Skip to content

Basics of Darkweb

  1. Dark Web Overview

    • The Dark Web is a hidden portion of the internet that cannot be accessed through standard browsers or indexed by conventional search engines. It exists within encrypted network overlays that provide anonymity for both clients and services.
  2. Relationship to Deep Web and Surface Web

    • Surface Web: Public, indexable web content accessible through normal browsers and search engines.

    • Deep Web: Any internet data not indexed by search engines (e.g., private databases, login-protected sites).

    • Dark Web: A subset of the Deep Web requiring special protocols and clients (e.g., Tor, I2P).


  1. Definition of Darknet

    • A darknet is an overlay network that allows devices to communicate only if specific configurations or software are used. It frequently relies on anonymizing technologies rather than the open public internet.
  2. Major Darknets

    • Tor (The Onion Router): Most widely used network for accessing dark web content with anonymity.

    • I2P (Invisible Internet Project): Focused on encrypted internal communication between peers (peer-to-peer services). 

    • Freenet: A distributed data store offering anonymity by fragmenting and distributing data across participating nodes.


  1. Tor Network Fundamentals

    • Tor enables anonymous communication by routing traffic through multiple volunteer-run nodes and encrypting data at each hop.
  2. Onion Routing Principles

    • Layered Encryption: Data packets are wrapped in several encryption layers, where each layer is removed (“peeled”) by a successive Tor node. The process obfuscates origin and destination.

    • Circuit Construction: Tor selects a sequence of nodes (entry, middle, exit) to form an encrypted path for data exchange. 

    • Exit Nodes: The final relay in the Tor circuit where data leaves the Tor network to access the clear internet (only if the destination is not within Tor).

  3. Tor Browser

    • A hardened web browser configured to use Tor for all traffic, preventing leaks of identifying information.

2.3 Alternative Routing: I2P and Garlic Routing

Section titled “2.3 Alternative Routing: I2P and Garlic Routing”
  1. I2P (Invisible Internet Project)

    • A darknet network that emphasizes internal traffic encryption and decentralized routing between peers. It compartmentalizes services as “eepsites.”
  2. Garlic Routing

    • An evolution of onion routing where multiple messages (cloves) are encrypted together, improving anonymity and efficiency. This method is central to I2P’s privacy model. 

3. Addressing, Naming, and Protocol Layers

Section titled “3. Addressing, Naming, and Protocol Layers”
  1. Onion and Eepsite Addresses

    • Tor hidden services use non-standard domain names (e.g., “.onion”) that are unresolvable by public DNS and reachable only with Tor.

    • I2P websites use unique addresses typically ending with “.b32.i2p”, reflecting their internal naming resolution.

  2. Transport Layer and Encryption

    • Networks like Tor and I2P wrap application layer traffic in multiple encryption layers, ensuring confidentiality and obscurity of routing metadata.

  1. Encryption Layers

    • Multiple layers of encryption protect the source and destination from intermediate relays.
  2. Distributed Relays

    • Traffic passes through random nodes run by volunteers, reducing correlation between inbound and outbound traffic.
  3. Exit Node Dynamics

    • Whilst Tor exit nodes conceal user origin, traffic exiting the Tor network may be unencrypted if not secured at the application layer.

5. Common Misconceptions (Technical Clarifications)

Section titled “5. Common Misconceptions (Technical Clarifications)”
  1. Dark Web Is Not Entire Internet

    • It is a small segment of internet content, contrary to popular belief.
  2. Not Intrinsically Illegal

    • Use of anonymity protocols and access to dark web networks is not illegal in most jurisdictions. The legality depends on the activity performed.
  3. Search Engines Cannot Index It

    • The dark web’s architecture and addressing system inherently prevents indexing by conventional search tools.

  1. Privacy Preservation

    • Tools like Tor are critical for users in restrictive environments to bypass censorship and protect communication.
  2. Secure Whistleblowing

    • Platforms (e.g., SecureDrop) rely on anonymity networks for confidential submission channels.
  1. Underground Markets

    • Historically, the dark web has hosted markets for illicit trade due to anonymity and decentralized protocols.
  2. Data Dumps and Exploit Sharing

    • Encrypted forums and repositories may host stolen data or malware kits.

 

Practical Point-of-View (Technical & Operational)

Section titled “Practical Point-of-View (Technical & Operational)”
  1. Specialized Client Requirement

    • Dark web networks are not reachable via standard TCP/IP browsing alone.

