{"id":1364,"date":"2023-02-12T20:58:34","date_gmt":"2023-02-12T20:58:34","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1364"},"modified":"2023-02-12T20:58:34","modified_gmt":"2023-02-12T20:58:34","slug":"internetul-profund","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/anonimitate-online\/internetul-profund\/","title":{"rendered":"Explorarea ad\u00e2ncurilor ascunse ale internetului: \u00cen\u021belegerea Deep Web"},"content":{"rendered":"<p>Deep web este o por\u021biune imens\u0103 a internetului care nu poate fi accesat\u0103 folosind motoare de c\u0103utare tradi\u021bionale. Acesta cuprinde informa\u021bii, site-uri web \u0219i baze de date care nu sunt indexate de motoarele de c\u0103utare \u0219i pot fi accesate doar prin utilizarea unor instrumente specializate, cum ar fi software-ul Tor. Deep web con\u021bine majoritatea materialului de pe internet, inclusiv dosare de instan\u021b\u0103, lucr\u0103ri academice, baze de date ale bibliotecilor \u0219i informa\u021bii guvernamentale.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-dark-web\"><strong>Dark Web<\/strong><\/h2>\n\n\n<p>Dark Web este o subsec\u021biune a Deep Web cunoscut\u0103 pentru leg\u0103turile sale cu activit\u0103\u021bi criminale precum traficul de droguri, furtul de identitate \u0219i comer\u021bul ilegal cu arme de foc \u0219i alte produse. Aceast\u0103 sec\u021biune a Deep Web este accesibil\u0103 doar cu instrumente adecvate \u0219i este populat\u0103 at\u00e2t de criminali, c\u00e2t \u0219i de autorit\u0103\u021bile de aplicare a legii. Uneori, oamenii folosesc cuvintele \u201edeep\u201d \u0219i \u201edark\u201d interschimbabil, de\u0219i nu \u00eenseamn\u0103 acela\u0219i lucru. Deep Web este por\u021biunea din internet care nu poate fi c\u0103utat\u0103 \u0219i care nu este indexat\u0103 de motoarele de c\u0103utare, \u00een timp ce Dark Web este partea din Deep Web legat\u0103 de activit\u0103\u021bi criminale.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"why-explore-the-deep-web-and-dark-web\"><strong>De ce s\u0103 explorezi Deep Web \u0219i Dark Web?<\/strong><\/h2>\n\n\n<p>Explorarea internetului \u00een mod anonim are mai multe avantaje, mai ales pentru firmele care caut\u0103 un avantaj competitiv ob\u021bin\u00e2nd informa\u021bii despre comportamentul clien\u021bilor \u00eenaintea concuren\u021bei. Dark Web ofer\u0103 un loc pentru feedback-ul autentic al clien\u021bilor, din care companiile pot ob\u021bine informa\u021bii importante care nu sunt disponibile pe Clear Net-ul puternic controlat \u0219i filtrat. Cu toate acestea, ethosul Dark Web-ului, definit de un sentiment de aventur\u0103 \u0219i imprevizibilitate, poate reprezenta o problem\u0103 pentru lumea afacerilor bazat\u0103 pe date.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-is-the-structure-of-the-deep-web-different-from-the-surface-web\"><strong>Cum difer\u0103 structura Deep Web de Surface Web?<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Structure-of-the-Deep-Web-banner-1.jpg\" alt=\"Structura Web-ului Profund\" class=\"wp-image-1405\" width=\"768\" height=\"396\"\/><\/figure>\n\n\n\n<p><br>Sistemul lingvistic utilizat de Deep Web, TCP\/IP (Transmission Control Protocol\/Internet Protocol), este similar cu cel utilizat de Surface Web. Acest sistem permite calculatoarelor s\u0103 comunice \u00eentre ele prin internet prin transferul de date sub form\u0103 de pachete de re\u021bea. Cea mai mic\u0103 unitate din acest sistem de m\u0103surare este un pachet, care poate fi compus din bi\u021bi, octe\u021bi, kilobyte, megabyte, gigabyte sau terabyte.