{"id":1093,"date":"2021-02-01T10:32:23","date_gmt":"2021-02-01T09:32:23","guid":{"rendered":"https:\/\/dotinum.com\/blog\/?p=1093"},"modified":"2025-09-19T13:14:20","modified_gmt":"2025-09-19T11:14:20","slug":"dark-web-the-invisible-part-of-the-internet","status":"publish","type":"post","link":"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/","title":{"rendered":"Dark Web \u2013 what it is, how it works, and what you can find there"},"content":{"rendered":"\n<p class=\"has-text-align-center wp-block-paragraph\"><em><strong>TL;DR <\/strong>The Dark Web is often surrounded by myths, but in reality, it\u2019s just a hidden part of the Internet that requires special tools like the Tor browser. In this article, you\u2019ll learn what the Dark Web is, how it works, what you can find there, and how to access it safely. We also explain the difference between the Surface Web, Deep Web, and Dark Web, along with the main risks to be aware of.<\/em><\/p>\n\n\n\n<nav aria-label=\"Table of Contents\" class=\"wp-block-table-of-contents\"><ol><li><a class=\"wp-block-table-of-contents__entry\" href=\"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/#what-is-the-dark-web\">What is the Dark web?<\/a><\/li><li><a class=\"wp-block-table-of-contents__entry\" href=\"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/#how-to-access-the-dark-web-safely\">How to access the Dark Web safely<\/a><\/li><li><a class=\"wp-block-table-of-contents__entry\" href=\"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/#what-can-you-find-on-the-dark-web\">What can you find on the Dark Web?<\/a><\/li><li><a class=\"wp-block-table-of-contents__entry\" href=\"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/#risks-and-dangers-of-using-the-dark-web\">Risks and dangers of using the Dark Web<\/a><\/li><li><a class=\"wp-block-table-of-contents__entry\" href=\"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/#faq\">FAQ<\/a><ol><li><a class=\"wp-block-table-of-contents__entry\" href=\"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/#is-the-dark-web-illegal\">Is the Dark Web illegal?<\/a><\/li><li><a class=\"wp-block-table-of-contents__entry\" href=\"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/#what-can-you-find-on-the-dark-web\">What can you find on the Dark Web?<\/a><\/li><li><a class=\"wp-block-table-of-contents__entry\" href=\"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/#is-using-the-tor-browser-safe\">Is using the Tor browser safe?<\/a><\/li><\/ol><\/li><\/ol><\/nav>\n\n\n\n<p class=\"wp-block-paragraph\">Each of you must have heard about the mysterious, hidden Internet. Dark web owes its reputation to techno-futuristic movies from the 80s and 90s, and to Keanu Reeves in black sunglasses in unforgettable Matrix. <em>The darknet<\/em> also owes its mystery to TV, which trivializes and oversimplifies the picture of our reality to a greater extent. In this article, we would like to introduce a few interesting pieces of information about this hidden part of the Internet. It won\u2019t be any secret knowledge, just a handful of proven facts and in the end &#8211; some pieces of advice.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<!--more-->\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-the-dark-web\"><strong>What is the Dark web?<\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">A few years ago, Krzysztof Lech in &#8220;PR World&#8221;, suggested the most adequate definition that we\u2019ve managed to find:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-medium-font-size wp-block-paragraph\"><em>&#8220;Dark web is a term that strictly relates to websites hiding the IP addresses of the servers which they use. They can be visited by any Internet user, but it is very difficult to determine who is behind them. These pages can not be found with regular search engines. The ones who act as a part of the Dark web, hide their identity. They do this primarily by using the Tor encryption tool (The Onion Router), which most Internet users have probably heard of mainly in the context of end-user hiding properties.&#8221;<\/em><\/p>\n<\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">Or as we can read on Wikipedia:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"wp-block-paragraph\"><em>Onion routing is implemented byencryption (&#8230;) nested like the layers of an onion. Tor encrypts the data, including the next node destinationIP address, multiple times and sends it through avirtual circuit comprising successive, random-selection Tor relays. Each relay decrypts a layer ofencryption to reveal the next relay in the circuit to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing or knowing the source IP address. (&#8230;) Tor is not meant to completely solve the issue of anonymity on the web. Tor is not designed to completely erase tracks but instead to reduce the likelihood for sites to trace actions and data back to the user. (&#8230;) Tor cannot and does not attempt to protect against monitoring of traffic at the boundaries of the Tor network (i.e., the traffic entering and exiting the network). While Tor does provide protection against traffic analysis, it cannot prevent traffic confirmation (also called end-to-end correlation).<\/em><\/p>\n<\/blockquote>\n\n\n\n<p class=\"wp-block-paragraph\">For example, the US government can monitor any broadband connection to the Internet (under the 1994 CALEA Act), therefore it can control both endpoints of Tor connections made on its territory.