their identity and address are masked three times.<\/p>\n\n\n\n<p>A Tor nemcsak egy\u00e9ni felhaszn\u00e1l\u00f3knak biztos\u00edt anonimit\u00e1st, hanem teljes weboldalaknak is, \u00e9s seg\u00edti a Peer to Peer (P2P) alkalmaz\u00e1sok konfigur\u00e1l\u00e1s\u00e1t torrent f\u00e1jlok megoszt\u00e1s\u00e1ra \u00e9s let\u00f6lt\u00e9s\u00e9re. <\/p>\n\n\n\n<p class=\"translation-block\">\u00f6nk\u00e9nt jelentkezhet, hogy r\u00e9sze legyen ennek, ha h\u00e1romf\u00e9le csom\u00f3pont egyik\u00e9t futtatja: <strong>k\u00f6ztes rel\u00e9k<\/strong>, <strong>kil\u00e9p\u0151 rel\u00e9k<\/strong> vagy <strong>hidak<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"translation-block\">A <strong>k\u00f6ztes rel\u00e9k<\/strong> tov\u00e1bb\u00edtj\u00e1k az adatokat, fenntartj\u00e1k azok sebess\u00e9g\u00e9t \u00e9s titkos\u00edtj\u00e1k azokat. K\u00f6nnyen megtal\u00e1lhat\u00f3k \u00e9s viszonylag biztons\u00e1gosak a csatlakoz\u00e1shoz, mivel a hely\u00fck rejtett.<\/li>\n\n\n\n<li class=\"translation-block\">A <strong>kil\u00e9p\u0151 rel\u00e9k<\/strong> az utols\u00f3 \u00e1llom\u00e1s a titkos\u00edt\u00e1si folyamatban, \u00e9s mindenki sz\u00e1m\u00e1ra l\u00e1that\u00f3ak a h\u00e1l\u00f3zaton. Azonban, ha illeg\u00e1lis tev\u00e9kenys\u00e9g t\u00f6rt\u00e9nik a h\u00e1l\u00f3zaton, a kil\u00e9p\u0151 rel\u00e9 felel\u0151ss\u00e9gre vonhat\u00f3. A kil\u00e9p\u0151 rel\u00e9 futtat\u00e1sa nem aj\u00e1nlott hobbi c\u00e9lokra vagy szem\u00e9lyi sz\u00e1m\u00edt\u00f3g\u00e9p-felhaszn\u00e1l\u00f3knak, mivel a rend\u0151rs\u00e9g lefoglalhatja a sz\u00e1m\u00edt\u00f3g\u00e9p\u00e9t, ha illeg\u00e1lis tev\u00e9kenys\u00e9gek miatt kompromitt\u00e1l\u00f3dik.<\/li>\n\n\n\n<li class=\"translation-block\">A <strong>h\u00edd rel\u00e9k<\/strong> a Tor h\u00e1l\u00f3zaton nincsenek nyilv\u00e1nosan felsorolva, \u00e9s seg\u00edtenek elker\u00fclni a cenz\u00far\u00e1t olyan orsz\u00e1gokban, mint K\u00edna. Biztons\u00e1gosnak tekinthet\u0151k az otthoni futtat\u00e1sra, hasonl\u00f3an a k\u00f6ztes rel\u00e9khez.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"accessing-the-darknet\"><strong>A darknet el\u00e9r\u00e9se<\/strong><\/h2>\n\n\n<p>To gain access to the darknet, special software like the Tor browser is needed. This browser helps you visit websites that aren\u2019t indexed by regular search engines and provides increased privacy and anonymity.<\/p>\n\n\n\n<p>Before accessing the darknet, it\u2019s highly advisable to set up a Virtual Private Network (VPN) first. Setting up a VPN is crucial for protecting your online privacy and security. With a VPN, your internet traffic is encrypted, making it difficult for others to monitor your online activities. This means that your Internet Service Provider (ISP) won\u2019t be able to track which websites you visit or what content you access on the darknet.