{"id":67516,"date":"2017-06-26T08:44:53","date_gmt":"2017-06-26T15:44:53","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=67516"},"modified":"2017-07-05T08:15:08","modified_gmt":"2017-07-05T15:15:08","slug":"inside-the-dark-web-what-every-parent-needs-to-know","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/","title":{"rendered":"Inside the Dark Web: What Every Parent Needs to Know"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-67636\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/Dark-Web.png\" alt=\"Inside the Dark Web: What Every Parent Needs to Know\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/Dark-Web.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/Dark-Web-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/Dark-Web-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The Dark Web&#8230; just the mention of it makes\u00a0people shake their heads and shudder. Best avoid\u00a0it, a lot of shady things happening\u00a0there! Is the Dark Web really as bad as its reputation? You might be steering clear of\u00a0it, but are your children doing the same? How easy is it to access\u00a0the Dark Web? These are some of the issues this article will address.<\/p>\n<h3>Dark Web vs.\u00a0Deep Web: What&#8217;s the Difference?<\/h3>\n<p>Content that is indexed by search engines is what we know as the Surface Web (or just &#8216;Web&#8217;), content that is not indexed by search engines is known as the Deep Web, and finally content that is neither indexed by search engines and needs a special browser to access is known as the Dark Web.<\/p>\n<p>Your Internet browsing is likely predominantly done on the Web with the occasional venture off into the Deep Web. Ending up on the Deep Web is fairly easy and probably happens all the time without you knowing. All it takes is clicking a link on a site that is not fully indexed by search engines ending up on a site that also isn&#8217;t indexed. If Intego chose to block search engine indexing, we&#8217;d technically be considered part of the Deep Web!<\/p>\n<p>This\u00a0graphic illustrates these divisions of the Internet:<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-67522 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/the-web.jpg\" alt=\"\" width=\"780\" height=\"930\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/the-web.jpg 780w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/the-web-126x150.jpg 126w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/the-web-252x300.jpg 252w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/the-web-768x916.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/the-web-657x783.jpg 657w\" sizes=\"(max-width: 780px) 100vw, 780px\" \/><\/p>\n<p>For example, visiting your bank&#8217;s website has you on the Surface Web, logging in and browsing your transaction records is done on the Deep Web. Again, the Deep Web is something you likely access on a daily basis and is protected by layers of security implemented by the sites that require your personal information in order to keep it safe.<\/p>\n<p>The Dark Web, however, can only be accessed by using the <a href=\"http:\/\/www.torproject.org\/\" target=\"_blank\">Tor browser<\/a>. There is no way to accidentally stumble into it during typical\u00a0browsing, such as social media accounts, shopping, or simply watching YouTube videos.<\/p>\n<h3>Is the Dark Web as Bad as They Say?<\/h3>\n<p>According to most, the Dark Web is not a safe place. The image above is a generalization of the Dark Web, where anything and everything horrible and illegal takes place. A significant\u00a0amount of nefarious activity takes place there, but this holds true for the Surface and Deep Webs as well. Joseph Cox wrote about this a few years ago in his\u00a0article, &#8220;<a href=\"https:\/\/www.wired.com\/2015\/06\/dark-web-know-myth\/\" target=\"_blank\" rel=\"noopener\">The Dark Web as You Know It Is a Myth<\/a>,&#8221; and I agree with it\u00a0word for word.<\/p>\n<p>The problem with the Dark Web is not necessarily some of the content or activities that take place\u00a0there. Again, those can be found on the surface and Deep Web as well.\u00a0It&#8217;s how easy the content and activities are to access. You may be browsing a site on the Dark Web which seems completely harmless, click on a link and end up on a child trafficking forum. No warnings, no disclaimer, blammo you&#8217;re looking at it.<\/p>\n<p>When navigated carefully, the Deep Web can provide troves of good and useful information that is not shady or illegal. However, children are curious and may encounter content we want to shield them from. Can we trust and expect our children to not be curious and go off exploring though?<\/p>\n<h3>Accessing the Dark Web<\/h3>\n<p>Accessing the Dark Web is\u00a0remarkably easy. Even for someone who has\u00a0never done so or knows anything about it, the answers are just an online search away. A search for\u00a0&#8220;How can I access the Dark Web?&#8221; and &#8220;How do I find websites on the Dark Web?