{"id":1198,"date":"2017-11-16T15:43:02","date_gmt":"2017-11-16T15:43:02","guid":{"rendered":"https:\/\/www.adlice.com\/?p=1198"},"modified":"2022-12-21T10:32:10","modified_gmt":"2022-12-21T10:32:10","slug":"darknet-explained","status":"publish","type":"post","link":"https:\/\/www.adlice.com\/es\/darknet-explained\/","title":{"rendered":"What happens on the Darknet ?"},"content":{"rendered":"\n<p>Alpha bay, Silk Road, Hansa: They made the headlines of newspapers for weeks. They were <strong>underground markets<\/strong> offering several illicit goods and services and were shut down in 2013 and 2017. All were using Tor, currently the most used parallel Internet network, <strong>called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Darknet\" target=\"_blank\" rel=\"noreferrer noopener\">Darknet<\/a><\/strong>.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">DARKNET<\/p>\n\n\n\n<p>Computers connected to the Internet use the Internet protocol suite (TCP\/IP) protocol to connect to each other. Darknet are networks connecting computers <strong>through their own communication protocols<\/strong> built on top of TCP\/IP (network overlaying).<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" width=\"1246\" height=\"313\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Network_Overlay_merged.png\" alt=\"darknet protocol\" class=\"wp-image-1201\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Network_Overlay_merged.png 1246w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Network_Overlay_merged-300x75.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Network_Overlay_merged-1024x257.png 1024w\" sizes=\"(max-width: 1246px) 100vw, 1246px\" \/><\/figure>\n\n\n\n<p>(Here, the bold cables represent the <strong>overlay<\/strong> and the smaller one, <strong>TCP\/IP<\/strong>. We can see that the computers are not connected in the same way within the two networks.)<\/p>\n\n\n\n<p>Since the computers part of a Darknet are interconnected using custom protocols, <strong>they usually provide more privacy than the Internet<\/strong>, often offer anonymous services like mail and Instant Messaging and data only accessible using the Darknet specific protocol.<\/p>\n\n\n\n<p>Their ultimate goal is to <strong>provide complete anonymization<\/strong> between the data provider (like a webserver) and the client accessing such data (like a browser) using custom routing rules and specific encryption system.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">USAGE<\/p>\n\n\n\n<p>Darknets were originally designed t<strong>o ensure safety of political dissidents and circumvent network censorship used by totalitarian regimes<\/strong>, but also as a reaction to mass surveillance performed by governmental organisations.<\/p>\n\n\n\n<p>Although such networks are still heavily used for these purposes, <strong>criminals made their way into them<\/strong>, attracted by the anonymity they provide. <strong>Sharing of illegal contents and selling of illicit or illegal goods or services<\/strong> were greatly facilitated since they cannot be accessed without knowing the exact address and search engines are unable to see them (Deep Web).<\/p>\n\n\n\n<p>Servers hosting or offering such illegal contents <strong>are hard to take down and the people running them even harder to arrest<\/strong>. For the record, Silk Road market owner were tracked down thanks to the use of <a href=\"https:\/\/www.adlice.com\/catch-malware-with-your-own-honeypot-v2\">honeypots<\/a> and hacking by the Drug Enforcement Administration (DEA).<\/p>\n\n\n<div class=\"wp-block-image dt-pswp-item\">\n<figure class=\"aligncenter\"><a class=\"dt-pswp-item\" href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/800px-Silk_Road_Seized.jpg\"><img decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/800px-Silk_Road_Seized.jpg\" alt=\"fbi seized\" class=\"wp-image-1202\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/800px-Silk_Road_Seized.jpg 800w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/800px-Silk_Road_Seized-300x225.jpg 300w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><figcaption class=\"wp-element-caption\">DEA seizure notification now displayed when accessing Silk Road<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Several Darknets are currently operating, the best known being Freenet, I2P and Tor. The last one being the most popular (both for free speech and criminal activities), we will focus on it.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">TOR<\/p>\n\n\n\n<p>Tor is composed of <strong>multiples network relays that are able to connect to each other<\/strong>. When using the Tor network, traffic flow between these nodes are <strong>using a random path, being encrypted and decrypted on the fly<\/strong>, before reaching an \u201cexit node\u201d that will connect to the desired service, using standard connection.<\/p>\n\n\n<div class=\"wp-block-image dt-pswp-item\">\n<figure class=\"aligncenter\"><a class=\"dt-pswp-item\" href=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Tor-onion-network.png\"><img decoding=\"async\" width=\"510\" height=\"251\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Tor-onion-network.png\" alt=\"\" class=\"wp-image-1203\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Tor-onion-network.png 510w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Tor-onion-network-300x148.png 300w\" sizes=\"(max-width: 510px) 100vw, 510px\" \/><\/a><figcaption class=\"wp-element-caption\">Exemple of a nodes path<\/figcaption><\/figure>\n<\/div>\n\n\n<p>Network administrators can configure the service they manage to be also directly accessible within the Tor network, <strong>removing the need to pass through an exit nodes, using a &#8220;.onion&#8221; address<\/strong>.