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"surfing-the-darknet\"><strong>A darknet b\u00f6ng\u00e9sz\u00e9se<\/strong><\/h2>\n\n\n<p>Miut\u00e1n csatlakozott a Tor h\u00e1l\u00f3zathoz, kereshet a darkweben tal\u00e1lhat\u00f3 weboldalakat egy keres\u0151motor, p\u00e9ld\u00e1ul a Torch haszn\u00e1lat\u00e1val, vagy manu\u00e1lisan be\u00edrva egy adott weboldal URL-j\u00e9t. A b\u00f6ng\u00e9sz\u0151 blokkolja a b\u0151v\u00edtm\u00e9nyeket, mint p\u00e9ld\u00e1ul a Flash, RealPlayer, QuickTime \u00e9s m\u00e1sok, amelyeket manipul\u00e1lhatnak az IP-c\u00edm felfed\u00e9s\u00e9re. Ez megk\u00f6nny\u00edti az identit\u00e1s v\u00e9delm\u00e9t a web b\u00f6ng\u00e9sz\u00e9se k\u00f6zben. Ezenk\u00edv\u00fcl az \u00f6sszes webes forgalma anonimiz\u00e1lva van a Tor h\u00e1l\u00f3zaton kereszt\u00fcl, \u00edgy lehetetlen visszak\u00f6vetni \u00d6nh\u00f6z.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"dark-web-search-engines\"><strong>Dark web keres\u0151motorok<\/strong><\/h3>\n\n\n<p>When searching for information on the dark web, it\u2019s essential to use a secure and private search engine that allows for anonymous browsing. You also want a search engine that is fast and efficient, so you can quickly find the information you need. <\/p>\n\n\n\n<p><strong>\u00cdme n\u00e9h\u00e1ny a legjobb dark web keres\u0151motorok k\u00f6z\u00fcl, amelyek a Tor b\u00f6ng\u00e9sz\u0151vel haszn\u00e1lhat\u00f3k:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>F\u00e1klya:<\/strong> Torch is a fast and efficient dark web search engine that sources its results from over 60 different platforms, including social media sites like Twitter and Reddit, and websites hosted on the Tor network. It offers advanced features like keyword highlighting and filtering options to help you find what you\u2019re looking for quickly and easily.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Not Evil<\/strong>: A Not Evil egy felhaszn\u00e1l\u00f3bar\u00e1t dark web keres\u0151motor, amely lehet\u0151v\u00e9 teszi, hogy kulcsszavak vagy kifejez\u00e9sek haszn\u00e1lat\u00e1val keressen specifikus tartalmakat. Sz\u00e1mos sz\u0171r\u0151t k\u00edn\u00e1l, mint p\u00e9ld\u00e1ul nyelv, r\u00e9gi\u00f3, d\u00e1tumtartom\u00e1ny, f\u00e1jlm\u00e9ret \u00e9s m\u00e1sok, amelyek megk\u00f6nny\u00edtik a keres\u00e9s finom\u00edt\u00e1s\u00e1t \u00e9s az inform\u00e1ci\u00f3 gyors megtal\u00e1l\u00e1s\u00e1t.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Ahmia<\/strong>: Az Ahmia egy finn alap\u00fa dark web keres\u0151motor, amely az illeg\u00e1lis tev\u00e9kenys\u00e9gekkel kapcsolatos tartalmak megtal\u00e1l\u00e1s\u00e1ra \u00f6sszpontos\u00edt, mint p\u00e9ld\u00e1ul a gyermekek kizs\u00e1km\u00e1nyol\u00e1sa. G\u00e9pi tanul\u00e1s \u00e9s emberi intelligencia kombin\u00e1ci\u00f3j\u00e1t haszn\u00e1lja, hogy pontos \u00e9s naprak\u00e9sz eredm\u00e9nyeket ny\u00fajtson, amelyek nem \u00e9rhet\u0151k el hagyom\u00e1nyos keres\u0151motorokkal.<\/li>\n\n\n\n<li><strong>Grams keres\u0151motor<\/strong>: A Grams keres\u0151motor egy orosz fejleszt\u00e9s\u0171 keres\u0151motor, amely seg\u00edt a felhaszn\u00e1l\u00f3knak hozz\u00e1f\u00e9rni az illeg\u00e1lis \u00e1ruk, p\u00e9ld\u00e1ul drogok \u00e9s fegyverek Oroszorsz\u00e1gban t\u00f6rt\u00e9n\u0151 elad\u00e1s\u00e1val kapcsolatos inform\u00e1ci\u00f3khoz. K\u00fcl\u00f6nb\u00f6z\u0151 piacterekr\u0151l gy\u0171jti \u00f6ssze a list\u00e1kat, \u00edgy k\u00f6nny\u0171 az \u00f6sszes list\u00e1t egy helyen b\u00f6ng\u00e9szni, ahelyett, hogy minden piacteret k\u00fcl\u00f6n-k\u00fcl\u00f6n kellene megl\u00e1togatni.