<\/p>\n\n\n\n<p>TCP comprim\u0103 cantit\u0103\u021bi mari de date \u00een pachete gestionabile, \u00een timp ce IP ac\u021bioneaz\u0103 ca un marker pentru a ajuta pachetele s\u0103 ajung\u0103 la destina\u021bia lor prin vastul re\u021bea al Internetului. <\/p>\n\n\n\n<p>Sistemul TCP\/IP original era compus din patru straturi: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stratul de aplica\u021bie<\/strong><\/li>\n\n\n\n<li><strong>Stratul de transport <\/strong><\/li>\n\n\n\n<li><strong>Stratul internet<\/strong> <\/li>\n\n\n\n<li><strong>Stratul de leg\u0103tur\u0103<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Modul \u00een care interac\u021bionezi cu Internetul este printr-un strat numit stratul de aplica\u021bie. Acest strat ajut\u0103 comunicarea \u00eentre diferite site-uri web, chiar dac\u0103 acestea se afl\u0103 pe acela\u0219i site, dou\u0103 site-uri diferite sau sunt situate aproape sau departe una de cealalt\u0103. Stratul de re\u021bea le conecteaz\u0103 pe toate aceste site-uri, iar stratul de leg\u0103tur\u0103 reprezint\u0103 echipamentul fizic pe care \u00eel folose\u0219ti pentru a accesa Internetul.<\/p>\n\n\n\n<p>Web-ul de suprafa\u021b\u0103 \u0219i web-ul ad\u00e2nc au diferite tipuri de liste de site-uri. Site-urile din Web-ul de suprafa\u021b\u0103 sunt listate \u00een registrul DNS \u0219i pot fi u\u0219or g\u0103site utiliz\u00e2nd browsere web comune precum Chrome \u0219i Firefox. Cu toate acestea, site-urile din Web-ul ad\u00e2nc nu apar \u00een registrul DNS \u0219i nu pot fi g\u0103site folosind metodele obi\u0219nuite. <\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-origin-of-the-tor-project\"><strong>Originea proiectului TOR<\/strong><\/h2>\n\n\n<p>Proiectul TOR \u0219i-a avut \u00eenceputurile la Laboratorul de Cercetare al Marinei SUA. \u00cen anii 1990, Paul Syverson, David Goldschlag \u0219i Michael Reed au venit cu ideea de \u201eonion routing\u201d. Roger Dingledine \u0219i Nick Mathewson au rafinat ulterior conceptul \u0219i au lansat oficial Proiectul TOR pe 20 septembrie 2002. Funda\u021bia Electronic Frontier Foundation (EFF) a continuat s\u0103 finan\u021beze proiectul pentru a sprijini dezvoltarea acestuia.<\/p>\n\n\n\n<p>TOR a fost ini\u021bial dezvoltat pentru a proteja identit\u0103\u021bile personalului militar sta\u021bionat \u00een str\u0103in\u0103tate. Pentru a le ascunde \u0219i mai mult identit\u0103\u021bile \u0219i loca\u021biile, TOR a fost lansat publicului \u00een octombrie 2003 ca un browser gratuit, open-source. Scopul era de a \u00eencorpora personalul militar \u00een traficul anonim al utilizatorilor civili.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"understanding-the-working-of-tor-network\"><strong>\u00cen\u021belegerea modului de func\u021bionare a re\u021belei Tor<\/strong><\/h2>\n\n\n<p>Tor, sau The Onion Router, este o re\u021bea format\u0103 din mii de routere voluntare, cunoscute \u0219i sub denumirea de noduri. Func\u021bionarea Tor este relativ simpl\u0103. C\u00e2nd datele unui utilizator sunt trimise prin Tor, acestea sunt criptate de cel pu\u021bin trei ori, sau transmise prin relee, \u00eenainte de a ajunge la destina\u021bie. Acest lucru face dificil, dac\u0103 nu imposibil, s\u0103 se urm\u0103reasc\u0103 utilizatorul sau clientul, deoarece identitatea \u0219i adresa lor sunt mascate de trei ori.<\/p>\n\n\n\n<p>Tor nu ofer\u0103 doar anonimat utilizatorilor individuali, ci \u0219i \u00eentregilor site-uri, \u0219i ajut\u0103 la configurarea aplica\u021biilor Peer to Peer (P2P) pentru partajarea \u0219i desc\u0103rcarea fi\u0219ierelor torrent. <\/p>\n\n\n\n<p class=\"translation-block\">Po\u021bi s\u0103 te oferi voluntar pentru a face parte din aceasta rul\u00e2nd unul dintre cele trei tipuri de noduri: <strong>relaye intermediare<\/strong>, <strong>relaye de ie\u0219ire<\/strong> sau <strong>poduri<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Relee intermediare<\/strong> transmit datele, men\u021bin viteza acestora \u0219i le cripteaz\u0103. Sunt u\u0219or de g\u0103sit \u0219i relativ sigure pentru conectare, deoarece loca\u021bia lor este ascuns\u0103.