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In Poland, the legal tool allowing for the identification of Tor network users is the European Union Directive 2006\/24 \/ EC on telecommunications data retention.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Data retention is the routine procedure to log and store information about who connects with whom and when (or tries to connect) done by the operators using means of electronic communication. According to the Telecommunication law, the operators are obliged to store the data for two years &#8211; for purposes related to public security &#8211; and share them with authorized institutions.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The history of the darknet hides many more attempts \u2013 both theoretical and practical \u2013 of identifying anonymous users of the Tor web.&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The websites that we know from the \u201cnormal&#8221; Internet, work on Tor in a form of hidden localization. These services are available via the top-level Tor\u2019s pseudo-domains \u2013 .onion. What do they look like?<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">http:\/\/rzb5nlpvy5oqnket.onion\/ &#8211; this is, for example, the address of the Panoptykon Foundation in the hidden web. One of the goals of this organization is to protect human rights in the surveillance society.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">It is worth remembering that the .onion domain in the Tor web is a part of the ICANN register, and you cannot connect with it without using TOR. Because of the names of the websites, which are difficult to remember, the majority of users use the index of websites available on Google or other search engines.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">When it comes to the darknet, its size may be surprising. According to different studies the \u201cofficial\u201d part of the web, e.g the one that can be found using popular search engines, constitutes only a small percentage of the whole thing. What is the real web size then? Let the following graphic be the answer:<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"601\" height=\"538\" src=\"https:\/\/dotinum.com\/blog\/wp-content\/uploads\/2021\/02\/dark-web-deeb-web-surface-web.jpg\" alt=\"dark web deeb web surface web\" class=\"wp-image-1094\" style=\"width:582px;height:521px\" srcset=\"https:\/\/dotinum.com\/blog\/wp-content\/uploads\/2021\/02\/dark-web-deeb-web-surface-web.jpg 601w, https:\/\/dotinum.com\/blog\/wp-content\/uploads\/2021\/02\/dark-web-deeb-web-surface-web-300x269.jpg 300w, https:\/\/dotinum.com\/blog\/wp-content\/uploads\/2021\/02\/dark-web-deeb-web-surface-web-402x360.jpg 402w\" sizes=\"auto, (max-width: 601px) 100vw, 601px\" \/><figcaption class=\"wp-element-caption\">https:\/\/www.skyindya.com\/blog\/web-development\/surface-web-vs-deep-web-vs-dark-web\/<\/figcaption><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">Like any other depth, the darknet also has its degrees of \u201cdepth\u201d. The websites at the very bottom are considered to be the most hidden and most secure. Conspiracy theorists have even coined the term Mariana\u2019s web \u2013 the depth level of Mariana Trench \u2013 the deepest known place on Earth. According to the supporters of this theory, it would include the most secure and darkest secrets of humanity, and you can access it only through quantum computer technology. Welcome to Dan Brown\u2019s world. But let\u2019s go back to the surface for a moment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-access-the-dark-web-safely\"><strong><strong>How to access the Dark Web safely<\/strong><\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In fact, it\u2019s not hard at all. A web client named Tor Browser is all we need to connect to the Tor web. After installing the package you can enter any website on the .onion domain. Main part of the Tor Browser, among others, is a built-in modified Mozilla Firefox ESR web browser. For more info on how to use it see the video below:<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.youtube.com\/watch?v=EQ3nYo-YAsE\n<\/div><figcaption class=\"wp-element-caption\">How to Access Dark Web Step By Step &#8211; <a href=\"https:\/\/www.youtube.com\/channel\/UC9_fXrGaUtX-07IXb8PxgeQ\">Tixe Schooling<\/a><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-can-you-find-on-the-dark-web\"><strong><strong>What can you find on the Dark Web?<\/strong><\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The dark web, as a place of unrestricted freedom, can be used for myriad of illegal activities including blacmailing, gambling, buying weapons, drugs, child pornography or terrorism. But that&#8217;s only one side of this web. On the other hand, it is a place where people can gather, organize and exchange information outside the radar of those who repress them.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The good example is one of the biggest players on the online market \u2013 Facebook, which launched its service on Tor three years ago. As reported by Antyradio: In April 2016, for the first time in history, the number of users logging into Facebook via the anonymity web exceeded one million. They are most likely people from countries in which access to Western websites is blocked.