Skip to main content

Deep Web, Dark Web, and Tor Browser: A Comprehensive Guide

· 11 min read
Anand Raja
Senior Software Engineer

Understanding the Layers of the Internet

The internet is often compared to an iceberg - what you see on the surface (regular websites like Google, Facebook, YouTube) is just a tiny fraction of what exists online.

The internet has three main layers:

  1. Surface Web (~4% of the internet)
  2. Deep Web (~90% of the internet)
  3. Dark Web (~6% of the internet)

1. Surface Web (Clear Web)

What is it?

The Surface Web is the part of the internet that can be indexed by standard search engines like Google, Bing, or Yahoo.

Examples:
  • News websites (CNN, BBC)
  • Social media platforms (Facebook, Twitter, Instagram)
  • E-commerce sites (Amazon, eBay)
  • Wikipedia
  • YouTube

Key Characteristics:

  • Accessible to everyone
  • Indexed by search engines
  • No special software required
  • Subject to regulations and monitoring

2. Deep Web

What is it?

The Deep Web consists of all web pages and content that cannot be indexed by standard search engines. This is NOT illegal or sinister - it's simply content that's behind access restrictions.

The Deep Web includes:

  • Private databases: Medical records, legal documents, financial records
  • Email inboxes: Gmail, Outlook, Yahoo Mail
  • Online banking: Your bank account pages
  • Subscription services: Netflix, Spotify, academic journals
  • Government databases: Tax records, patent filings
  • Corporate intranets: Internal company websites
  • Cloud storage: Google Drive, Dropbox private files

Why isn't it indexed?

  1. Password protection: Requires login credentials
  2. Paywalls: Subscription-based content
  3. No external links: Pages not linked from other sites
  4. Dynamic content: Generated on-the-fly based on user queries
  5. robots.txt exclusion: Website owners explicitly block search engines
Important

The Deep Web is NOT the Dark Web. Most of the Deep Web is completely legal and mundane.


3. Dark Web

What is it?

The Dark Web is a small portion of the Deep Web that has been intentionally hidden and is inaccessible through standard web browsers. It requires special software (like Tor) to access.

Key Characteristics:

  • Anonymity-focused: Both users and website operators remain anonymous
  • Special access required: Needs Tor Browser or similar tools
  • .onion domains: Special domain extension (e.g., example.onion)
  • Encrypted layers: Multiple layers of encryption
  • Not indexed: Cannot be found via Google or other search engines

Is the Dark Web illegal?

No, the Dark Web itself is not illegal. However, it can be used for both legal and illegal purposes.

Legitimate uses:
  • Whistleblowing: Journalists and activists in oppressive regimes
  • Privacy protection: People avoiding government surveillance
  • Freedom of speech: Bypassing censorship
  • Research: Academic and security research
  • Anonymous communication: Protecting identity in sensitive situations
Illegal uses (Avoid these):
  • Sale of illegal drugs
  • Weapons trafficking
  • Stolen data and credentials
  • Illegal pornography
  • Hacking services
  • Counterfeit currencies

What is Tor Browser?

The Onion Router (Tor)

Tor stands for "The Onion Router" - named after the layers of encryption it uses, like the layers of an onion.

How Tor Works:

Encryption layers:

  1. Your data is encrypted in multiple layers
  2. Passes through at least 3 random relay servers (nodes)
  3. Each node only knows the node before and after it
  4. No single node knows both the source and destination
  5. Makes tracking nearly impossible

Important Onion Websites (.onion)

Legitimate & Useful .onion Sites

note

.onion URLs change frequently. These are for educational purposes. Always verify links from trusted sources.

1. Search Engines

DuckDuckGo (Privacy-focused search)
https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion

Ahmia (Dark web search engine)
http://juhanurmihxlp77nkq76byazcldy2hlmovfu2epvl5ankdibsot4csyd.onion

Torch (Oldest search engine)
http://torchdeedp3i2jigzjdmfpn5ttjhthh5wbmda2rr3jvqjg5p77c54dqd.onion

2. News & Information

The New York Times
https://www.nytimesn7cgmftshazwhfgzm37qxb44r64ytbb2dj3x62d2lljsciiyd.onion

BBC News
https://www.bbcnewsd73hkzno2ini43t4gblxvycyac5aw4gnv7t2rccijh7745uqd.onion

ProPublica (Investigative journalism)
https://p53lf57qovyuvwsc6xnrppyply3vtqm7l6pcobkmyqsiofyeznfu5uqd.onion

3. Privacy & Security Tools

ProtonMail (Encrypted email)
https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion

Keybase (Encrypted messaging)
http://keybase5wmilwokqirssclfnsqrjdsi7jdir5wy7y7iu3tanwmtp6oid.onion

Riseup (Activist tools)
http://vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion

4. Social & Communication

Facebook
https://facebookwkhpilnemxj7asaniu7vnjjbiltxjqhye3mhbshg7kx5tfyd.onion

Reddit (Onion version)
https://old.reddittorjg6rue252oqsxryoxengawnmo46qy4kyii5wtqnwfj4ooad.onion

SecureDrop (Whistleblowing platform)
http://sdolvtfhatvsysc6l34d65ymdwxcujausv7k5jk4cy5ttzhjoi6fzvyd.onion

5. Libraries & Resources

The Hidden Wiki (Directory of onion sites)
http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion

Imperial Library (Free books)
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion

Comic Book Library
http://nv3x2jozywh63fkohn5mwp2d73vasusjixn3im3ueof52fmbjsigw6ad.onion

Safety Tips for Using Tor & Dark Web

⚠️ Critical Safety Measures

1. Never Use Your Real Identity

  • Don't log into personal accounts
  • Don't share personal information
  • Don't use your real name or email
  • Create anonymous identities if needed

2. Use VPN + Tor (Double Protection)

# Recommended flow:
Your Computer → VPN → Tor Network → Dark Web

# This adds an extra layer of anonymity

Recommended VPNs for Tor:

  • ProtonVPN (Switzerland-based, no-logs)
  • Mullvad (Anonymous sign-up, accepts cryptocurrency)
  • IVPN (Privacy-focused, open source)

3. Never Download Files

  • Files can contain malware
  • Downloads can reveal your IP address
  • PDFs can execute scripts
  • Images can have tracking pixels

4. Disable JavaScript

In Tor Browser:

Settings → Privacy & Security → Security Level → Safest

This blocks most attacks but may break some sites.

5. Don't Maximize Browser Window

  • Keep the default window size
  • Resizing can create a unique fingerprint
  • Makes you easier to track

6. Use HTTPS Whenever Possible

  • Look for the padlock icon
  • Even on .onion sites, HTTPS adds encryption
  • Use HTTPS Everywhere extension (included in Tor)

7. Never Enable Browser Plugins

  • No Flash, no Java, no ActiveX
  • These can reveal your real IP
  • Tor disables them by default - keep it that way

8. Cover Your Webcam

  • Malware can activate your camera
  • Use a physical cover or tape
  • Same for microphone (use headphones when needed)

⚖️ Know the Law

Using Tor is legal in most countries, but:

  • Illegal activities are still illegal (even on Tor)
  • Some countries ban or restrict Tor usage (China, Russia, Iran)
  • Your ISP can see that you're using Tor (but not what you're doing)
  • Law enforcement monitors Dark Web marketplaces
  • Downloading illegal content is prosecutable

Countries Where Tor is Restricted:

CountryStatusNotes
ChinaBlockedGreat Firewall blocks Tor
RussiaRestrictedOfficially banned since 2017
IranBlockedHeavy internet censorship
TurkeyIntermittentPeriodic blocks during political events
VenezuelaRestrictedGovernment monitoring
UAEBannedUsing VPNs/Tor for illegal activity is punishable

Myths vs. Reality

Common Misconceptions

❌ Myth: The Dark Web is 90% illegal content

✅ Reality: The Dark Web has many legitimate uses. Illegal content exists but is a smaller portion than media portrays.

❌ Myth: Tor makes you completely anonymous

✅ Reality: Tor provides strong anonymity but is not foolproof. Poor operational security (OPSEC) can compromise you.

❌ Myth: You'll get hacked just by visiting the Dark Web

✅ Reality: Simply browsing is generally safe if you follow security best practices. Don't click suspicious links or download files.

❌ Myth: The Dark Web is slow because it's far away

✅ Reality: It's slow because of the multiple encryption layers and relay nodes, not physical distance.


Technical Details: How .onion Addresses Work

Understanding Onion Addresses

Regular domain: www.example.com
Onion domain: thehiddenwiki3imaihg7pqxvsg5akz6ytjr6azhdv7qch43zku76goid.onion

Why are .onion addresses so long and random?

  • They are cryptographic hashes of the server's public key
  • 56 characters (for v3 onion addresses)
  • Impossible to guess or predict
  • Ensures authenticity and prevents spoofing

Version 2 vs. Version 3 Onion Addresses

FeatureV2 OnionV3 Onion
Length16 characters56 characters
Security80-bit256-bit
AlgorithmRSA 1024Ed25519
Example3g2upl4pq6kufc4m.onionthehiddenwiki...goid.onion
StatusDeprecated (2021)Current standard

⚠️ Important: Version 2 (.onion) addresses no longer work as of October 2021. Only use v3 addresses.


Practical Use Cases

When Should You Use Tor?