&#8221; gives you everything you need to install the required browser and start exploring within minutes. If your child has\u00a0their own bank account or PayPal account, a search for &#8220;How can I buy Bitcoin&#8221; can provide instructions on how to get their hands on the preferred Dark Web currency.<\/p>\n<h3>The Problem with Tor and Other Private Browsers<\/h3>\n<p>Tor, required among other things to browse the Dark Web, encrypts all traffic. This renders monitoring software, parental controls and firewalls that block certain content less effective as that software can&#8217;t &#8220;see&#8221; what&#8217;s going on behind the encryption. Opera\u00a0now has a free Virtual Private Network (VPN) feature built in to its browser and while very convenient to browse the web more securely, it has the same effect on the above mentioned software.<\/p>\n<p>There are legitimate and very good reasons for using browsers such as Tor or Opera, but without the ability to keep our children safe while using them, a lot of bad things can happen.<\/p>\n<h3>Keeping Children Safe Online<\/h3>\n<p>We obviously don&#8217;t want our children anywhere near the Dark Web, at least until they have been properly educated on the use of Tor, VPN, do&#8217;s and dont&#8217;s etc. This applies to the use of the web in general and any kind of bad content of course. So, what can you do?<\/p>\n<ol>\n<li><strong>For privacy and security, use a VPN.<\/strong><br \/>\nWhile a VPN inside a browser thwarts monitoring and parental control software, using a VPN on the Mac so that any and all traffic is encrypted does not have that effect. Using a <a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2403388,00.asp\" target=\"_blank\" rel=\"noopener\">commercial solution<\/a> or through <a href=\"https:\/\/www.intego.com\/mac-security-blog\/this-home-vpn-router-setup-protects-your-traffic-wherever-you-are\/\" target=\"_blank\" rel=\"noopener\">setting up your own<\/a>, the browser can work as usual and the VPN software will take care of encrypting any traffic that leaves your Mac. This also means that monitoring or parental control software is able to do it&#8217;s job as well as browser data is not encrypted in the browser itself.<\/li>\n<li><strong>Block Tor Browser and other in-browser VPN solutions like those found in Opera.<\/strong><br \/>\nThis can easily be done using solutions such as ContentBarrier. Block a specific application like Tor or block all potential applications that might use their own form of encryption.<\/li>\n<li style=\"text-align: left;\"><strong>Educate your children (and yourself)!<\/strong><br \/>\nNavigating the web can be risky. Cyberbullying can happen on any forum or social media platform, pornographic content can pop up in the form of an ad even on a seemingly innocent website and scams lurk around every corner. Software solutions are a big help in keeping your children safe online but what if they use a computer that&#8217;s not managed by you\u00a0\u2014 in school, at a friend&#8217;s house etc. They need to have the knowledge to keep themselves safe regardless of where they go online. Stay current so you know how to educate and protect your children. The Mac Security Blog is here to help! \ud83d\ude42<br \/>\nHere are a few good resources:<\/li>\n<\/ol>\n<ul>\n<li style=\"text-align: left;\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-teach-your-kids-never-to-give-out-online\/\" target=\"_blank\" rel=\"noopener\">8 Things to Teach Your Kids Never to Give Out Online<\/a><\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-macos-parental-controls-and-intego-contentbarrier\/\" target=\"_blank\">What&#8217;s the Difference Between macOS Parental Controls and Intego ContentBarrier?<\/a><\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-reality-of-internet-safety-why-education-trumps-technology\/\" target=\"_blank\" rel=\"noopener\">The Reality of Internet Safety: Why Education Trumps Technology<br \/>\n<\/a><\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-coding-can-make-your-kids-safer-online\/\" target=\"_blank\">How Coding Can Make Your Kids Safer Online<\/a><\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-monitor-and-protect-your-identity-online\/\" target=\"_blank\" rel=\"noopener\">How to Monitor and Protect Your Identity Online<br \/>\n<\/a><\/li>\n<li style=\"text-align: left;\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/guide-to-setting-up-a-cyber-contract-with-your-children\/\" target=\"_blank\" rel=\"noopener\">Guide to Setting Up a Cyber Contract with Your Children<\/a><\/li>\n<\/ul>\n<p>There is a lot of focus on the Dark Web, but content on the Surface Web or Weep Web can be just as disturbing\/illegal\/offensive. The Dark Web is just explicitly known for it. While it is a good idea to keep your children away from the Dark Web completely, the proper software solutions and education will make sure they stay safe on the Surface Web and Deep Web as well.<\/p>\n<p><strong><i>Have something to say about this story? Share your comments below!