<\/li>\n\n\n\n<li><strong>Relee de ie\u0219ire<\/strong> sunt oprirea final\u0103 \u00een procesul de criptare \u0219i sunt vizibile pentru toat\u0103 lumea din re\u021bea. Totu\u0219i, dac\u0103 are loc o activitate ilegal\u0103 pe re\u021bea, releul de ie\u0219ire poate fi considerat responsabil. Operarea unui releu de ie\u0219ire nu este recomandat\u0103 pentru amatori sau utilizatori de calculatoare personale, deoarece poli\u021bia poate confisca computerul dac\u0103 este compromis pentru activit\u0103\u021bi ilegale.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Bridge relays<\/strong> pe re\u021beaua Tor nu sunt listate public \u0219i ajut\u0103 la evitarea cenzurii \u00een \u021b\u0103ri precum China. Sunt considerate sigure pentru a fi rulate acas\u0103, similar cu rel\u00e9urile de mijloc.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"accessing-the-darknet\"><strong>Accesarea darknet-ului<\/strong><\/h2>\n\n\n<p>Pentru a accesa darknet-ul, este necesar un software special, cum ar fi browserul Tor. Acest browser te ajut\u0103 s\u0103 vizitezi site-uri care nu sunt indexate de motoarele de c\u0103utare obi\u0219nuite \u0219i ofer\u0103 un nivel mai mare de confiden\u021bialitate \u0219i anonimitate.<\/p>\n\n\n\n<p>\u00cenainte de a accesa darknet-ul, este recomandat s\u0103 configurezi mai \u00eent\u00e2i o re\u021bea privat\u0103 virtual\u0103 (VPN). Configurarea unui VPN este esen\u021bial\u0103 pentru protejarea intimit\u0103\u021bii \u0219i securit\u0103\u021bii tale online. Cu un VPN, traficul t\u0103u de internet este criptat, ceea ce face dificil pentru al\u021bii s\u0103 \u00ee\u021bi monitorizeze activit\u0103\u021bile online. Acest lucru \u00eenseamn\u0103 c\u0103 furnizorul t\u0103u de servicii de internet (ISP) nu va putea urm\u0103ri ce site-uri vizitezi sau ce con\u021binut accesezi pe darknet.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"surfing-the-darknet\"><strong>Navigare pe Darknet<\/strong><\/h2>\n\n\n<p>Odat\u0103 ce v-a\u021bi conectat la re\u021beaua Tor, pute\u021bi c\u0103uta site-uri web g\u0103zduite pe darkweb folosind un motor de c\u0103utare precum Torch sau introduc\u00e2nd manual URL-ul unui site web specific. Browserul va bloca pluginuri precum Flash, RealPlayer, QuickTime \u0219i altele care ar putea fi manipulate pentru a dezv\u0103lui adresa dvs. IP. Acest lucru face mai u\u0219or s\u0103 v\u0103 proteja\u021bi identitatea \u00een timp ce naviga\u021bi pe web. \u00cen plus, tot traficul dvs. web este anonimizat prin re\u021beaua Tor, f\u0103c\u00e2nd imposibil\u0103 urm\u0103rirea acestuia p\u00e2n\u0103 la dvs.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"dark-web-search-engines\"><strong>Motoare de C\u0103utare pe Dark Web<\/strong><\/h3>\n\n\n<p>C\u00e2nd c\u0103uta\u021bi informa\u021bii pe dark web, este esen\u021bial s\u0103 utiliza\u021bi un motor de c\u0103utare securizat \u0219i privat care permite navigarea anonim\u0103. De asemenea, dori\u021bi un motor de c\u0103utare rapid \u0219i eficient, pentru a g\u0103si rapid informa\u021biile de care ave\u021bi nevoie. <\/p>\n\n\n\n<p><strong>Iat\u0103 c\u00e2teva dintre cele mai bune motoare de c\u0103utare pe dark web care pot fi utilizate cu Tor Browser:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Tor\u021b\u0103:<\/strong> Torch este un motor de c\u0103utare rapid \u0219i eficient pentru web-ul \u00eentunecat, care \u00ee\u0219i ob\u021bine rezultatele din peste 60 de platforme diferite, inclusiv site-uri de socializare precum Twitter \u0219i Reddit, \u0219i site-uri g\u0103zduite pe re\u021beaua Tor. Ofer\u0103 caracteristici avansate precum eviden\u021bierea cuvintelor cheie \u0219i op\u021biuni de filtrare pentru a te ajuta s\u0103 g\u0103se\u0219ti rapid \u0219i u\u0219or ceea ce cau\u021bi.