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"risks-and-dangers-of-using-the-dark-web\"><strong><strong>Risks and dangers of using the Dark Web<\/strong><\/strong><\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">If for any reason, you decided to check what is on the other side, be sure to check the following tips:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tor can be dangerous if misused, like any other thing;<\/li>\n\n\n\n<li>Don&#8217;t provide your real data;<\/li>\n\n\n\n<li>The people using Tor want to be anonymous and many of them may fake their real identity.<\/li>\n\n\n\n<li>Tor is constantly monitored by the police who may deliberately encourage illegal activities.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><em>* In the article I used the names dark web and darknet interchangeably because I don&#8217;t see any significant difference between them.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"faq\">FAQ<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"is-the-dark-web-illegal\"><strong>Is the Dark Web illegal?<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Not entirely. Accessing the Dark Web with Tor is legal in most countries. What is illegal are the activities often associated with it, such as buying drugs, weapons, or stolen data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"what-can-you-find-on-the-dark-web\"><strong>What can you find on the Dark Web?<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Apart from illegal markets, the Dark Web also hosts forums, whistleblower platforms, and even official sites like Facebook\u2019s Tor version, used in countries with restricted Internet access<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"is-using-the-tor-browser-safe\"><strong>Is using the Tor browser safe?<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Tor increases anonymity but does not guarantee complete security. Users should avoid sharing personal data, downloading unknown files, and clicking suspicious links.<\/p>\n\n\n<div class=\"wp-block-post-author\"><div class=\"wp-block-post-author__avatar\"><img alt='' src='https:\/\/secure.gravatar.com\/avatar\/5c8ab8e275fda9a05067c86ad1d766b9e3ef89ae02055ef6787d25309db6a02f?s=96&#038;d=mm&#038;r=g' srcset='https:\/\/secure.gravatar.com\/avatar\/5c8ab8e275fda9a05067c86ad1d766b9e3ef89ae02055ef6787d25309db6a02f?s=192&#038;d=mm&#038;r=g 2x' class='avatar avatar-96 photo' height='96' width='96' \/><\/div><div class=\"wp-block-post-author__content\"><p class=\"wp-block-post-author__byline\">Written by<\/p><p class=\"wp-block-post-author__name\">Agnieszka Pawlak<\/p><p class=\"wp-block-post-author__bio\">Marketing and graphic specialist in Dotinum. 5 years in marketing, over 10 in the graphic field. Outside Dotinum she curates content for 4 other brands. Loves games, reading, and baking.<\/p><\/div><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>TL;DR The Dark Web is often surrounded by myths, but in reality, it\u2019s just a hidden part of the Internet that requires special tools like the Tor browser. In this article, you\u2019ll learn what the Dark Web is, how it works, what you can find there, and how to access it safely. We also explain [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":1095,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1093","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bez-kategorii"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Dark Web \u2013 what it is, how it works, and what you can find there - Blog Dotinum.com<\/title>\n<meta name=\"description\" content=\"Dark web is a term that strictly relates to websites hiding the IP addresses of the servers which they use. They can be visited by any Internet user, but it is very difficult to determine who is behind them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dark Web \u2013 what it is, how it works, and what you can find there - Blog Dotinum.com\" \/>\n<meta property=\"og:description\" content=\"Dark web is a term that strictly relates to websites hiding the IP addresses of the servers which they use. They can be visited by any Internet user, but it is very difficult to determine who is behind them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog Dotinum.com\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-01T09:32:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-19T11:14:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dotinum.com\/blog\/wp-content\/uploads\/2021\/02\/dark-web.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Agnieszka Pawlak\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Agnieszka Pawlak\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dark Web \u2013 what it is, how it works, and what you can find there - Blog Dotinum.com","description":"Dark web is a term that strictly relates to websites hiding the IP addresses of the servers which they use. They can be visited by any Internet user, but it is very difficult to determine who is behind them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/","og_locale":"en_US","og_type":"article","og_title":"Dark Web \u2013 what it is, how it works, and what you can find there - Blog Dotinum.com","og_description":"Dark web is a term that strictly relates to websites hiding the IP addresses of the servers which they use. They can be visited by any Internet user, but it is very difficult to determine who is behind