The dark web is the
World Wide Web
The World Wide Web (WWW or simply the Web) is an information system that enables Content (media), content sharing over the Internet through user-friendly ways meant to appeal to users beyond Information technology, IT specialists and hobbyis ...
content that exists on
darknets (
overlay networks) that use the
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
but require specific software, configurations, or
authorization
Authorization or authorisation (see American and British English spelling differences#-ise, -ize (-isation, -ization), spelling differences), in information security, computer security and identity management, IAM (Identity and Access Managemen ...
to access.
Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location.
The dark web forms a small part of the
deep web, the part of the web not
indexed by
web search engines, although sometimes the term ''deep web'' is mistakenly used to refer specifically to the dark web.
The darknets which constitute the dark web include small,
friend-to-friend networks, as well as large, popular networks such as
Tor,
Hyphanet,
I2P, and
Riffle operated by public organizations and individuals.
Users of the dark web refer to the regular web as
clearnet due to its
unencrypted nature. The Tor dark web or onionland
uses the traffic anonymization technique of
onion routing
Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to the layers of an onion. The encrypted data is transmitted through a series o ...
under the network's
top-level domain
A top-level domain (TLD) is one of the domain name, domains at the highest level in the hierarchical Domain Name System of the Internet after the root domain. The top-level domain names are installed in the DNS root zone, root zone of the nam ...
suffix
.onion.
Terminology
Definition
The dark web has often been confused with the
deep web, the parts of the web not indexed (searchable) by search engines. The term ''dark web'' first emerged in 2009; however, it is unknown when the actual dark web first emerged. Many internet users only use the ''
surface web'', data that can be accessed by a typical
web browser
A web browser, often shortened to browser, is an application for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's scr ...
.
The dark web forms a small part of the deep web, but requires custom software in order to access its content. This confusion dates back to at least 2009. Since then, especially in reporting on
Silk Road
The Silk Road was a network of Asian trade routes active from the second century BCE until the mid-15th century. Spanning over , it played a central role in facilitating economic, cultural, political, and religious interactions between the ...
, the two terms have often been conflated, despite recommendations that they should be distinguished.

The dark web, also known as darknet websites, are accessible only through networks such as
Tor ("The Onion Routing" project) that are created specifically for the dark web.
Tor browser and Tor-accessible sites are widely used among the darknet users and can be identified by the domain ".onion". Tor browsers create encrypted entry points and pathways for the user, allowing their dark web searches and actions to be anonymous.
Identities and locations of darknet users stay anonymous and cannot be tracked due to the layered
encryption
In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
system. The darknet encryption technology routes users' data through a large number of intermediate servers, which protects the users' identity and guarantees anonymity. The transmitted information can be decrypted only by a subsequent
node
In general, a node is a localized swelling (a "knot") or a point of intersection (a vertex).
Node may refer to:
In mathematics
* Vertex (graph theory), a vertex in a mathematical graph
*Vertex (geometry), a point where two or more curves, lines ...
in the scheme, which leads to the exit node. The complicated system makes it almost impossible to reproduce the node path and decrypt the information layer by layer.
Due to the high level of encryption, websites are not able to track
geolocation
Geopositioning is the process of determining or estimating the geographic position of an object or a person.
Geopositioning yields a set of Geographic coordinate system, geographic coordinates (such as latitude and longitude) in a given map datum ...
and IP of their users, and users are not able to get this information about the host. Thus, communication between darknet users is highly encrypted allowing users to talk, blog, and share files confidentially.
Content
A December 2014 study by Gareth Owen from the
University of Portsmouth found that the most commonly hosted type of content on Tor was
child pornography
Child pornography (also abbreviated as CP, also called child porn or kiddie porn, and child sexual abuse material, known by the acronym CSAM (underscoring that children can not be deemed willing participants under law)), is Eroticism, erotic ma ...
, followed by
black markets, while the individual sites with the highest traffic were dedicated to
botnet operations (see attached metric).
Many
whistleblowing sites maintain a presence as well as political discussion forums. Sites associated with
Bitcoin
Bitcoin (abbreviation: BTC; Currency symbol, sign: ₿) is the first Decentralized application, decentralized cryptocurrency. Based on a free-market ideology, bitcoin was invented in 2008 when an unknown entity published a white paper under ...