<\/p>\n\n\n\n<p>One such exemple is <strong>DuckDuckGo search engine<\/strong> which can be accessed using address https:\/\/duckduckgo.com or 3g2upl4pq6kufc4m.onion.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"222\" height=\"186\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Tor_NoExitNode.png\" alt=\"\" class=\"wp-image-1205\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"191\" height=\"138\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Tor_ExitNode.png\" alt=\"\" class=\"wp-image-1204\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>However, some are only reachable through a &#8220;.onion&#8221; address and have no standard counterpart, <strong>these are called \u201chidden services\u201d<\/strong> and usually feature illegal contents, like underground markets.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">DEEP WEB<\/p>\n\n\n\n<p>The easiest way to connect to the Tor Network is to use the <strong>Tor Browser<\/strong>. Based on Mozilla Firefox, it automates the connection to the nodes and is already configured to handle &#8220;.onion&#8221; links.<\/p>\n\n\n<div class=\"wp-block-image size-full wp-image-1206\">\n<figure class=\"aligncenter\"><img decoding=\"async\" width=\"1018\" height=\"675\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Tor_StartPage.png\" alt=\"tor browser\" class=\"wp-image-1206\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Tor_StartPage.png 1018w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Tor_StartPage-300x199.png 300w\" sizes=\"(max-width: 1018px) 100vw, 1018px\" \/><figcaption class=\"wp-element-caption\">Tor Browser default StartPage<\/figcaption><\/figure>\n<\/div>\n\n\n<p>To ensure maximum privacy and to prevent data leaks (like the real address IP of the user), JavaScript interpretation and WebSockets feature are disabled, which can alter some sites functionalities.<\/p>\n\n\n\n<p>Even if numerous illicit markets were closed in 2017, it is still possible to find some easily. <strong>The goods the most proposed are drugs or medications<\/strong> that require prescriptions to obtain them (usually opiates), followed by credit card number and password lists, counterfeits and porn accounts.<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"465\" height=\"467\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Weapons.png\" alt=\"darknet weapons\" class=\"wp-image-1207\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Weapons.png 465w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Weapons-150x150.png 150w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Weapons-300x300.png 300w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Weapons-65x65.png 65w\" sizes=\"(max-width: 465px) 100vw, 465px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"487\" height=\"203\" src=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Lunacy_small.png\" alt=\"darknet drugs\" class=\"wp-image-1208\" srcset=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Lunacy_small.png 487w, https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/Lunacy_small-300x125.png 300w\" sizes=\"(max-width: 487px) 100vw, 487px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>Some markets features <strong>more sensitive contents<\/strong> like child pornography videos, weapons and even hitman services but they are harder to find. The transaction between the seller and the buyer are anonymous and the payment is made available through the use of <a href=\"https:\/\/www.adlice.com\/malware-cryptominer\">cryptocurrencies<\/a>.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">TECHNICAL RISKS<\/p>\n\n\n\n<p>Even if Tor provides anonymity, <strong>some flaws may be exploited<\/strong> that may allow law enforcement agencies to localise the real location where the .onion link point to. When the server has been seized, it\u2019s a piece of cake to reprogram it to serve code that may be used <strong>to get the real identity of the visitor<\/strong>. In most countries, buying illicit goods is punished by the law.<\/p>\n\n\n\n<p>Attackers can also set exit nodes to gather email addresses and password used by Tor users when connecting to online accounts. Such attacks can easily be prevented using end-to-end encryption (HTTPS instead of HTTP).<\/p>\n\n\n\n<p>More rarely, network traffic may be modified to include malware in downloaded software. However, this won\u2019t work with <a href=\"https:\/\/www.adlice.com\/what-is-code-signing\">signed executables<\/a>.