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Candle Light Search Engine<\/strong>: A Candle Light egy dark web keres\u0151motor, amely illeg\u00e1lis \u00fczletekhez, p\u00e9ld\u00e1ul drogok, fegyverek \u00e9s lopott hitelk\u00e1rtyaadatok elad\u00e1s\u00e1hoz biztos\u00edt linkeket. Kiz\u00e1r\u00f3lag ezekhez az \u00fczletekhez ad linkeket, a term\u00e9klist\u00e1k indexel\u00e9se helyett, ami jav\u00edtja a biztons\u00e1got, mivel nem kell agg\u00f3dni harmadik f\u00e9l \u00e1ltali k\u00f6vet\u00e9s miatt.<\/li>\n<\/ol>\n\n\n<h2 class=\"wp-block-heading\" id=\"law-enforcement-vs-the-darknet-the-ongoing-battle\"><strong>B\u0171n\u00fcld\u00f6z\u00e9s vs. a darknet: A folyamatos harc<\/strong><\/h2>\n\n\n<p>A b\u0171n\u00fcld\u00f6z\u00e9s \u00e9s a darknet r\u00e9g\u00f3ta intenz\u00edv macska-eg\u00e9r harcban \u00e1llnak. Anonimit\u00e1s\u00e1val \u00e9s szab\u00e1lyozatlans\u00e1g\u00e1val a darknet n\u00e9pszer\u0171 c\u00e9lpontt\u00e1 v\u00e1lt a b\u0171n\u00f6z\u0151k sz\u00e1m\u00e1ra, hogy aljas tev\u00e9kenys\u00e9geket v\u00e9gezzenek, p\u00e9ld\u00e1ul drogok vagy fegyverek v\u00e1s\u00e1rl\u00e1s\u00e1t, ami egyre nehezebb\u00e9 teszi a b\u0171n\u00fcld\u00f6z\u0151 szervek sz\u00e1m\u00e1ra, hogy elkapj\u00e1k \u0151ket. <\/p>\n\n\n\n<p>Ennek eredm\u00e9nyek\u00e9nt ezeknek a szervezeteknek kreat\u00edvnak kell lenni\u00fck, amikor elk\u00f6vet\u0151ket keresnek ezen a titokzatos h\u00e1l\u00f3zaton; kifinomult m\u00f3dszereket alkalmaznak, amelyeket kifejezetten arra terveztek, hogy m\u00e9g a legink\u00e1bb \u00e9szrev\u00e9tlen b\u0171n\u00f6z\u0151i tev\u00e9kenys\u00e9get is felder\u00edts\u00e9k, amely a m\u00e9lys\u00e9geiben zajlik.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Az egyik m\u00f3dja annak, hogy a b\u0171n\u00fcld\u00f6z\u00e9s le tudja csapni az illeg\u00e1lis tev\u00e9kenys\u00e9geket a darkneten, az az, hogy fejlett analitikai eszk\u00f6z\u00f6ket haszn\u00e1lnak, amelyek lehet\u0151v\u00e9 teszik sz\u00e1mukra, hogy nagy mennyis\u00e9g\u0171 adatot gyorsan \u00e9s pontosan elemezzenek. Ezek az eszk\u00f6z\u00f6k seg\u00edtenek megtal\u00e1lni a felhaszn\u00e1l\u00f3k viselked\u00e9s\u00e9ben rejl\u0151 mint\u00e1kat, amelyek gyan\u00fas viselked\u00e9s jelei lehetnek, vagy ak\u00e1r kapcsolatok lehetnek azok k\u00f6z\u00f6tt, akik illeg\u00e1lis dolgokat tesznek.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A b\u0171n\u00fcld\u00f6z\u00e9s \u00e1ltal alkalmazott m\u00e1sik technika az \u00e1lc\u00e1zott m\u0171veletek, ahol az \u00fcgyn\u00f6k\u00f6k v\u00e1s\u00e1rl\u00f3k\u00e9nt vagy elad\u00f3k\u00e9nt p\u00f3zolnak k\u00fcl\u00f6nb\u00f6z\u0151 piactereken a darkneten bel\u00fcl, hogy bizony\u00edt\u00e9kokat gy\u0171jtsenek az online illeg\u00e1lis tev\u00e9kenys\u00e9gekben r\u00e9szt vev\u0151k ellen. Ez a fajta m\u0171velet nagy \u00fcgyess\u00e9get \u00e9s k\u00e9pz\u00e9st ig\u00e9nyel az \u00fcgyn\u00f6k\u00f6kt\u0151l, mivel k\u00e9pesnek kell lenni\u00fck beilleszkedni a k\u00f6rnyezet\u00fckbe an\u00e9lk\u00fcl, hogy gyan\u00fat kelten\u00e9nek m\u00e1s felhaszn\u00e1l\u00f3kban, mik\u00f6zben elegend\u0151 inform\u00e1ci\u00f3t gy\u0171jtenek a potenci\u00e1lis gyan\u00fas\u00edtottakr\u00f3l vagy c\u00e9lpontokr\u00f3l, miel\u0151tt b\u00e1rmilyen letart\u00f3ztat\u00e1st vagy lefoglal\u00e1st v\u00e9gezn\u00e9nek a h\u00e1l\u00f3zaton bel\u00fcl zajl\u00f3 b\u0171n\u00f6z\u0151i tev\u00e9kenys\u00e9ggel kapcsolatban.