,
fraud
In law, fraud is intent (law), intentional deception to deprive a victim of a legal right or to gain from a victim unlawfully or unfairly. Fraud can violate Civil law (common law), civil law (e.g., a fraud victim may sue the fraud perpetrato ...
-related services, and
mail order services are some of the most prolific.
As of December 2020, the number of active Tor sites in .onion was estimated at 76,300 (containing a lot of copies). Of these, 18 000 would have original content.
In July 2017,
Roger Dingledine, one of the three founders of the Tor Project, said that
Facebook
Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
is the biggest hidden service. The dark web comprises only 3% of the traffic in the Tor network.
A February 2016 study from researchers at
King's College London
King's College London (informally King's or KCL) is a public university, public research university in London, England. King's was established by royal charter in 1829 under the patronage of George IV of the United Kingdom, King George IV ...
gives the following breakdown of content by an alternative category set, highlighting the illicit use of .onion services.
Ransomware
The dark web is also used in certain extortion-related processes. It is common to observe data from
ransomware
Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
attacks on several dark web sites, for example data sales sites or public data repository sites.
Botnets
Botnets are often structured with their
command-and-control servers based on a censorship-resistant hidden service, creating a large amount of bot-related traffic.
Darknet markets
Commercial
darknet markets mediate transactions for illegal goods and typically use Bitcoin as payment.
These markets have attracted significant media coverage, starting with the popularity of
Silk Road
The Silk Road was a network of Asian trade routes active from the second century BCE until the mid-15th century. Spanning over , it played a central role in facilitating economic, cultural, political, and religious interactions between the ...
and Diabolus Market and its subsequent seizure by legal authorities. Silk Road was one of the first dark web marketplaces that emerged in 2011 and has allowed for the trading of illegal
drugs
A drug is any chemical substance other than a nutrient or an essential dietary ingredient, which, when administered to a living organism, produces a biological effect. Consumption of drugs can be via inhalation, injection, smoking, ingestio ...
,
weapons
A weapon, arm, or armament is any implement or device that is used to deter, threaten, inflict physical damage, harm, or kill. Weapons are used to increase the efficacy and efficiency of activities such as hunting, crime (e.g., murder), law ...
and
identity fraud resources.
These markets have no protection for its users and can be closed down at any time by authorities.
Despite the closures of these marketplaces, others pop up in their place.
As of 2020, there have been at least 38 active dark web market places, even though there can be many more.
These marketplaces are similar to that of
eBay
eBay Inc. ( , often stylized as ebay) is an American multinational e-commerce company based in San Jose, California, that allows users to buy or view items via retail sales through online marketplaces and websites in 190 markets worldwide. ...
or
Craigslist where users can interact with sellers and leave reviews about marketplace products.
Examination of price differences in dark web markets versus prices in real life or over the World Wide Web have been attempted as well as studies in the quality of goods received over the dark web. One such study was performed on Evolution, one of the most popular
crypto-markets active from January 2013 to March 2015.
Although it found the digital information, such as concealment methods and shipping country, "seems accurate", the study uncovered issues with the quality of illegal drugs sold in Evolution, stating that, "the illicit drugs purity is found to be different from the information indicated on their respective listings."
Less is known about consumer motivations for accessing these marketplaces and factors associated with their use. Darknets markets also sell leaked credit cards that can be downloaded for free or purchased for use in illegal activities.
Bitcoin services
Bitcoin
Bitcoin (abbreviation: BTC; Currency symbol, sign: ₿) is the first Decentralized application, decentralized cryptocurrency. Based on a free-market ideology, bitcoin was invented in 2008 when an unknown entity published a white paper under ...
is one of the main cryptocurrencies used in dark web marketplaces due to the flexibility and relative anonymity of the currency.
With bitcoin, people can hide their intentions as well as their identity.
A common approach was to use a
digital currency exchanger
A cryptocurrency exchange, or a digital currency exchange (DCE), is a business that allows customers to trade cryptocurrencies or digital currencies for other assets, such as conventional fiat money or other digital currencies. Exchanges may accep ...
service which converted bitcoin into an online game currency (such as gold coins in
World of Warcraft
''World of Warcraft'' (''WoW'') is a 2004 massively multiplayer online role-playing (MMORPG) video game developed and published by Blizzard Entertainment for Windows and Mac OS X. Set in the '' Warcraft'' fantasy universe, ''World of War ...
) that will later be converted back into fiat currency.