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Not Evil<\/strong>: Not Evil este un motor de c\u0103utare u\u0219or de utilizat pentru dark web, care \u00ee\u021bi permite s\u0103 cau\u021bi con\u021binut specific folosind cuvinte cheie sau fraze. Dispune de o varietate de filtre, cum ar fi limba, regiunea, intervalul de date, dimensiunea fi\u0219ierului \u0219i altele, care fac u\u0219or s\u0103 rafinezi c\u0103utarea \u0219i s\u0103 g\u0103se\u0219ti rapid informa\u021biile de care ai nevoie.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Ahmia<\/strong>: Ahmia este un motor de c\u0103utare bazat \u00een Finlanda pentru dark web care se concentreaz\u0103 pe g\u0103sirea de con\u021binut legat de activit\u0103\u021bi ilegale, cum ar fi exploatarea copiilor. Utilizeaz\u0103 o combina\u021bie de \u00eenv\u0103\u021bare automat\u0103 \u0219i inteligen\u021b\u0103 uman\u0103 pentru a oferi rezultate precise \u0219i actualizate care nu sunt accesibile prin motoarele de c\u0103utare tradi\u021bionale.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Motorul de C\u0103utare Grams<\/strong>: Motorul de C\u0103utare Grams este un motor de c\u0103utare dezvoltat \u00een Rusia care ajut\u0103 utilizatorii s\u0103 acceseze informa\u021bii despre bunuri ilegale, cum ar fi droguri \u0219i arme, v\u00e2ndute \u00een Rusia. Acesta agreg\u0103 anun\u021buri de pe diverse pie\u021be, f\u0103c\u00e2nd u\u0219or s\u0103 r\u0103sfoi\u021bi toate anun\u021burile \u00eentr-un singur loc, \u00een loc s\u0103 vizita\u021bi fiecare pia\u021b\u0103 individual.<\/li>\n\n\n\n<li class=\"translation-block\"><strong>Motor de c\u0103utare Candle Light<\/strong>: Candle Light este un motor de c\u0103utare pe dark web care se specializeaz\u0103 \u00een furnizarea de linkuri c\u0103tre afaceri ilegale, cum ar fi cele care v\u00e2nd droguri, arme \u0219i date de carduri de credit furate. Se concentreaz\u0103 exclusiv pe oferirea de linkuri c\u0103tre aceste afaceri, mai degrab\u0103 dec\u00e2t pe indexarea listelor de produse, ceea ce \u00eembun\u0103t\u0103\u021be\u0219te securitatea, deoarece nu este necesar s\u0103 v\u0103 face\u021bi griji cu privire la urm\u0103rirea ter\u021belor p\u0103r\u021bi.<\/li>\n<\/ol>\n\n\n<h2 class=\"wp-block-heading\" id=\"law-enforcement-vs-the-darknet-the-ongoing-battle\"><strong>For\u021bele de ordine vs. Darknet: B\u0103t\u0103lia continu\u0103<\/strong><\/h2>\n\n\n<p>For\u021bele de ordine \u0219i darknet-ul sunt de mult timp \u00eentr-o lupt\u0103 intens\u0103 de tip pisic\u0103 \u0219i \u0219oarece. Cu anonimatul s\u0103u \u0219i lipsa reglement\u0103rilor, darknet-ul a devenit o destina\u021bie popular\u0103 pentru infractori pentru a desf\u0103\u0219ura activit\u0103\u021bi nelegale, cum ar fi achizi\u021bionarea de droguri sau arme, f\u0103c\u00e2nd tot mai dificil pentru agen\u021biile de aplicare a legii s\u0103-i prind\u0103. <\/p>\n\n\n\n<p>Ca urmare, aceste organiza\u021bii trebuie s\u0103 fie creative atunci c\u00e2nd urm\u0103resc infractorii pe aceast\u0103 re\u021bea misterioas\u0103; ele folosesc metode sofisticate, concepute special pentru a detecta chiar \u0219i cele mai pu\u021bin vizibile activit\u0103\u021bi criminale care au loc \u00een ad\u00e2ncurile sale.