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>V\u00e9g\u00fcl n\u00e9h\u00e1ny orsz\u00e1g elkezdett olyan t\u00f6rv\u00e9nyeket hozni, amelyek az online h\u00e1l\u00f3zatokon, p\u00e9ld\u00e1ul a Toron kereszt\u00fcl illeg\u00e1lis dolgokat v\u00e9gz\u0151 emberek ellen ir\u00e1nyulnak, amely a legn\u00e9pszer\u0171bb b\u00f6ng\u00e9sz\u0151 a s\u00f6t\u00e9t weben tal\u00e1lhat\u00f3 oldalak el\u00e9r\u00e9s\u00e9hez. P\u00e9ld\u00e1ul sok eur\u00f3pai orsz\u00e1g most m\u00e1r megk\u00f6veteli az internetszolg\u00e1ltat\u00f3kt\u00f3l (ISP-k), hogy jelentsenek minden gyan\u00fas forgalmat, amely Tor-alap\u00fa szolg\u00e1ltat\u00e1sokb\u00f3l sz\u00e1rmazik, amelyet sz\u00fcks\u00e9g eset\u00e9n a rend\u0151rs\u00e9g tov\u00e1bb vizsg\u00e1lhat.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"ethics-and-morality\"><strong>Etika \u00e9s erk\u00f6lcs<\/strong><\/h2>\n\n\n<p>A s\u00f6t\u00e9t web az internet s\u00f6t\u00e9t \u00e9s rejtett r\u00e9sze, amelyet illeg\u00e1lis tev\u00e9kenys\u00e9gekre haszn\u00e1lnak, p\u00e9ld\u00e1ul k\u00e1b\u00edt\u00f3szer-kereskedelemre \u00e9s p\u00e9nzmos\u00e1sra. Azonban saj\u00e1t etikai \u00e9s erk\u00f6lcsi szab\u00e1lyai is vannak, amelyek ir\u00e1ny\u00edtj\u00e1k az interakci\u00f3t.<\/p>\n\n\n\n<p>A s\u00f6t\u00e9t web etik\u00e1j\u00e1nak megvitat\u00e1sakor mind a b\u0171n\u00f6z\u0151i tev\u00e9kenys\u00e9geket, mind a mag\u00e1n\u00e9letet keres\u0151ket figyelembe kell venni. Egyesek azt \u00e1ll\u00edthatj\u00e1k, hogy a drogok vagy fegyverek v\u00e1s\u00e1rl\u00e1sa etik\u00e1tlan a t\u00f6rv\u00e9nys\u00e9rt\u00e9s miatt, m\u00edg m\u00e1sok a mag\u00e1n\u00e9let jogai mellett \u00e9rvelhetnek, m\u00e9g akkor is, ha t\u00f6rv\u00e9nyeket s\u00e9rtenek.<\/p>\n\n\n\n<p>A kriptovalut\u00e1k, p\u00e9ld\u00e1ul a Bitcoin, anonimiz\u00e1lhatj\u00e1k a s\u00f6t\u00e9t webes tranzakci\u00f3kat, de lehet\u0151s\u00e9g\u00fck van vissza\u00e9l\u00e9sre is, p\u00e9ld\u00e1ul p\u00e9nzmos\u00e1s el\u0151seg\u00edt\u00e9s\u00e9re.<\/p>\n\n\n\n<p>Tekintettel a b\u0171n\u00f6z\u0151i tev\u00e9kenys\u00e9ggel val\u00f3 kapcsolat\u00e1ra, meg kell k\u00e9rd\u0151jelezni a s\u00f6t\u00e9t weben v\u00e9gzett tev\u00e9kenys\u00e9gek erk\u00f6lcs\u00e9t. Az anonimit\u00e1s biztons\u00e1got ny\u00fajthat az elnyom\u00e1s \u00e1ldozatainak vagy a kisziv\u00e1rogtat\u00f3knak, de lehet\u0151v\u00e9 teheti a szervezett b\u0171n\u00f6z\u00e9st \u00e9s a terrorizmust is.<\/p>\n\n\n\n<p>The debate on what constitutes \u201cright\u201d versus \u201cwrong\u201d behavior on the dark web will likely continue due to a lack of expert consensus. Despite the risks, many still use the dark web for privacy protection and to avoid cybercrime.<\/p>\n\n\n\n<p>Az egyes felhaszn\u00e1l\u00f3k felel\u0151ss\u00e9ge, hogy meghat\u00e1rozz\u00e1k a s\u00f6t\u00e9t weben v\u00e9gzett tev\u00e9kenys\u00e9geik etik\u00e1j\u00e1t szem\u00e9lyes digit\u00e1lis etik\u00e1juk alapj\u00e1n.