Bitcoin
Bitcoin (abbreviation: BTC; Currency symbol, sign: ₿) is the first Decentralized application, decentralized cryptocurrency. Based on a free-market ideology, bitcoin was invented in 2008 when an unknown entity published a white paper under ...
services such as
tumblers are often available on
Tor, and some – such as
Grams – offer darknet market integration. A research study undertaken by Jean-Loup Richet, a research fellow at
ESSEC, and carried out with the
United Nations Office on Drugs and Crime
The United Nations Office on Drugs and Crime (UNODC; French language, French: ''Office des Nations unies contre la drogue et le crime'') is a United Nations office that was established in 1997 as the Office for Drug Control and Crime Prevention ...
, highlighted new trends in the use of bitcoin tumblers for
money laundering
Money laundering is the process of illegally concealing the origin of money obtained from illicit activities (often known as dirty money) such as drug trafficking, sex work, terrorism, corruption, and embezzlement, and converting the funds i ...
purposes, using
escrows.
Due to its relevance in the digital world, bitcoin has become a popular product for users to scam companies with.
Cybercriminal groups such as DDOS"4" have led to over 140 cyberattacks on companies since the emergence of bitcoins in 2014.
These attacks have led to the formation of other cybercriminal groups as well as Cyber Extortion.
Hacking groups and services
Many
hackers sell their services either individually or as a part of groups. Such groups include
xDedic,
hackforum, Trojanforge,
Mazafaka,
dark0de and the
TheRealDeal darknet market. Some have been known to
track and
extort apparent pedophiles. Cyber crimes and hacking services for financial institutions and banks have also been offered over the dark web. Attempts to monitor this activity have been made through various government and private organizations, and an examination of the tools used can be found in the ''Procedia Computer Science'' journal. Use of Internet-scale DNS distributed reflection denial of service (
DRDoS) attacks have also been made through leveraging the dark web. There are many scam .onion sites also present which end up giving tools for download that are infected with
trojan horses or
backdoors.
Recently, around 100,000 compromised ChatGPT users' login information was sold on the dark web in 2023. Additionally, the logs showed, in the opinion of the researchers, that the majority of the compromised ChatGPT passwords had been extracted by the data-stealing virus Raccoon.
Financing and fraud
Scott Dueweke the president and founder of Zebryx Consulting states that Russian electronic currency such as WebMoney and Perfect Money are behind the majority of the illegal actions.
In April 2015, Flashpoint received a 5 million dollar investment to help their clients gather intelligence from the deep and dark web. There are numerous
carding forums,
PayPal
PayPal Holdings, Inc. is an American multinational financial technology company operating an online payments system in the majority of countries that support E-commerce payment system, online money transfers; it serves as an electronic alter ...
and
bitcoin
Bitcoin (abbreviation: BTC; Currency symbol, sign: ₿) is the first Decentralized application, decentralized cryptocurrency. Based on a free-market ideology, bitcoin was invented in 2008 when an unknown entity published a white paper under ...
trading websites as well as fraud and counterfeiting services. Many such sites are scams themselves.
Phishing via cloned websites and other
scam
A scam, or a confidence trick, is an attempt to defraud a person or group after first gaining their Trust (emotion), trust. Confidence tricks exploit victims using a combination of the victim's credulity, naivety, compassion, vanity, confidence ...
sites are numerous, with
darknet markets often advertised with fraudulent URLs.
Illegal pornography
The type of content that has the most popularity on the dark web is illegal pornography—more specifically,
child pornography
Child pornography (also abbreviated as CP, also called child porn or kiddie porn, and child sexual abuse material, known by the acronym CSAM (underscoring that children can not be deemed willing participants under law)), is Eroticism, erotic ma ...
.
About 80% of its web traffic is related to accessing child pornography despite it being difficult to find even on the dark web.
A website called
Lolita City, which has since been taken down, contained over 100 GB of child pornographic media and had about 15,000 members.
There is regular
law enforcement
Law enforcement is the activity of some members of the government or other social institutions who act in an organized manner to enforce the law by investigating, deterring, rehabilitating, or punishing people who violate the rules and norms gove ...
action against sites distributing child pornography – often via compromising the site and tracking users'
IP address
An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
es. In 2015, the FBI investigated and took down a website called
Playpen.
At the time, Playpen was the largest child pornography website on the dark web with over 200,000 members.