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Un mod \u00een care for\u021bele de ordine au reu\u0219it s\u0103 reduc\u0103 activitatea ilegal\u0103 pe darknet este prin utilizarea de instrumente avansate de analiz\u0103, care le permit s\u0103 analizeze rapid \u0219i precis cantit\u0103\u021bi mari de date. Aceste instrumente \u00eei ajut\u0103 s\u0103 identifice tipare \u00een comportamentul utilizatorilor, care ar putea semnala comportamente suspecte sau chiar leg\u0103turi \u00eentre persoane care fac lucruri ilegale.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>O alt\u0103 tehnic\u0103 utilizat\u0103 de autorit\u0103\u021bile de aplicare a legii sunt opera\u021biunile sub acoperire, \u00een care agen\u021bii se dau drept cump\u0103r\u0103tori sau v\u00e2nz\u0103tori pe diverse pie\u021be din darknet pentru a aduna dovezi \u00eempotriva celor implica\u021bi \u00een activit\u0103\u021bi ilicite online. Acest tip de opera\u021biune necesit\u0103 o mare abilitate \u0219i preg\u0103tire din partea agen\u021bilor, deoarece ace\u0219tia trebuie s\u0103 fie capabili s\u0103 se integreze \u00een mediul lor f\u0103r\u0103 a st\u00e2rni suspiciuni din partea altor utilizatori, \u00een timp ce adun\u0103 suficiente informa\u021bii despre suspec\u021bii sau \u021bintele poten\u021biale \u00eenainte de a face arest\u0103ri sau confisc\u0103ri legate de activit\u0103\u021bi criminale care au loc pe re\u021bea.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u00cen cele din urm\u0103, unele \u021b\u0103ri au \u00eenceput s\u0103 adopte legi care vizeaz\u0103 persoanele care fac lucruri ilegale prin re\u021bele online, cum ar fi Tor, care este cel mai popular browser folosit pentru a accesa site-uri pe Dark Web. De exemplu, multe \u021b\u0103ri europene cer acum furnizorilor de servicii de internet (ISP) s\u0103 raporteze orice trafic suspect provenind din serviciile bazate pe Tor, care poate fi apoi investigat mai departe de for\u021bele de poli\u021bie, dac\u0103 este necesar.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"ethics-and-morality\"><strong>Etic\u0103 \u0219i moralitate<\/strong><\/h2>\n\n\n<p>Dark web este partea \u00eentunecat\u0103 \u0219i ascuns\u0103 a internetului, utilizat\u0103 pentru activit\u0103\u021bi ilegale, cum ar fi traficul de droguri \u0219i sp\u0103larea banilor. Cu toate acestea, are \u0219i un set propriu de etic\u0103 \u0219i moralitate care guverneaz\u0103 interac\u021biunea.<\/p>\n\n\n\n<p>Atunci c\u00e2nd se discut\u0103 despre etica dark web-ului, trebuie luate \u00een considerare at\u00e2t activit\u0103\u021bile criminale, c\u00e2t \u0219i cei care caut\u0103 intimitate. Unii ar putea sus\u021bine c\u0103 achizi\u021bionarea de droguri sau arme este imoral\u0103 din cauza \u00eenc\u0103lc\u0103rii legii, \u00een timp ce al\u021bii ar putea sus\u021bine drepturile la intimitate, chiar \u0219i atunci c\u00e2nd legile sunt \u00eenc\u0103lcate.<\/p>\n\n\n\n<p>Criptomonedele, cum ar fi Bitcoin, pot anonimiza tranzac\u021biile pe dark web, dar au \u0219i poten\u021bialul de a fi utilizate \u00een scopuri abuzive, cum ar fi facilitarea sp\u0103l\u0103rii banilor.<\/p>\n\n\n\n<p>Av\u00e2nd \u00een vedere asocierea sa cu activit\u0103\u021bi criminale, trebuie pus\u0103 sub semnul \u00eentreb\u0103rii moralitatea ac\u021biunilor \u00eentreprinse pe dark web. Anonimatul poate oferi siguran\u021b\u0103 victimelor opresiunii sau avertizorilor de integritate, dar poate permite \u0219i criminalitatea organizat\u0103 \u0219i terorismul.