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"future-of-the-darknet\"><strong>A darknet j\u00f6v\u0151je<\/strong><\/h2>\n\n\n<p>A s\u00f6t\u00e9t web j\u00f6v\u0151je bizonytalan \u00e9s spekul\u00e1ci\u00f3ra nyitott. Egyr\u00e9szt a b\u0171n\u00fcld\u00f6z\u00e9s \u00e9s a korm\u00e1nyzati szervek fokozott er\u0151fesz\u00edt\u00e9sei az illeg\u00e1lis tev\u00e9kenys\u00e9gek visszaszor\u00edt\u00e1s\u00e1ra biztons\u00e1gosabb \u00e9s szab\u00e1lyozottabb s\u00f6t\u00e9t webet eredm\u00e9nyezhetnek. M\u00e1sr\u00e9szt a mag\u00e1n\u00e9let v\u00e9delm\u00e9vel kapcsolatos aggodalmak \u00e9s a technol\u00f3gia n\u00f6vekv\u0151 haszn\u00e1lata a s\u00f6t\u00e9t web b\u0151v\u00fcl\u00e9s\u00e9hez vezethet, mint az illeg\u00e1lis tev\u00e9kenys\u00e9gek mened\u00e9ke.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"in-conclusion\"><strong>\u00d6sszefoglalva<\/strong><\/h2>\n\n\n<p>A s\u00f6t\u00e9t web \u00f6sszetett, mind illeg\u00e1lis, mind mag\u00e1n\u00e9let-v\u00e9delmi c\u00e9lokra haszn\u00e1lhat\u00f3. J\u00f6v\u0151je bizonytalan, \u00e9s a technol\u00f3gia \u00e9s k\u00fcl\u00f6nb\u00f6z\u0151 \u00e9rdekelt felek befoly\u00e1solj\u00e1k. Fontos, hogy t\u00e1j\u00e9kozottak maradjunk a biztons\u00e1gos online k\u00f6rnyezet \u00e9rdek\u00e9ben.<\/p>","protected":false},"excerpt":{"rendered":"<p>A m\u00e9ly web az internet hatalmas r\u00e9sze, amely hagyom\u00e1nyos keres\u0151motorokkal nem \u00e9rhet\u0151 el. Inform\u00e1ci\u00f3kat, weboldalakat \u00e9s adatb\u00e1zisokat tartalmaz, amelyeket a keres\u0151motorok nem indexelnek\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/anonimitas-online\/a-mely-web\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Az internet rejtett m\u00e9lys\u00e9geinek felfedez\u00e9se: A m\u00e9ly web meg\u00e9rt\u00e9se<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1367,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-1364","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-anonymity-online","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Deep Web: A Hidden World of Information<\/title>\n<meta name=\"description\" content=\"Explore the hidden world of the Deep Web and discover the websites, and databases not indexed by traditional search engines.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/anonimitas-online\/a-mely-web\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Deep Web: A Hidden World of Information\" \/>\n<meta property=\"og:description\" content=\"Explore the hidden world of the Deep Web and discover the websites, and databases not indexed by traditional search engines.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/anonimitas-online\/a-mely-web\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-12T20:58:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Exploring the Hidden Depths of the Internet: Understanding the Deep Web\",\"datePublished\":\"2023-02-12T20:58:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/\"},\"wordCount\":2038,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg\",\"articleSection\":[\"Anonymity online\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/\",\"url\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/\",\"name\":\"The Deep Web: A Hidden World of Information\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg\",\"datePublished\":\"2023-02-12T20:58:34+00:00\",\"description\":\"Explore the hidden world of the Deep Web and discover the websites, and databases not indexed by traditional search engines.