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-white-color has-accent-background-color has-text-color has-background\">CONCLUSION<\/p>\n\n\n\n<p>Tor and Darknets in general are a really good thing <strong>to improve freedom of speech for oppressed or threatened people<\/strong> like political opponents or whistleblowers, even if they feature a darker side. When using Tor, <strong>never assume you are truly anonymous<\/strong> and that you are 100% safe from legal repercussions associated with your actions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alpha bay, Silk Road, Hansa: They made the headlines of newspapers for weeks. They were underground markets offering several illicit goods and services and were shut down in 2013 and 2017. All were using Tor, currently the most used parallel Internet network, called Darknet. DARKNET Computers connected to the Internet use the Internet protocol suite&hellip;<\/p>\n","protected":false},"author":1,"featured_media":1211,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[84],"tags":[586,583,585,584,587],"class_list":["post-1198","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorial","tag-alphabay","tag-darknet","tag-deepweb","tag-tor","tag-underground","category-84","description-off"],"views":3786,"yoast_score":78,"yoast_readable":30,"featured_image_src":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/onion-647525_1920.jpg","author_info":{"display_name":"tigzy","author_link":"https:\/\/www.adlice.com\/es\/author\/tigzy\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Happens on the Darknet ? | Quick DarkWeb Tour \u2022 Adlice Software<\/title>\n<meta name=\"description\" content=\"Alpha bay, Silk Road, Hansa: These illicit markets were kings on the Darknet. Learn how they were operated and what they were selling.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adlice.com\/darknet-explained\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Happens on the Darknet ? | Quick DarkWeb Tour \u2022 Adlice Software\" \/>\n<meta property=\"og:description\" content=\"Alpha bay, Silk Road, Hansa: These illicit markets were kings on the Darknet. Learn how they were operated and what they were selling.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adlice.com\/darknet-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"Adlice Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RogueKiller\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-16T15:43:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-21T10:32:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/onion-647525_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tigzy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:site\" content=\"@AdliceSoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"tigzy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.adlice.com\/darknet-explained\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/darknet-explained\/\"},\"author\":{\"name\":\"tigzy\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\"},\"headline\":\"What happens on the Darknet ?\",\"datePublished\":\"2017-11-16T15:43:02+00:00\",\"dateModified\":\"2022-12-21T10:32:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/darknet-explained\/\"},\"wordCount\":834,\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/darknet-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/onion-647525_1920.jpg\",\"keywords\":[\"alphabay\",\"darknet\",\"deepweb\",\"tor\",\"underground\"],\"articleSection\":[\"Tutorial\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adlice.com\/darknet-explained\/\",\"url\":\"https:\/\/www.adlice.com\/darknet-explained\/\",\"name\":\"What Happens on the Darknet ? | Quick DarkWeb Tour \u2022 Adlice Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.adlice.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.adlice.com\/darknet-explained\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/darknet-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/onion-647525_1920.jpg\",\"datePublished\":\"2017-11-16T15:43:02+00:00\",\"dateModified\":\"2022-12-21T10:32:10+00:00\",\"description\":\"Alpha bay, Silk Road, Hansa: These illicit markets were kings on the Darknet. Learn how they were operated and what they were selling.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adlice.com\/darknet-explained\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adlice.com\/darknet-explained\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.adlice.com\/darknet-explained\/#primaryimage\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/onion-647525_1920.jpg\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/onion-647525_1920.jpg\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adlice.com\/darknet-explained\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.adlice.com\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What happens on the Darknet ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adlice.com\/#website\",\"url\":\"https:\/\/www.adlice.com\/\",\"name\":\"Adlice Software\",\"description\":\"Anti-malware and analysis tools\",\"publisher\":{\"@id\":\"https:\/\/www.adlice.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adlice.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adlice.com\/#organization\",\"name\":\"Adlice Software\",\"url\":\"https:\/\/www.adlice.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"contentUrl\":\"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png\",\"width\":276,\"height\":276,\"caption\":\"Adlice Software\"},\"image\":{\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RogueKiller\",\"https:\/\/x.com\/AdliceSoftware\",\"https:\/\/fr.linkedin.com\/company\/adlice-software\",\"https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d\",\"name\":\"tigzy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.adlice.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g\",\"caption\":\"tigzy\"},\"description\":\"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.