Sites use complex systems of guides, forums and community regulation. Other content includes
sexualised torture and killing of animals and
revenge porn. In May 2021,
German police said that they had dismantled one of the world's biggest child pornography networks on the dark web known as
Boystown; the website had over 400,000 registered users. Four people had been detained in raids, including a man from
Paraguay
Paraguay, officially the Republic of Paraguay, is a landlocked country in South America. It is bordered by Argentina to the Argentina–Paraguay border, south and southwest, Brazil to the Brazil–Paraguay border, east and northeast, and Boli ...
, on suspicion of running the network.
Europol
Europol, officially the European Union Agency for Law Enforcement Cooperation, is the law enforcement agency of the European Union (EU). Established in 1998, it is based in The Hague, Netherlands, and serves as the central hub for coordinating c ...
said several pedophile chat sites were also taken down in the German-led intelligence operation.
Terrorism
Terrorist organizations took to the internet as early as the 1990s; however, the birth of the dark web attracted these organizations due to the anonymity, lack of regulation, social interaction, and easy accessibility.
These groups have been taking advantage of the chat platforms within the dark web to inspire terrorist attacks.
Groups have even posted "How To" guides, teaching people how to become and hide their identities as terrorists.
The dark web became a forum for terrorist propaganda, guiding information, and most importantly, funding.
With the introduction of Bitcoin, an anonymous transactions were created which allowed for anonymous donations and funding.
By accepting Bitcoin, terrorists were now able to fund purchases of weaponry.
In 2018, an individual named Ahmed Sarsur was charged for attempting to purchase explosives and hire snipers to aid Syrian terrorists, as well as attempting to provide them financial support, all through the dark web.
There are at least some real and fraudulent websites claiming to be used by
ISIL (ISIS), including a fake one seized in
Operation Onymous. With the increase of technology, it has allowed cyber terrorists to flourish by attacking the weaknesses of the technology. In the wake of the
November 2015 Paris attacks, an actual such site was hacked by an
Anonymous
Anonymous may refer to:
* Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown
** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author
* Anonym ...
-affiliated hacker group,
GhostSec, and replaced with an advert for
Prozac. The
Rawti Shax Islamist group was found to be operating on the dark web at one time.
Social media
Within the dark web, there exists emerging social media platforms similar to those on the World Wide Web, this is known as the Dark Web Social Network (DWSN).
The DWSN works a like a regular social networking site where members can have customizable pages, have friends, like posts, and blog in forums.
Facebook
Facebook is a social media and social networking service owned by the American technology conglomerate Meta Platforms, Meta. Created in 2004 by Mark Zuckerberg with four other Harvard College students and roommates, Eduardo Saverin, Andre ...
and other traditional social media platforms have begun to make dark-web versions of their websites to address problems associated with the traditional platforms and to continue their service in all areas of the World Wide Web.
Unlike Facebook, the privacy policy of the DWSN requires that members are to reveal absolutely no personal information and remain anonymous.
Hoaxes and unverified content
There are reports of
crowdfunded assassinations and
hitmen for hire;
however, these are believed to be exclusively scams. The creator of
Silk Road
The Silk Road was a network of Asian trade routes active from the second century BCE until the mid-15th century. Spanning over , it played a central role in facilitating economic, cultural, political, and religious interactions between the ...
,
Ross Ulbricht, was arrested by Homeland Security investigations (HSI) for his site and allegedly hiring a hitman to kill six people, although the charges were later dropped. There is an
urban legend
Urban legend (sometimes modern legend, urban myth, or simply legend) is a genre of folklore concerning stories about an unusual (usually scary) or humorous event that many people believe to be true but largely are not.
These legends can be e ...
that one can find
live murder on the dark web. The term "''Red Room''" has been coined based on the Japanese animation and urban legend of the same name; however, the evidence points toward all reported instances being
hoax
A hoax (plural: hoaxes) is a widely publicised falsehood created to deceive its audience with false and often astonishing information, with the either malicious or humorous intent of causing shock and interest in as many people as possible.
S ...
es.
On June 25, 2015, the
indie game ''
Sad Satan'' was reviewed by YouTubers ''Obscure Horror Corner'' which they claimed to have found via the dark web. Various inconsistencies in the channel's reporting cast doubt on the reported version of events.