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Exploring the Hidden Depths of the Internet Understanding the Deep Web\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exploring the Hidden Depths of the Internet: Understanding the Deep Web\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A M\u00e9lyweb: Az Inform\u00e1ci\u00f3k Rejtett Vil\u00e1ga","description":"Fedezze fel a Deep Web rejtett vil\u00e1g\u00e1t, \u00e9s fedezze fel azokat a weboldalakat \u00e9s adatb\u00e1zisokat, amelyeket a hagyom\u00e1nyos keres\u0151motorok nem indexelnek.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/anonimitas-online\/a-mely-web\/","og_locale":"hu_HU","og_type":"article","og_title":"The Deep Web: A Hidden World of Information","og_description":"Explore the hidden world of the Deep Web and discover the websites, and databases not indexed by traditional search engines.","og_url":"https:\/\/securitybriefing.net\/hu\/anonimitas-online\/a-mely-web\/","og_site_name":"Security Briefing","article_published_time":"2023-02-12T20:58:34+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"security","Becs\u00fclt olvas\u00e1si id\u0151":"10 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Exploring the Hidden Depths of the Internet: Understanding the Deep Web","datePublished":"2023-02-12T20:58:34+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/"},"wordCount":2038,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg","articleSection":["Anonymity online"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/","url":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/","name":"A M\u00e9lyweb: Az Inform\u00e1ci\u00f3k Rejtett Vil\u00e1ga","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg","datePublished":"2023-02-12T20:58:34+00:00","description":"Fedezze fel a Deep Web rejtett vil\u00e1g\u00e1t, \u00e9s fedezze fel azokat a weboldalakat \u00e9s adatb\u00e1zisokat, amelyeket a hagyom\u00e1nyos keres\u0151motorok nem indexelnek.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg","width":662,"height":327,"caption":"Exploring the Hidden Depths of the Internet Understanding the Deep Web"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Exploring the Hidden Depths of the Internet: Understanding the Deep Web"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"biztons\u00e1g","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin a Government Technology vezet\u0151 munkat\u00e1rsa. Kor\u00e1bban a PYMNTS \u00e9s a The Bay State Banner sz\u00e1m\u00e1ra \u00edrt, \u00e9s a Carnegie Mellon Egyetemen szerzett B.A. diplom\u00e1t kreat\u00edv \u00edr\u00e1sb\u00f3l. Boston k\u00f6rny\u00e9k\u00e9n \u00e9l.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/hu\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1364"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1364\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1367"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}