<\/i><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Dark Web&#8230; just the mention of it makes\u00a0people shake their heads and shudder. Best avoid\u00a0it, a lot of shady things happening\u00a0there! Is the Dark Web really as bad as its reputation? You might be steering clear of\u00a0it, but are your children doing the same? How easy is it to access\u00a0the Dark Web? These are [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":67642,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[3517,3520,3523],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The Dark Web... just the mention of it makes\u00a0people shake their heads and shudder. Best avoid\u00a0it, a lot of shady things happening\u00a0there! Is the Dark Web\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inside the Dark Web: What Every Parent Needs to Know - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The Dark Web... just the mention of it makes\u00a0people shake their heads and shudder. Best avoid\u00a0it, a lot of shady things happening\u00a0there! Is the Dark Web\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-26T15:44:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-07-05T15:15:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/Inside-Dark-Web.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/Inside-Dark-Web.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/Inside-Dark-Web.png\",\"width\":400,\"height\":260,\"caption\":\"Inside the Dark Web\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/\",\"name\":\"Inside the Dark Web: What Every Parent Needs to Know - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#primaryimage\"},\"datePublished\":\"2017-06-26T15:44:53+00:00\",\"dateModified\":\"2017-07-05T15:15:08+00:00\",\"description\":\"The Dark Web... just the mention of it makes\\u00a0people shake their heads and shudder. Best avoid\\u00a0it, a lot of shady things happening\\u00a0there! Is the Dark Web\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Inside the Dark Web: What Every Parent Needs to Know\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Inside the Dark Web: What Every Parent Needs to Know\",\"datePublished\":\"2017-06-26T15:44:53+00:00\",\"dateModified\":\"2017-07-05T15:15:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#webpage\"},\"wordCount\":1208,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/Inside-Dark-Web.png\",\"keywords\":[\"Dark Web\",\"Deep Web\",\"Surface Web\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The Dark Web... just the mention of it makes\u00a0people shake their heads and shudder. Best avoid\u00a0it, a lot of shady things happening\u00a0there! Is the Dark Web","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/","og_locale":"en_US","og_type":"article","og_title":"Inside the Dark Web: What Every Parent Needs to Know - The Mac Security Blog","og_description":"The Dark Web... just the mention of it makes\u00a0people shake their heads and shudder. Best avoid\u00a0it, a lot of shady things happening\u00a0there! Is the Dark Web","og_url":"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-06-26T15:44:53+00:00","article_modified_time":"2017-07-05T15:15:08+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/Inside-Dark-Web.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/Inside-Dark-Web.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/Inside-Dark-Web.png","width":400,"height":260,"caption":"Inside the Dark Web"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/","name":"Inside the Dark Web: What Every Parent Needs to Know - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#primaryimage"},"datePublished":"2017-06-26T15:44:53+00:00","dateModified":"2017-07-05T15:15:08+00:00","description":"The Dark Web... just the mention of it makes\u00a0people shake their heads and shudder. Best avoid\u00a0it, a lot of shady things happening\u00a0there! Is the Dark Web","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Inside the Dark Web: What Every Parent Needs to Know"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Inside the Dark Web: What Every Parent Needs to Know","datePublished":"2017-06-26T15:44:53+00:00","dateModified":"2017-07-05T15:15:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#webpage"},"wordCount":1208,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/Inside-Dark-Web.png","keywords":["Dark Web","Deep Web","Surface Web"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/inside-the-dark-web-what-every-parent-needs-to-know\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/Inside-Dark-Web.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-hyY","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/67516"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=67516"}],"version-history":[{"count":22,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/67516\/revisions"}],"predecessor-version":[{"id":67864,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/67516\/revisions\/67864"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/67642"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=67516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=67516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=67516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}