There are several websites which analyze and monitor the deep web and dark web for threat intelligence.
Policing the dark web
There have been arguments that the dark web promotes civil liberties, like "free speech, privacy, anonymity".
Some prosecutors and government agencies are concerned that it is a haven for
criminal activity. The deep and dark web are applications of integral internet features to provide privacy and anonymity. Policing involves targeting specific activities of the private web deemed illegal or subject to
internet censorship.
When investigating online suspects, police typically use the IP (Internet Protocol) address of the individual; however, due to Tor browsers creating anonymity, this becomes an impossible tactic.
As a result, law enforcement has employed many other tactics in order to identify and arrest those engaging in illegal activity on the dark web.
OSINT, or Open Source Intelligence, are data collection tools that legally collect information from public sources.
OSINT tools can be dark web specific to help officers find bits of information that would lead them to gaining more knowledge about interactions going on in the dark web.
In 2015 it was announced that
Interpol
The International Criminal Police Organization – INTERPOL (abbreviated as ICPO–INTERPOL), commonly known as Interpol ( , ; stylized in allcaps), is an international organization that facilitates worldwide police cooperation and crime cont ...
now offers a dedicated dark web training program featuring technical information on Tor,
cybersecurity
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
and simulated darknet market takedowns. In October 2013 the UK's
National Crime Agency
The National Crime Agency (NCA) is a Law enforcement agency#natlea, national law enforcement agency in the United Kingdom. It is the UK's lead agency against organised crime; Human trafficking, human, Arms trafficking, weapon and Illegal drug t ...
and
GCHQ
Government Communications Headquarters (GCHQ) is an intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance (IA) to the government and armed forces of the United Kingdom. Primar ...
announced the formation of a "
Joint Operations Cell" to focus on cybercrime. In November 2015 this team would be tasked with tackling child exploitation on the dark web as well as other cybercrime. In March 2017 the
Congressional Research Service
The Congressional Research Service (CRS) is a public policy research institute of the United States Congress. Operating within the Library of Congress, it works primarily and directly for members of Congress and their committees and staff on a ...
released an extensive report on the dark web, noting the changing dynamic of how information is accessed and presented on it; characterized by the unknown, it is of increasing interest to researchers, law enforcement, and policymakers.
In August 2017, according to reportage, cybersecurity firms which specialize in monitoring and researching the dark web on behalf of banks and retailers routinely share their findings with the
FBI
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
and with other law enforcement agencies "when possible and necessary" regarding illegal content. The Russian-speaking underground offering a crime-as-a-service model is regarded as being particularly robust.
Journalism
Many
journalist
A journalist is a person who gathers information in the form of text, audio or pictures, processes it into a newsworthy form and disseminates it to the public. This is called journalism.
Roles
Journalists can work in broadcast, print, advertis ...
s, alternative
news organizations, educators, and researchers are influential in their writing and speaking of the darknet, and making its use clear to the general public. Media coverage typically reports on the dark web in two ways; detailing the power and freedom of speech the dark web allows people to express, or more commonly reaffirms the illegality and fear of its contents, such as computer hackers.
Many headlines tie the dark web to child pornography with headlines such as, "N.J. man charged with surfing 'Dark Web' to collect nearly 3K images of child porn", along with other illegal activities where news outlets describe it as "a hub for black markets that sell or distribute drugs".
Specialist
Clearweb news sites such as
DeepDotWeb and
All Things Vice provide news coverage and practical information about dark web sites and services; however,
DeepDotWeb was shut down by authorities in 2019.
The Hidden Wiki and its
mirrors and
forks hold some of the largest
directories of content at any given time. Traditional media and news channels such as
ABC News ABC News most commonly refers to:
* ABC News (Australia), a national news service of the Australian Broadcasting Corporation
* ABC News (United States), a news-gathering and broadcasting division of the American Broadcasting Company
ABC News may a ...
have also featured articles examining the darknet.
See also
*
List of Tor onion services
*
Tor (network)
Tor is a free overlay network for enabling anonymous communication. It is built on free and open-source software run by over seven thousand volunteer-operated relays worldwide, as well as by millions of users who route their Internet traf ...
References
External links
Excuse Me, I Think Your Dark Web is Showing – A presentation at the March 2017 BSides Vancouver Security Conference on security practices on Tor's hidden servicesAttacks Landscape in the Dark Side of the Web
{{I2P