What Is the Dark Web?
The internet is commonly divided into three layers: the surface web (indexed by search engines), the deep web (not indexed but accessible via direct URL - Like email inboxes, banking portals, and paywalled content), and the dark web (requires special software to access, primarily Tor, and is intentionally hidden from standard indexing). The dark web is not inherently illegal, but its anonymity properties attract both legitimate privacy use cases and criminal activity. For context on the privacy tools involved, see the Tor vs VPN comparison.
Surface Web vs Deep Web vs Dark Web
| Layer | Accessible Via | Indexed by Search Engines? | Size (estimated) | Examples |
|---|---|---|---|---|
| Surface Web | Any browser | Yes | ~5% of total internet | Wikipedia, news sites, e-commerce |
| Deep Web | Any browser (with URL/login) | No | ~90–95% of total internet | Email, cloud storage, banking, medical records |
| Dark Web | Tor Browser, I2P, Freenet | No | ~0.01% of total internet | .onion sites, privacy forums, whistleblower platforms |
How Tor Onion Routing Works
Tor (The Onion Router) routes your traffic through at least three volunteer-operated relay nodes (entry, middle, and exit). Each relay decrypts only one layer of encryption, learning only the previous and next node - Never both the origin and the destination. The destination server (or .onion service) sees only the exit node's IP, not yours. This multi-hop architecture provides strong anonymity at the cost of speed.
Legitimate Uses of the Dark Web
- Journalists and activists in authoritarian countries use .onion sites to communicate and publish content without government surveillance.
- Whistleblowing platforms (SecureDrop) allow sources to submit documents to media organisations anonymously.
- Privacy-focused versions of mainstream services: The New York Times, BBC, and Facebook all operate official .onion mirrors.
- Security researchers use the dark web to monitor threat intelligence and track criminal marketplaces.
- Tor is also used by everyday users in countries with heavy internet censorship (China, Iran, Russia) to access the open web.
How to Stay Safe
If you access the dark web for legitimate purposes, use only the official Tor Browser (not modified versions), keep JavaScript disabled, never log into personal accounts, and never download files. Using a VPN before connecting to Tor (VPN-over-Tor) hides Tor usage from your ISP, though it does not increase anonymity at the destination. Also be aware that browser fingerprinting can still identify you if you modify the default Tor Browser settings.