# The Dark Web

A very basic intro and setup guide of the dark web based on Tor


# At the very start...

This article is just a guide and introduction of what the dark web is and how do we get basic access to this proportion of the internet. No illegal purposes are allowed and it is completely not encouraged to access any dangerous or even illegal websites in the dark web. Keeps your eyes bright and stay away from anything dirty.

legality.png


# Three Layers of the Internet

The internet is often conceptualized in three distinct layers: the surface web, the deep web, and the dark web, each with unique characteristics and functions.

Web-layer.webp

The surface web, the most familiar layer, includes all websites indexed by search engines like Google, Bing, and Yahoo. It consists of publicly accessible content such as news sites, social media platforms, blogs, and e-commerce sites. This layer is user-friendly and forms a small fraction of the total internet content, despite its extensive daily use.

Beneath the surface web lies the deep web, a vast expanse of data not indexed by standard search engines. It includes private databases, academic resources, medical records, and subscription-based content. Access often requires specific credentials or permissions, such as account login. Interestingly, the deep web comprises about 90% of the entire internet, underscoring its immense scale and importance.

The dark web, the innermost layer, is a subset of the deep web accessible only through specialized browsers like Tor. This layer is notorious for its anonymity and privacy. The dark web provides a secure platform for free expression, confidential communication and the exchange of information that can be critical for privacy concern or even personal safety. However, its privacy also makes it associated with illegal activities, such as drug trafficking, illegal arms sales, and cybercrime.

I2P-vs-Tor.png

Within the dark web, internet services are provided on a variety of specialized networks, such as Tor and I2P. This article will focus on the dark web established using Tor.


# The Tor Network

# Overview

Tor, the renowned privacy-focused network, operates as a sophisticated mixnet to protect users' anonymity. At its core, Tor utilizes a global network of volunteer-operated nodes (currently 11362 nodes listed) to secure internet communications.

Tor-logo-2011-flat.svg.png


# Structure

In the tor internet, various .onion sites are set up. These websites live completely in the tor web and usually have a long & random link so that you can't easily find it.

When a user connects to a website through Tor, the user's data is routed through a series of three randomly selected nodes, creating a virtual encrypted tunnel. This tunnel safeguards the user's identity by concealing their IP address from the destination server. The request made by the user travels through these nodes, and the response is routed back through the same encrypted path, ensuring that the server never sees the user's IP address.

tor.png

The Tor network comprises three types of nodes: Guard nodes, middle nodes (or relays), and exit nodes, each serving a distinct function. Guard nodes are the first point of entry into the Tor network. They are selected infrequently to reduce the risk of attackers deducing a user's IP address. Middle nodes, or relays, act as intermediaries, preventing direct correlation between the initial and final nodes. Finally, exit nodes represent the last segment of the encrypted tunnel, connecting users to the public internet or clearnet. These nodes handle a high volume of requests, retrieving data from websites and delivering it back to users while maintaining the confidentiality of their IP addresses.


# How is an internet service transmitted

Tor-tunnel.webp

When the user request for a certain Internet service, the local tor browser will add three layers of encryption onto the information, so that the local service provide (ISP) has no idea what you are asking for. The encrypted information will then be sent to the guard node, or the entry node, which decrypts the first layer of the encryption. The information will then be sent from the guard node to the middle nodes, which again decrypts another layer. The exit node will then receive the information (1 layer encrypted), decrypt it to see the request and connect to the broader clearnet for the content. The exit node will then send your service back along the tunnel, reversing the encrytion-decryption sequence, before your computer receives information and unlocks them for access.

Just like an onion has multiple layers, the Tor network uses multiple layers of encryption. Each layer is decrypted at a different node, revealing the next layer, akin to peeling away layers of an onion. Therefore, tor network is also called as onion network, and the encryption process is also called onion routing.

In this entire process, what does each node knows?

Node Info collected
Entry Your IP address, the middle node
Middle Node Entry and Exit node
Exit Node Detail of your Internet service

None of the nodes handled all your information, making the internet access encrypted and protected.


# Tor Browser Setup

Access to The Tor Internet is simple. By downloading the Tor brower, which is actually a modified version of firefox, you can get direct access to the Tor network.


# Installation

The official link for Tor browser is TorProject Website, or you can use the link alternatively.

download.png

Open the .exe file and install the browser wherever you like. You have direct access to the dark web now.


# Safety Tips

Be very careful on dark web, especially if visiting some untrusted websites. Do not click into any untrusted links or scan their QR codes. There are far more hackers than you can imagine, and nobody but you can protect your privacy.

# Safety Settings

Navigate to Settings - Privacy & Security, and scroll down to find Security settings.

  1. Choose the safest option in security level

security-level.png

  1. Scroll down to turn on the Deceptive Content and Dangerous Software Protection

security-setting.png

# VPN

If you are visiting something potentially not allowed, using a VPN would help hide your IP from ISP and entry node. But remember, all potentially dangerous and illegal contents are not encouraged and should not be visited!

Personally, I would recommend this one for its convenience and easy access: CONnectVPN


# Overall

  • Open the browser and click connect to get connected to the tor web.

connect.png

  • If the connection is successful, you'll enter the home page of the tor brower.

home.png

  • The default search engine is DuckDuckGo, which DOES NOT focus on .onion sites. The search result is just what you would normally find in google, and you can visit nearly every website in the surface web anonymously here.

search.png

  • If you wants to explore deeper into the .onion sites in Tor, there are 2 methods suggested, namely .onion search engines and the hidden wiki.

# Search Engines

There are various search engines focuing on .onion sites ONLY. Typical Search Engines include:

  1. Ahmia.fi

One of a small number of dark web search engines that allow users to access the dark web, and it has been praised for making this otherwise hidden part of the internet more accessible. (The link is itself)

  1. Haystack

The search engine claims to have indexed over 1.5 billion pages which includes more than 260,000 websites, Haystak indeed would stand out to be a resourceful engine on the list. The onion link is:
http://haystak5njsmn2hqkewecpaxetahtwhsbsa64jom2k22z5afxhnpxfid.onion/

  1. Torch

Torch is one of those dark web search engines that have lasted for long enough (since 1996). Torch, like other search engines, crawls these addresses and indexes their content, making it searchable for users. It is fast and can come in handy. The onion link is:
http://torchdeedp3i2jigzjdmfpn5ttjhthh5wbmda2rr3jvqjg5p77c54dqd.onion/

  1. Deep Search

Deep Search is a search engine for the dark web. It is designed to index and search onionspace, the hidden services portion of the Tor network. DeepSearch is open-source and available for anyone to use. The onion link is:
http://search7tdrcvri22rieiwgi5g46qnwsesvnubqav2xakhezv4hjzkkad.onion/

# The Hidden Wiki

The hidden wiki is an unofficial website that collects and lists active .onion sites for different purposes. Note that the links may be dangerous or phishing links since appearing on the wiki does not guarantee its safety.

There are various versions of hidden wikis, and these are the most comprehensive and trending ones:

  1. the 2024 version of hidden wiki:
    http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion/wiki/index.php/Main_Page

  2. TorLinks | .onion link list:
    http://torlinksge6enmcyyuxjpjkoouw4oorgdgeo7ftnq3zodj7g2zxi3kyd.onion/

  3. dark.fail (This is the link itself)


# Conclusion

No conclusion, this is it. If you want to know more about dark web, you can watch this for a more detailed guidance, which may answer your questions.