\",\"url\":\"https:\/\/www.adlice.com\/es\/author\/tigzy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Happens on the Darknet ? | Quick DarkWeb Tour \u2022 Adlice Software","description":"Alpha bay, Silk Road, Hansa: These illicit markets were kings on the Darknet. Learn how they were operated and what they were selling.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adlice.com\/darknet-explained\/","og_locale":"es_ES","og_type":"article","og_title":"What Happens on the Darknet ? | Quick DarkWeb Tour \u2022 Adlice Software","og_description":"Alpha bay, Silk Road, Hansa: These illicit markets were kings on the Darknet. Learn how they were operated and what they were selling.","og_url":"https:\/\/www.adlice.com\/darknet-explained\/","og_site_name":"Adlice Software","article_publisher":"https:\/\/www.facebook.com\/RogueKiller","article_published_time":"2017-11-16T15:43:02+00:00","article_modified_time":"2022-12-21T10:32:10+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/onion-647525_1920.jpg","type":"image\/jpeg"}],"author":"tigzy","twitter_card":"summary_large_image","twitter_creator":"@AdliceSoftware","twitter_site":"@AdliceSoftware","twitter_misc":{"Escrito por":"tigzy","Tiempo de lectura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.adlice.com\/darknet-explained\/#article","isPartOf":{"@id":"https:\/\/www.adlice.com\/darknet-explained\/"},"author":{"name":"tigzy","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d"},"headline":"What happens on the Darknet ?","datePublished":"2017-11-16T15:43:02+00:00","dateModified":"2022-12-21T10:32:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.adlice.com\/darknet-explained\/"},"wordCount":834,"publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"image":{"@id":"https:\/\/www.adlice.com\/darknet-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/onion-647525_1920.jpg","keywords":["alphabay","darknet","deepweb","tor","underground"],"articleSection":["Tutorial"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.adlice.com\/darknet-explained\/","url":"https:\/\/www.adlice.com\/darknet-explained\/","name":"What Happens on the Darknet ? | Quick DarkWeb Tour \u2022 Adlice Software","isPartOf":{"@id":"https:\/\/www.adlice.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.adlice.com\/darknet-explained\/#primaryimage"},"image":{"@id":"https:\/\/www.adlice.com\/darknet-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/onion-647525_1920.jpg","datePublished":"2017-11-16T15:43:02+00:00","dateModified":"2022-12-21T10:32:10+00:00","description":"Alpha bay, Silk Road, Hansa: These illicit markets were kings on the Darknet. Learn how they were operated and what they were selling.","breadcrumb":{"@id":"https:\/\/www.adlice.com\/darknet-explained\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adlice.com\/darknet-explained\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.adlice.com\/darknet-explained\/#primaryimage","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/onion-647525_1920.jpg","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2017\/11\/onion-647525_1920.jpg","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/www.adlice.com\/darknet-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adlice.com\/es\/"},{"@type":"ListItem","position":2,"name":"What happens on the Darknet ?"}]},{"@type":"WebSite","@id":"https:\/\/www.adlice.com\/#website","url":"https:\/\/www.adlice.com\/","name":"Adlice Software","description":"Anti-malware and analysis tools","publisher":{"@id":"https:\/\/www.adlice.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adlice.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.adlice.com\/#organization","name":"Adlice Software","url":"https:\/\/www.adlice.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","contentUrl":"https:\/\/www.adlice.com\/wp-content\/uploads\/2020\/05\/B1rTNpTG_400x40_10.png","width":276,"height":276,"caption":"Adlice Software"},"image":{"@id":"https:\/\/www.adlice.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RogueKiller","https:\/\/x.com\/AdliceSoftware","https:\/\/fr.linkedin.com\/company\/adlice-software","https:\/\/www.youtube.com\/channel\/UC4CQ-gIZMGWxl-auf0QqYhQ"]},{"@type":"Person","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/a02b30804320a4059d268dc2567a307d","name":"tigzy","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.adlice.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d81e380961b1b69969fa84994ad1e4cba26afe93a49d8dd3148e9c33ffe4ccac?s=96&d=mm&r=g","caption":"tigzy"},"description":"Founder and owner of Adlice Software, Tigzy started as lead developer on the popular Anti-malware called RogueKiller. Involved in all the Adlice projects as lead developer, Tigzy is also doing research and reverse engineering as well as writing blog posts.","url":"https:\/\/www.adlice.com\/es\/author\/tigzy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/posts\/1198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/comments?post=1198"}],"version-history":[{"count":0,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/posts\/1198\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/media\/1211"}],"wp:attachment":[{"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/media?parent=1198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/categories?post=1198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adlice.com\/es\/wp-json\/wp\/v2\/tags?post=1198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}