them.","og_url":"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/","og_site_name":"Blog Dotinum.com","article_published_time":"2021-02-01T09:32:23+00:00","article_modified_time":"2025-09-19T11:14:20+00:00","og_image":[{"width":950,"height":640,"url":"https:\/\/dotinum.com\/blog\/wp-content\/uploads\/2021\/02\/dark-web.jpg","type":"image\/jpeg"}],"author":"Agnieszka Pawlak","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Agnieszka Pawlak","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/#article","isPartOf":{"@id":"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/"},"author":{"name":"Agnieszka Pawlak","@id":"https:\/\/dotinum.com\/blog\/#\/schema\/person\/b6f597e8623959d03aefc9644bae8a43"},"headline":"Dark Web \u2013 what it is, how it works, and what you can find there","datePublished":"2021-02-01T09:32:23+00:00","dateModified":"2025-09-19T11:14:20+00:00","mainEntityOfPage":{"@id":"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/"},"wordCount":1371,"commentCount":0,"publisher":{"@id":"https:\/\/dotinum.com\/blog\/#organization"},"image":{"@id":"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/dotinum.com\/blog\/wp-content\/uploads\/2021\/02\/dark-web.jpg","articleSection":["Bez kategorii"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/","url":"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/","name":"Dark Web \u2013 what it is, how it works, and what you can find there - Blog Dotinum.com","isPartOf":{"@id":"https:\/\/dotinum.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/#primaryimage"},"image":{"@id":"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/dotinum.com\/blog\/wp-content\/uploads\/2021\/02\/dark-web.jpg","datePublished":"2021-02-01T09:32:23+00:00","dateModified":"2025-09-19T11:14:20+00:00","description":"Dark web is a term that strictly relates to websites hiding the IP addresses of the servers which they use. They can be visited by any Internet user, but it is very difficult to determine who is behind them.","breadcrumb":{"@id":"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/#primaryimage","url":"https:\/\/dotinum.com\/blog\/wp-content\/uploads\/2021\/02\/dark-web.jpg","contentUrl":"https:\/\/dotinum.com\/blog\/wp-content\/uploads\/2021\/02\/dark-web.jpg","width":950,"height":640,"caption":"dark web"},{"@type":"BreadcrumbList","@id":"https:\/\/dotinum.com\/blog\/dark-web-the-invisible-part-of-the-internet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dotinum.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Dark Web \u2013 what it is, how it works, and what you can find there"}]},{"@type":"WebSite","@id":"https:\/\/dotinum.com\/blog\/#website","url":"https:\/\/dotinum.com\/blog\/","name":"Blog Dotinum.com","description":"Software house from Wroclaw, Poland with proven experience (since 2002) is open to work with more international customers. Learn about how we can help grow your online business.","publisher":{"@id":"https:\/\/dotinum.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dotinum.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dotinum.com\/blog\/#organization","name":"Blog Dotinum.com","url":"https:\/\/dotinum.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dotinum.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/dotinum.com\/blog\/wp-content\/uploads\/2026\/04\/cropped-Projekt-bez-nazwy10.png","contentUrl":"https:\/\/dotinum.com\/blog\/wp-content\/uploads\/2026\/04\/cropped-Projekt-bez-nazwy10.png","width":250,"height":84,"caption":"Blog Dotinum.com"},"image":{"@id":"https:\/\/dotinum.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dotinum.com\/blog\/#\/schema\/person\/b6f597e8623959d03aefc9644bae8a43","name":"Agnieszka Pawlak","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5c8ab8e275fda9a05067c86ad1d766b9e3ef89ae02055ef6787d25309db6a02f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5c8ab8e275fda9a05067c86ad1d766b9e3ef89ae02055ef6787d25309db6a02f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5c8ab8e275fda9a05067c86ad1d766b9e3ef89ae02055ef6787d25309db6a02f?s=96&d=mm&r=g","caption":"Agnieszka Pawlak"},"description":"Marketing and graphic specialist in Dotinum. 5 years in marketing, over 10 in the graphic field. Outside Dotinum she curates content for 4 other brands. Loves games, reading, and baking.","url":"https:\/\/dotinum.com\/blog\/author\/agnieszka\/"}]}},"_links":{"self":[{"href":"https:\/\/dotinum.com\/blog\/wp-json\/wp\/v2\/posts\/1093","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dotinum.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dotinum.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dotinum.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/dotinum.com\/blog\/wp-json\/wp\/v2\/comments?post=1093"}],"version-history":[{"count":4,"href":"https:\/\/dotinum.com\/blog\/wp-json\/wp\/v2\/posts\/1093\/revisions"}],"predecessor-version":[{"id":1934,"href":"https:\/\/dotinum.com\/blog\/wp-json\/wp\/v2\/posts\/1093\/revisions\/1934"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dotinum.com\/blog\/wp-json\/wp\/v2\/media\/1095"}],"wp:attachment":[{"href":"https:\/\/dotinum.com\/blog\/wp-json\/wp\/v2\/media?parent=1093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dotinum.com\/blog\/wp-json\/wp\/v2\/categories?post=1093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dotinum.com\/blog\/wp-json\/wp\/v2\/tags?post=1093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}