The internet is huge, with an almost infinite number of connections and pages. Some of it is only accessible by a specialized web browser and is made up of hidden sites that can’t be found with a conventional search engine. This part of the internet is called the dark web; learn how to access it and what you might find there.
Why is it Called the Dark Web?
The internet exists on different levels. The surface web contains the pages you might regularly browse. The deep web is made of pages that can be accessed with a regular browser but are usually behind a paywall or require login credentials. The dark web is a part of the internet that is intentionally hidden. It cannot be reached with regular search engines or browsers, and instead requires the use of specialized software.
The dark web provides anonymity by keeping all communication private. This happens due to encryption and routing content through multiple web servers to keep its true origin hidden. Accessing the dark web requires software that keeps things anonymous, and the term “dark web” is a nod to the fact that things are hidden and secretive.
The dark web may be painted as an ominous forum for criminals, but that is not necessarily true. It can be abused or appreciated for what it is: an anonymous space on the internet. It is true that a fair amount of illegal activity takes place on the dark web, but there are also a number of perfectly legitimate reasons to use it.
Microsoft Defender
Stay safer online with one easy-to-use app1
1Microsoft 365 Personal or Family subscription required; app available as separate download
The dark web is generally reached by using dedicated software called Tor, which is an acronym for “The Onion Router.” Tor itself is not the dark web, but instead a means to access both the open web (what we traditionally think of as the internet) and the dark web without activity or identity being tracked.
Tor is free to download and functions by heavily wrapping each sender’s communications in layers of protective encryption. These layers of protection act like the layers of an onion, which is how Tor got its name.
When a person browsing the dark web searches for something, that search does not immediately reach its intended destination. Instead, it is sent through an elaborate relay of other computers operated by Tor users. Each time the message passes through a new computer, a level of encryption is removed, but the entire relay can be very difficult to track. People may use the Tor browser to access the dark web itself and might conduct their actual searches on a search engine like DuckDuckGo because of its focus on privacy for the user.
Lastly, there are dark websites that can only be accessed with a dark web browser. The URLs for these sites are seemingly random strings of letters and numbers and do not appear to be anything like a URL on the surface web.
Why do People Use the Dark Web?
There are three main reasons why people may seek access to the dark web:
Anonymity
An individual may have many reasons to want to conceal their identity. In countries where the government prohibits free press or imposes political censorship, the dark web may help some express their views. When journalists are seeking sources for stories, those sources may request communication through the dark web to hide their identities.
Others who have been victim to cyberstalking or are concerned about the security of online banking may use the dark web to keep their information private. Anonymity can certainly lend itself to illegal activity, but many visitors to the dark web primarily use it to browse the web without worrying about identity theft.
Hidden Services
A hidden service, or “onion service,” is one where a website and the individual attempting to access it have their identities hidden by Tor. The site’s IP address is unable to be verified which means that information about its host, content, and location is hidden. These hidden services frequently have a name that ends with “.onion.”
Tor itself is not a hidden service. Instead, it hosts a number of websites that are considered hidden services. They can be used legitimately, for whistleblowing or sharing sensitive information, but may also have more illicit means. There are hidden services for everything from firearms to pornography.
Illegal Activity
If you can dream up an illegal activity, it probably exists on the internet. But on the dark web, it may simply be harder to trace who is participating in said activity. A 2016 report of the dark web found that visitors could buy and sell drugs, guns, passwords, credit card numbers and other types of personal information.
The dark web once played host to a major black market for illegal drugs. Known as Silk Road, this hidden service was shut down by the FBI in 2013. Those who are looking to purchase a firearm might find that it’s relatively easy to do so on the dark web. While nearly 60% of the guns for sale originate in the United States, most of the purchasing occurs in Europe.
Those who are concerned about their personal data being stolen might be right. Usernames and passwords for nearly every streaming service are regularly bought and sold. Stolen credit cards also circulate on the dark web. Sometimes this information is sold to other thieves who might use it to rack up thousands of dollars of fraudulent purchases. Credit card fraud isn’t the only kind of illegal financial activity that occurs on the dark web; stolen bank account numbers and passwords are also in circulation. The anonymity of the dark web lends itself well to those who would seek to do financial harm to others.
Stay Safe While Using the Dark Web
It’s important to be aware of the risks of surfing the dark web. While the allure of visiting a less than reputable website on a Tor browser might be strong, know that there can be real life consequences. Many sites are monitored by the government, especially after Silk Road was taken down. Even if you’re just there to look, this may attract unwanted attention from authorities.
If you do plan to go online with a Tor browser, make sure that you’ve taken steps to protect yourself and follow these tips to safely access the dark web:
Mind your identity. Don’t give out any details which can be tied to your identity. Create throwaway accounts and usernames with fake names. Don’t use anything that can be used to identify you in real life or online.
Trust your gut. If a situation, conversation, or transaction doesn’t feel right, don’t stick around. Watch who you talk to and what you say.
Avoid downloads. While a robust antivirus program might offer some peace of mind, malware infection is a very real threat on the dark web.
Monitor your identity and finances. Learn if your personal or financial information has been compromised and take extra steps to keep that information safe.
While the dark web might hold an allure for adults, it’s not an appropriate place for kids. Talk to your kids about internet safety and make sure that they’re always properly monitored when they go online.
Get started with Microsoft 365
It’s the Office you know, plus the tools to help you work better together, so you can get more done—anytime, anywhere.
Identify and stop a CEO fraud attack with these tips. Learn how this scam, sometimes known as whale fishing, is aimed at company executives and how to master CEO fraud detection.
Recognize questionable behavior on social media such as off-putting and automated messages. Learn why this behavior may be a sign of social media bots and other indicators.