<\/p>\n\n\n\n<p>Dezbaterea despre ce constituie comportamentul \u201ecorect\u201d fa\u021b\u0103 de \u201egre\u0219it\u201d pe dark web va continua probabil din cauza lipsei de consens \u00eentre exper\u021bi. \u00cen ciuda riscurilor, mul\u021bi continu\u0103 s\u0103 foloseasc\u0103 dark web-ul pentru protec\u021bia confiden\u021bialit\u0103\u021bii \u0219i pentru a evita criminalitatea cibernetic\u0103.<\/p>\n\n\n\n<p>Este responsabilitatea utilizatorilor individuali s\u0103 determine etica ac\u021biunilor lor pe dark web pe baza eticii lor digitale personale.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"future-of-the-darknet\"><strong>Viitorul darknetului<\/strong><\/h2>\n\n\n<p>Viitorul dark web-ului este incert \u0219i deschis specula\u021biilor. Pe de o parte, eforturile sporite ale autorit\u0103\u021bilor de aplicare a legii \u0219i ale agen\u021biilor guvernamentale de a combate activit\u0103\u021bile ilegale ar putea duce la un dark web mai sigur \u0219i mai reglementat. Pe de alt\u0103 parte, \u00eengrijor\u0103rile legate de confiden\u021bialitate \u0219i utilizarea tot mai mare a tehnologiei ar putea duce la o extindere a dark web-ului ca refugiu pentru activit\u0103\u021bi ilegale.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"in-conclusion\"><strong>\u00cen concluzie<\/strong><\/h2>\n\n\n<p>Dark web-ul este complex, av\u00e2nd at\u00e2t utiliz\u0103ri ilegale, c\u00e2t \u0219i de protec\u021bie a intimit\u0103\u021bii. Viitorul s\u0103u este incert \u0219i influen\u021bat de tehnologie \u0219i diver\u0219i factori de interes. Este important s\u0103 r\u0103m\u00e2nem informa\u021bi pentru a asigura un mediu online sigur.<\/p>","protected":false},"excerpt":{"rendered":"<p>Re\u021beaua profund\u0103 este o parte imens\u0103 a internetului care este inaccesibil\u0103 cu ajutorul motoarelor de c\u0103utare tradi\u021bionale. Aceasta cuprinde informa\u021bii, site-uri web \u0219i baze de date care nu sunt indexate de motoarele de c\u0103utare... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/anonimitate-online\/internetul-profund\/\">Continue reading <span class=\"screen-reader-text\">Explorarea ad\u00e2ncurilor ascunse ale internetului: \u00cen\u021belegerea Deep Web<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1367,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-1364","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-anonymity-online","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Deep Web: A Hidden World of Information<\/title>\n<meta name=\"description\" content=\"Explore the hidden world of the Deep Web and discover the websites, and databases not indexed by traditional search engines.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/anonimitate-online\/internetul-profund\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Deep Web: A Hidden World of Information\" \/>\n<meta property=\"og:description\" content=\"Explore the hidden world of the Deep Web and discover the websites, and databases not indexed by traditional search engines.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/anonimitate-online\/internetul-profund\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-12T20:58:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/3028d22c692af329bb87883b4b4a8170\"},\"headline\":\"Exploring the Hidden Depths of the Internet: Understanding the Deep Web\",\"datePublished\":\"2023-02-12T20:58:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/\"},\"wordCount\":2038,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg\",\"articleSection\":[\"Anonymity online\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/\",\"url\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/\",\"name\":\"The Deep Web: A Hidden World of Information\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg\",\"datePublished\":\"2023-02-12T20:58:34+00:00\",\"description\":\"Explore the hidden world of the Deep Web and discover the websites, and databases not indexed by traditional search engines.