{"id":38623,"date":"2021-02-01T09:27:47","date_gmt":"2021-02-01T14:27:47","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=38623"},"modified":"2021-02-01T09:27:47","modified_gmt":"2021-02-01T14:27:47","slug":"deep-web-dark-web-darknet-surface-web-difference","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/deep-web-dark-web-darknet-surface-web-difference\/38623\/","title":{"rendered":"Darknet, dark web, deep web, and surface web \u2014 what&#8217;s the difference?"},"content":{"rendered":"<p>What associations do the words \u201cdeep web\u201d conjure in your mind? A place for godlike hackers where mere mortals should fear to tread? A den of iniquity? If so, it may come as a surprise that you use the deep web every single day.<\/p>\n<p>In fact, although the term <em>deep web<\/em> is easy to confuse with the similar-sounding <em>dark web<\/em> and <em>darknet<\/em> \u2014 and weirdly, the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Deep_Web_(film)\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">documentary film <em>Deep Web<\/em><\/a> was in fact about the dark web \u2014 we think it\u2019s worth untangling the thread.<\/p>\n<h2>Deep web and surface web<\/h2>\n<p>By way of illustration, let\u2019s imagine the Internet as one big city. Like any metropolis, it contains public spaces open to everyone, such as the streets, boulevards, and parks you\u2019ll find on the map. Anyone can go there and look around; 360-cam cars can see them; and you can easily find them on a map such as MapQuest or Google Maps.<\/p>\n<p>On the Internet, these public spaces are known as the <em>surface web<\/em>. They are Web pages, Web applications, and other online elements that search bots \u2014 digital analogues of cartographers\u2019 cameras \u2014 can index. They may hold documents, media files, and more. Anyone can find them using a search engine and view them without paying, registering, or installing special software.<\/p>\n<p>In addition to public areas, cities have private zones that require a pass, ticket, or invitation for access. These include homes, business centers, private clubs, cinemas, and so on. Usually, no publicly available map will show you what\u2019s going on inside these places.<\/p>\n<p>The Web, too, is home to many corners that Google, Bing and others do not peer into. Collectively, such places are known as the <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/deep-web\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>deep web<\/em><\/a>. They consist primarily of all of the Internet pages that cannot be searched and opened by normal means, and bot-cartographers cannot index them.<\/p>\n<p>If a site requires you to enter a CAPTCHA for access, then a search bot won\u2019t be able to learn much about its contents \u2014 the point of a CAPTCHA is to weed out bots, after all. If an article is available only by subscription, a bot can\u2019t open and index this article because bots have no accounts or money to pay the fee. Reading a document requires a password? Again, no luck for a bot: it doesn\u2019t know a password.<\/p>\n<p>If something cannot be found, even if it can be opened, then it too belongs to the deep web. If you configure Facebook to hide your profile from search engines, for example, then even if a search bot gets to it, it will have to ignore it. Nor can a search engine process content that a Web page generates only when the page is opened and that varies depending on who opens it. For example, to view personalized offers, you have to be a user with <a href=\"https:\/\/www.kaspersky.com\/blog\/internet-ads-103\/13569\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">certain digital habits<\/a>.<\/p>\n<p>Finally, <em>deep web<\/em> also refers to all content to which no links exist from the visible or surface web. A search bot simply does not know that such content exists; it finds new pages by following links from the pages it\u2019s already indexed. Just as a Google Street View car cannot get into a private courtyard, search bots cannot come across unlinked content.<\/p>\n<p>As you see, the bulk of the deep web is made up of harmless, even useful web pages and documents that most of us use. There\u2019s nothing wrong with them being off-limits to outsiders. Quite the opposite.<\/p>\n<h2>Dark web and darknets<\/h2>\n<p>Both in town and online, privacy is sought not only by upstanding citizens, but also by those looking to hide their not entirely legal activities. In the physical world, we think of shady business as taking place in slums and criminal dens \u2014 places selected for their lack of foot traffic and that are not marked on public maps. The addresses and whereabouts of each den are known to a limited circle of individuals, although many are aware that they exist somewhere.<\/p>\n<p>That is approximately how <em>darknets<\/em> \u2014 restricted-access networks used chiefly for questionable activities \u2014 operate. The nodes of each individual darknet (servers, computers, routers) are invisible not only to search engines, but, because they use nonstandard protocols to transfer data, to most browsers as well. Neither a direct link nor a password will get an ordinary user in.<\/p>\n<p>Together, darknets make up the <em>dark web<\/em> \u2014 generally considered a haven for murky characters such as drug traffickers, arms dealers, extortionists, and sellers of stolen data. Many people know that the dark web exists, but few know how to get there.