1. Journalism & Whistleblowing

  • Protect sources
  • Communicate securely
  • Access censored information

2. Political Activism

  • Organize protests in oppressive regimes
  • Share information without government monitoring
  • Protect identity of dissidents

3. Privacy Protection

  • Avoid corporate tracking
  • Prevent ISP monitoring
  • Research sensitive topics without judgment

4. Bypassing Censorship

  • Access blocked websites
  • Read international news
  • Use banned services

5. Research & Education

  • Study cybersecurity
  • Understand anonymity technologies
  • Academic research on dark web

Setting Up Secure Anonymous Identity

Creating a Secure Setup (Step-by-Step)

Step 1: Prepare Your System

# Update your system
sudo apt update && sudo apt upgrade -y

# Install VPN client (example: ProtonVPN)
sudo apt install protonvpn

# Connect to VPN
protonvpn connect --fastest

Step 2: Install Tor Browser

# Download and verify Tor Browser
# Always download from official site: https://www.torproject.org

Step 3: Configure Tor Settings

Recommended Tor Browser Settings:

  1. Security Level: Set to "Safest"

    • Settings → Privacy & Security → Security Level → Safest
  2. Disable JavaScript (if not already disabled by Safest mode)

  3. Clear cookies on close:

    • Settings → Privacy & Security → Cookies and Site Data → Delete cookies and site data when Tor Browser is closed
  4. Never remember history:

    • Settings → Privacy & Security → History → Never remember history
  5. Block third-party cookies:

    • Already enabled by default

Step 4: Test Your Anonymity

Visit these URLs in Tor Browser:

1. Check your Tor connection:
https://check.torproject.org

2. Check for IP leaks:
https://ipleak.net

3. Browser fingerprint test:
https://coveryourtracks.eff.org

Alternative Anonymous Networks

Beyond Tor

While Tor is the most popular, other anonymity networks exist:

1. I2P (Invisible Internet Project)

Focus: Anonymous hosting and communication
Protocol: Garlic routing (similar to onion routing)
Use case: P2P file sharing, anonymous websites
URL format: .i2p domains

2. Freenet

Focus: Censorship-resistant publishing
Method: Distributed data storage
Use case: Long-term data preservation
Access: Freenet client required

3. ZeroNet

Focus: Decentralized websites
Technology: Bitcoin cryptography + BitTorrent
Use case: Uncensorable websites
URL format: .bit domains

Red Flags & Scams to Avoid

🚨 Warning Signs

Never engage with:

  1. Sites selling illegal goods (drugs, weapons, stolen data)
  2. "Hitman" services (100% scams, also illegal)
  3. "Red rooms" (live torture streams - fake, designed to scam)
  4. Too-good-to-be-true offers (free money, drugs, hacking services)
  5. Sites asking for personal information
  6. Downloads offering "special access"
  7. Cryptocurrency "doublers" (send 1 BTC, get 2 back - scams)

Common Dark Web Scams:

Scam TypeHow It WorksHow to Avoid
Exit scamsMarket takes payment then disappearsOnly use escrow services
PhishingFake login pages steal credentialsVerify .onion URLs carefully
MalwareInfected downloadsNever download anything
Fake servicesTake payment, provide nothingResearch vendor reputation
ExtortionThreaten to reveal identityNever share personal info

Final Recommendations

Best Practices Summary

DO:

  • Use Tor for legitimate privacy needs
  • Keep Tor Browser updated
  • Use VPN + Tor for extra security
  • Verify .onion URLs from trusted sources
  • Stay skeptical of everything
  • Report illegal content to authorities

DON'T:

  • Engage in illegal activities
  • Download files from unknown sources
  • Maximize browser window
  • Use personal accounts
  • Trust anyone or anything blindly
  • Share personal information

Resources & Further Reading

Official Sources

  1. Tor Project Official Website
  2. Tor Browser Manual
  3. Electronic Frontier Foundation - Tor Guide

Educational Resources

  1. Books:

    • "The Dark Net" by Jamie Bartlett
    • "This Machine Kills Secrets" by Andy Greenberg
  2. Documentaries:

    • "Deep Web" (2015) - About Silk Road
    • "The Silk Road: Drugs, Death and the Dark Web" (2017)
  3. Podcasts:

    • Darknet Diaries
    • Malicious Life

Conclusion

The Dark Web is neither as dangerous as sensationalist media portrays, nor as safe as some advocates claim. It's a tool - neutral in itself, but powerful when used responsibly.

Key Takeaways:

  • The Dark Web is a small part of the Deep Web
  • Tor provides anonymity but requires careful use
  • Many legitimate uses exist for anonymous browsing
  • Illegal activities are still illegal, regardless of anonymity
  • Follow security best practices to stay safe
  • Use for privacy, not for illegal purposes

Stay safe, stay legal, and protect your privacy responsibly.

Disclaimer

This guide is for educational purposes only. The author does not condone or encourage illegal activities. Always comply with your local laws and regulations.