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Exploring the Hidden Depths of the Internet Understanding the Deep Web\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Exploring the Hidden Depths of the Internet: Understanding the Deep Web\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/3028d22c692af329bb87883b4b4a8170\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Web-ul Profund: O Lume Ascuns\u0103 a Informa\u021biei","description":"Exploreaz\u0103 lumea ascuns\u0103 a Web-ului Profund \u0219i descoper\u0103 site-urile \u0219i bazele de date care nu sunt indexate de motoarele de c\u0103utare tradi\u021bionale.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/anonimitate-online\/internetul-profund\/","og_locale":"ro_RO","og_type":"article","og_title":"The Deep Web: A Hidden World of Information","og_description":"Explore the hidden world of the Deep Web and discover the websites, and databases not indexed by traditional search engines.","og_url":"https:\/\/securitybriefing.net\/ro\/anonimitate-online\/internetul-profund\/","og_site_name":"Security Briefing","article_published_time":"2023-02-12T20:58:34+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"security","Timp estimat pentru citire":"10 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/3028d22c692af329bb87883b4b4a8170"},"headline":"Exploring the Hidden Depths of the Internet: Understanding the Deep Web","datePublished":"2023-02-12T20:58:34+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/"},"wordCount":2038,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg","articleSection":["Anonymity online"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/","url":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/","name":"Web-ul Profund: O Lume Ascuns\u0103 a Informa\u021biei","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg","datePublished":"2023-02-12T20:58:34+00:00","description":"Exploreaz\u0103 lumea ascuns\u0103 a Web-ului Profund \u0219i descoper\u0103 site-urile \u0219i bazele de date care nu sunt indexate de motoarele de c\u0103utare tradi\u021bionale.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Exploring-the-Hidden-Depths-of-the-Internet-Understanding-the-Deep-Web-1.jpg","width":662,"height":327,"caption":"Exploring the Hidden Depths of the Internet Understanding the Deep Web"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/anonymity-online\/the-deep-web\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Exploring the Hidden Depths of the Internet: Understanding the Deep Web"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/3028d22c692af329bb87883b4b4a8170","name":"securitate","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin este redactor senior pentru Government Technology. Anterior a scris pentru PYMNTS \u0219i The Bay State Banner \u0219i de\u021bine o diplom\u0103 de licen\u021b\u0103 \u00een scriere creativ\u0103 de la Carnegie Mellon. Ea locuie\u0219te \u00een afara Bostonului.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ro\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=1364"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1364\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/1367"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=1364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=1364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=1364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}