<\/p>\n<p>Of course, hackers and criminals aren\u2019t the only people who need secrecy. Dissidents, free speech activists, whistleblowers helping investigative journalists, and many more people use the dark web to evade persecution and communicate anonymously online. Some people go there for protection from online data collection. <a href=\"https:\/\/www.kaspersky.com\/blog\/anti-tracking-tools\/26556\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Secure and affordable tools<\/a> exist for that purpose, but some prefer a more radical approach.<\/p>\n<h2>All shades of Internet security<\/h2>\n<p>It\u2019s no bad thing for data to be buried deep, invisible to those for whom it is not intended. If, for example, corporate correspondence were to find its way into a search index, the consequences could be unfortunate. It\u2019s better to protect your portion of the depths \u2014 accounts and documents to which only you have access.<\/p>\n<ul>\n<li>Always use <a href=\"https:\/\/www.kaspersky.com\/blog\/strong-password-day\/25519\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">strong<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/never-reuse-passwords-story\/24808\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">unique<\/a> passwords. And if you have too many accounts to remember all of them, use a <a href=\"https:\/\/www.kaspersky.com\/password-manager?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener nofollow\">password manager<\/a> to help you keep them under control.<\/li>\n<li>Always confirm you\u2019re exactly where you want to be before entering your credentials online. For example, if the URL is misspelled or looks like a meaningless jumble of letters and numbers, <a href=\"https:\/\/www.kaspersky.com\/blog\/travel-phishing\/27078\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">the page is not to be trusted<\/a>.<\/li>\n<li>Give access to confidential documents only to those who really need it.<\/li>\n<li>Avoid the dark web unless you\u2019re completely comfortable telling the difference between a forum for human rights activists and one for hackers.<\/li>\n<li>Use a <a href=\"https:\/\/www.kaspersky.com\/advert\/security-cloud?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksc___\" target=\"_blank\" rel=\"noopener nofollow\">trustworthy security solution<\/a> that will keep you out of trouble wherever you go online.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>The terms are sometimes confused; we help unravel the differences.<\/p>\n","protected":false},"author":2484,"featured_media":38624,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788],"tags":[1052,1441,4034,4033,1134,43,4035],"class_list":{"0":"post-38623","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"tag-anonymity","9":"tag-dark-web","10":"tag-darknet","11":"tag-deep-web","12":"tag-internet","13":"tag-privacy","14":"tag-surface-web"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/deep-web-dark-web-darknet-surface-web-difference\/38623\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/deep-web-dark-web-darknet-surface-web-difference\/22472\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/deep-web-dark-web-darknet-surface-web-difference\/17962\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/deep-web-dark-web-darknet-surface-web-difference\/24177\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/deep-web-dark-web-darknet-surface-web-difference\/22254\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/deep-web-dark-web-darknet-surface-web-difference\/20962\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/deep-web-dark-web-darknet-surface-web-difference\/24627\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/deep-web-dark-web-darknet-surface-web-difference\/23836\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/deep-web-dark-web-darknet-surface-web-difference\/30044\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/deep-web-dark-web-darknet-surface-web-difference\/9298\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/deep-web-dark-web-darknet-surface-web-difference\/16340\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/deep-web-dark-web-darknet-surface-web-difference\/16921\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/deep-web-dark-web-darknet-surface-web-difference\/14441\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/deep-web-dark-web-darknet-surface-web-difference\/26169\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/deep-web-dark-web-darknet-surface-web-difference\/29966\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/deep-web-dark-web-darknet-surface-web-difference\/26654\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/deep-web-dark-web-darknet-surface-web-difference\/23507\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/deep-web-dark-web-darknet-surface-web-difference\/28852\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/deep-web-dark-web-darknet-surface-web-difference\/28658\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/internet\/","name":"Internet"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38623","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=38623"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38623\/revisions"}],"predecessor-version":[{"id":38627,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/38623\/revisions\/38627"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/38624"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=38623"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=38623"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=38623"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}