Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Cybersecurity FOREVER

Day-355: The Difference Between the Deep Web and Darknet…

30 Jun 2025

Description

Today I will discuss:1. What is the surface web?2. What is the deep web?3. Who uses it?Gateway ⛩ to become Skilled-Cybersecurity Professional 🕴🕴🕴 https://luminisindia.com/goehm-----1. What is the Deep Web?The Deep Web refers to all web content that is not indexed by search engines like Google or Bing. These pages are not publicly accessible without credentials or direct links.🔹 Examples of the Deep Web✔️ Online banking portals✔️ Medical records & databases✔️ Corporate intranets✔️ Private email accounts (Gmail, Outlook)✔️ Academic research papers behind paywalls✔️ Government and legal documents🛡️ Legality: 100% legal and commonly used for security, privacy, and authentication.2. What is the Darknet (Dark Web)?The Darknet, often called the Dark Web, is a small portion of the Deep Web that requires special tools to access. It is designed for anonymity and privacy and is often associated with both legal and illegal activities.🔹 How to Access the Darknet?✅ Tor (The Onion Router) – The most popular tool for anonymous browsing.✅ I2P (Invisible Internet Project) – Focuses on secure peer-to-peer communication.✅ Freenet – A censorship-resistant distributed network.🔹 Examples of Darknet Websites✔️ Whistleblower platforms (e.g., SecureDrop for journalists)✔️ Privacy-focused forums✔️ Cryptocurrency marketplaces❌ Illegal marketplaces (drugs, weapons, stolen data, etc.)❌ Hacking services and cybercrime forums⚠️ Legality: Using the Darknet is legal, but some activities on it are illegal. Governments monitor it for criminal activities.-----_Do you want to become a Skilled-Cybersecurity Professional 🕴🕴🕴.Here is the gateway ⛩  https://luminisindia.com/goehm How to perform a 🔥🔥PENTESTING🔥🔥???🎯🎯 A Pentesting Mini Project🎯🎯https://www.youtube.com/watch?v=84gNIEmCEAA If you find the video content informative, please Like thevideo and 📣📣📣 share with your friends.Help your friends to understand cybersecurity. Also let me know of ✍✍✍what do you think of this video.Thanks, Meena R.Your 'Cyber Warrior' Friend_YOU CAN FOLLOW ME AT: Facebook Page : https://www.facebook.com/cybersec.prism Instagram:  https://www.instagram.com/meena.cyber.warrior/Linkedin Profile: https://www.linkedin.com/in/meena1/About ME: https://www.youtube.com/watch?v=T66K3K5Y2tIYouTube Channel: https://www.youtube.com/@cybersecurityforever8214Hear My Podcast: https://anchor.fm/meena-rLinkedin Page : Cybersecurity Prism https://www.linkedin.com/company/10117131/Facebook Group : Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever/**Here are more resources:**-Cybersecurity HIGHLY informative articles for cybersecurityenthusiastic 🚀🚀🚀 (cyber-warrior)_https://luminisindia.com/cybersecurity-prism_You can also watch 👀 all the videos ofCybersecurity Series there:_Facebook Page : 👉👉👉  Cybersecurity Prismhttps://www.facebook.com/cybersec.prism/YouTube : https://www.youtube.com/@cybersecurityforever8214_Gateway ⛩ to Cybersecurity--https://luminisindia.com/goehm_The new Cyber Warrior's Command Guide For Ethical Hackers tohelp you learn faster..._✅ Grab a FREE Command Guide here:https://luminisindia.com/getcgeh_Are you willing to learn Networking now?Would you like to watch some videos of Networking, CCNARouting & Switching, etc?_https://luminisindia.com/networking-free_❓ Do you want to have thecomplete set of my CCNA Security powerpoint PRESENTATIONS ❓--https://luminisindia.com/free-ccna-security-presentations_

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.