    • Practical access requires:

      • Tor Browser (for .onion services)

      • I2P Router + browser proxy (for .i2p services)

  2. Browser Hardening

    • Tor Browser disables:

      • WebRTC

      • Canvas fingerprinting

      • Persistent cookies

    • JavaScript is sandboxed and configurable via Security Levels, which directly affect usability vs anonymity.

  3. Operating System Choice

    • Privacy-focused users often operate via:

      • Live OS (e.g., amnesic systems)

      • Virtual machines for compartmentalization

    • Separation of identities is a core operational requirement, not an optional enhancement.


  1. Latency and Performance

    • Onion routing introduces high latency due to:

      • Multiple hops

      • Cryptographic overhead

      • Volunteer relay congestion

    • Real-world implication:

      • Streaming, real-time gaming, and VoIP are impractical.
  2. Traffic Behavior

    • Tor traffic appears as encrypted TLS-like flows.

    • ISPs can detect Tor usage but cannot see content or destinations.

    • Obfsproxy / pluggable transports are used where Tor is censored.

  3. Exit Node Reality

    • Exit nodes can observe unencrypted outbound traffic.

    • Practical rule:

      • Assume everything leaving Tor without HTTPS is visible.

      • End-to-end encryption remains mandatory.


3. Hosting Hidden Services (Real-World Perspective)

Section titled “3. Hosting Hidden Services (Real-World Perspective)”
  1. Service Deployment

    • Dark web services run similarly to clearnet services:

      • Web servers (Apache, Nginx)

      • Databases

      • Application backends

    • Difference:

      • No public IP exposure

      • No DNS

      • Address derived from cryptographic keys

  2. Address Persistence

    • .onion addresses are cryptographically bound to the service key.

    • Losing the private key = losing the identity permanently.

  3. Operational Security (OpSec)

    • Common mistakes in practice:

      • Mixed clearnet/darknet admin access

      • Reused usernames or SSH keys

      • Time-correlated activity patterns

    • Hosting anonymity fails more often due to human error, not cryptography.


  1. Anonymity ≠ Invisibility

    • Tor hides network identity, not behavior.

    • Correlation attacks target:

      • Login patterns

      • Writing style

      • Time zones

      • Browser fingerprints

  2. Account Separation

    • Practical anonymity requires:

      • Separate personas

      • Separate environments

      • No cross-authentication

    • Even metadata reuse can de-anonymize users.

  3. Persistence Risks

    • Long-term usage increases fingerprintability.

    • Operational best practice:

      • Rotate circuits

      • Restart sessions

      • Avoid long-lived identities unless required


  1. Threat Sources

    • Malicious exit nodes

    • Honeypot hidden services

    • Compromised relays

    • Client-side exploits (browser, plugins)

  2. Common Attack Vectors

    • JavaScript exploitation

    • Malicious downloads

    • Phishing via cloned onion sites

    • Deanonymization via application-layer leaks

  3. Defense-in-Depth

    • Tor only protects transport anonymity

    • Additional layers required:

      • OS isolation

      • Application hardening

      • Strong cryptography

      • Minimal attack surface


AspectTorI2P
Primary UseWeb access + servicesInternal peer services
RoutingOnion routingGarlic routing
PerformanceSlower, globalFaster internally
External AccessYesLimited
Learning CurveLowerHigher

Practical takeaway:

  • Tor is more user-friendly and widely supported.

  • I2P is more specialized and community-centric.


  1. Journalism & Whistleblowing

    • Secure submission systems

    • Anonymous communication channels

    • Protection against source tracing

  2. Research & Threat Intelligence

    • Monitoring underground forums

    • Malware research

    • Data leak intelligence

  3. Censorship Resistance

    • Access to blocked content

    • Publishing without centralized control


8. Practical Misconceptions (Reality Check)

Section titled “8. Practical Misconceptions (Reality Check)”
  1. “Tor makes you anonymous automatically”

    • False — anonymity is operational, not automatic.
  2. “VPN + Tor guarantees safety”

    • Misconfigured VPNs can increase risk.
  3. “Dark web is only for criminals”

    • Technically inaccurate and operationally misleading.

  • Dark web security is process-driven, not tool-driven.

  • Cryptography is strong; human behavior is weak.

  • Anonymity degrades over time without discipline.

  • Darknets protect routing—not applications, content, or intent.