الصفحة الرئيسية " الشبكة المظلمة مقابل الشبكة المظلمة مقابل الشبكة العميقة 101 والمزيد

الشبكة المظلمة مقابل الشبكة المظلمة مقابل الشبكة العميقة 101 والمزيد

الشبكة المظلمة مقابل الشبكة الخفية مقابل الشبكة المظلمة مقابل الشبكة العميقة
Dark web
Understanding the layers of the internet, including the deep web, dark web, and darknets, is crucial for innovative تصميم المنتج and engineering in الأمن السيبراني.

The terms “dark web,” “darknet,” and “deep web” are often used interchangeably, but they describe distinct layers and components of the internet: while the deep web encompasses all web content not indexed by search engines, including benign things like online banking and paywalled sites, the deep web is all non-indexed content. A darknet is the technical infrastructure (an overlay network like Tor or I2P) that provides anonymity. The dark web is the content that resides on these darknets. The World Wide Web (surface web) is the publicly indexed content.

The Deep Web

Deep web
The deep web comprises unindexed online content that is essential for everyday digital interactions and services.

The deep web represents the largest part of the internet, encompassing all content that is not indexed by standard search engines like Google or Bing. This includes a vast amount of benign and routine information that is protected or located behind a query. Access to deep web content does not require special البرمجيات, only direct knowledge of the URL or, more commonly, authentication. This part of the internet is a daily tool for most users.

Examples of deep web content include online banking portals, webmail inboxes, private social media profiles, subscription-based academic journals, cloud storage drives, and corporate intranets.

The defining characteristic is not secrecy but rather inaccessibility to web crawlers.

A page may be unindexed because it is behind a paywall, requires a password, is dynamically generated in response to a database query, or its owner has explicitly used a “noindex” tag. The content itself is hosted on standard server infrastructure and accessed over the conventional internet protocol.

The Darknet

Darknet
Darknets are engineered overlay networks designed for anonymous التواصل and privacy protection.

A darknet is a specific type of overlay network that is layered on top of the existing internet and requires specialized software or configurations to access.

These networks are engineered to provide a high degree of anonymity for their users by encrypting traffic and routing it through multiple servers, which obscures the user’s IP address and location.

The most prominent technology for enabling access to a darknet is The Onion Router (Tor), but others like the Invisible Internet Project (I2P) also exist. These networks are the technical infrastructure, the “roads” built to be private and untraceable.

The purpose of a darknet is to facilitate anonymous communication and hosting. This infrastructure can be used by various actors for different reasons, from journalists and political dissidents in oppressive regimes who need to protect their identity, to individuals who simply wish to maintain their privacy from corporations and governments. While the network itself is content-neutral, its architecture of high anonymity makes it a suitable environment for hosting services where privacy is paramount. See our detailed article for Darknet tools for engineering and science:

 

The Dark Web

Dark web
The dark web is a specialized online space facilitating both legitimate and illicit activities, accessible only through specific networks.

The dark web refers to the collection of websites and services that are hosted on and accessed via a darknet.
While the darknet is the infrastructure, the dark web is the content itself—the “places” you can go using those private roads.

These websites are not reachable with standard web browsers and their URLs typically end in a special top-level domain, such as “.onion” for services on the Tor network. Because of the strong anonymity provided by the underlying darknet, the dark web has become known for hosting both legitimate and illicit activities.

While the dark web contains legitimate uses, such as secure whistle-blowing platforms and privacy-advocacy groups, it is more notoriously associated with black markets. These marketplaces facilitate the trade of illegal goods and services, including narcotics, stolen financial data, malware, and counterfeit documents. The anonymity of the network makes it difficult for law enforcement to identify and locate the individuals operating these sites. It is important to recognize that the dark web constitutes a very small fraction of the much larger deep web.

 

Estimated dark web figures (2016 study - source:wikipedia)
Estimated dark web figures (2016 study – source:wikipedia)

ملاحظة: the figures above have now to be taken for relative comparison only, as the number of sites has sky rocketed since, including surface web (www)

Comparison, Including the WWW

In orange below our key takeaways for each:

المعلمةWorld Wide Web (Surface Web)Deep WebDarknetDark Web
Core Concept AnalogyThe public, indexed books in a library’s main reading room.The library’s entire collection, including private archives and membership-only sections.The secure, anonymous pneumatic tube system used to request and deliver books from the archives.The specific, uncatalogued books and documents found only within the library’s most secure archives.
DefinitionPublicly indexed web pages accessible by standard search engines.All web content not indexed by search engines.The overlay network infrastructure providing anonymity (e.g., Tor, I2P).Websites and services (“hidden services”) hosted on darknets.
Size & ScaleBillions of pages, but estimated to be less than 5% of the total web.The vast majority of the internet, estimated at over 95% of all online content.A global, distributed network infrastructure. Size measured by nodes (Tor has thousands of relays).A small, fluctuating subset of the deep web. Estimated in the tens of thousands of active sites at any time.
Access MethodStandard web browsers (Chrome, Edge, Firefox). No special configuration needed.Standard web browsers, but access requires login credentials, a direct URL, or passing a paywall/CAPTCHA.Requires specific software (e.g., Tor Browser, I2P router) to connect to the network.Accessed using specific software (like the Tor Browser) to connect to the darknet first.
URL StructureStandard domains (e.g., .com, .org, .gov) resolved by public DNS.Standard domains, often with long, dynamically generated URLs containing query strings.Not applicable. It is a network protocol, not a destination with a URL.Special, non-standard domains (e.g., “.onion”, “.i2p”) resolved within the darknet.
Anonymity LevelLow. User IP address is visible to websites, ISPs, and network monitors.Low. Access is typically tied to a known identity (username, account number).High. Designed to obscure the user’s IP address from the destination service via multi-layer التشفير and relays.High for both users and hosts. Anonymity is the default and a core feature of the environment.
Primary IntentPublic information dissemination, commerce, and communication.Secure access to private or protected information and services.To provide an anonymous, censorship-resistant communication channel.To host services and disseminate information without revealing the identity of the host or users.
Typical ContentNews, e-commerce, blogs, government portals, social media, التسويق content.Email inboxes, cloud storage, banking portals, medical records, academic journals, corporate intranets.Content-neutral network traffic (encrypted data packets).Black markets, political dissident forums, secure whistleblower dropboxes, privacy blogs, illicit file sharing.
Legality of ContentOverwhelmingly legal, though it can link to or describe illegal acts.Overwhelmingly legal and mundane.The network technology itself is legal and used for legitimate purposes.Highly mixed. Contains both legal (e.g., privacy advocacy) and a significant amount of illegal content.
Typical User ProfileGeneral public.Authenticated individuals (e.g., bank customers, employees, students).Privacy advocates, journalists, law enforcement, political dissidents, security-conscious individuals.A wide spectrum including criminals, activists, whistleblowers, researchers, and the curious.
Hosting MethodHosted on publicly addressable web servers in data centers.Hosted on standard web servers, but behind application-level security controls.A network of volunteer-run nodes (relays) that pass traffic.Hosted as “hidden services” on servers whose location and identity are obscured by the darknet.
Associated RisksMalware, phishing, tracking cookies, scams, data collection by corporations.Data breaches of the service provider, phishing attacks targeting login credentials.Potential for deanonymization through network analysis or software vulnerabilities. Risk of connecting to malicious exit nodes.Extreme content, sophisticated scams, malware, interacting with law enforcement operations, high risk of financial loss.
جدول المحتويات
    إضافة رأس لبدء إنشاء جدول المحتويات

    التصميم أم تحدي المشروع؟
    مهندس ميكانيكي، مدير مشروع أو مدير مشروع أو مدير البحث والتطوير
    التطوير الفعال للمنتجات

    متاح لتحدي جديد في وقت قصير في فرنسا وسويسرا.
    تواصل معي على LinkedIn
    المنتجات البلاستيكية والمعدنية، التصميم حسب التكلفة، وبيئة العمل، والصناعات المتوسطة إلى الكبيرة الحجم، والصناعات الخاضعة للتنظيم، و CE و FDA، والتصميم بمساعدة الحاسوب، و Solidworks، وحزام لين سيجما الأسود، و ISO 13485 الطبي من الفئتين الثانية والثالثة

    نحن نبحث عن راعٍ جديد

     

    هل تعمل شركتك أو مؤسستك في التقنية أو العلم أو البحث؟
    > أرسل لنا رسالة <

    تلقي جميع المقالات الجديدة
    مجاناً، بدون رسائل غير مرغوب فيها، لا يتم توزيع البريد الإلكتروني ولا إعادة بيعه

    أو يمكنك الحصول على العضوية الكاملة - مجاناً - للوصول إلى جميع المحتويات المقيدة >هنا<

    انتقل إلى الأعلى

    قد يعجبك أيضاً