Darknet - What Is It and How Can I Access It?

Julia P. Manzau

Dodgy, seedy, and dangerous: The words that came to mind whenever someone mentions the Darknet aren't exactly inspiring. This is because most people who talk about it usually don't do so based on first-hand experience, but rumors or hearsay about criminal or illegal activity. Is the Darknet really so bad as its reputation makes it out to be? We wanted to take a closer look at the virtual shadow world and will let you know in this article what we've found out.

However, before we can explore the Darknet, it's important to clarify how the Internet is structured, specifically, the differences between the Clearnet, the Deep Web, and the Darknet. All three are part of the World Wide Web (WWW) but at different levels. Most who use the Internet only ever traverse the surface of this network, the Clearnet.

Clearnet vs. Deep Web

Let's imagine the Internet like a large city. Any publicly accessible place in this city, such as a park, a business, or a tourist attraction, is part of the Clearnet or surface web. You don't need special permission to enter any of these areas (for our example, this means that you can use a normal browser), and if you search for them on a map or in a telephone book (a search engine in the digital case), you'll find them.

However, as in any city, there are also places on the Internet which you need an invitation, tickets, identification, or key to access, such as private clubs, offices, concerts, or apartments.

In our example, all of these places are part of the Deep Web, and include intranets, university or research databases, as well as internal pages operated by authorities. You won't be able to find these sites through a search engine, but, you can access them via a normal browser, so long as you know their address and have login credentials.

Darknet: Virtual Hoods

Darknet (or Dark Web) pages cannot be found with either regular browsers or standard search engines. In our imaginary city, the Darknet can be visualized as an area that should be avoided at night, and even during the day isn't all that pleasant. Comparable to inner-cities, the Darknet is full of action but dangerous. Online, people meet in these virtual 'hoods' for harmless, anonymous conversations as well as criminal plotting.

How Does the Darknet Work?

The Darknet is an isolated, peer-to-peer overlay network in which all participants manually create an encrypted connection between one another, rather than automatically, as is the case in regular networks. Darknet pages are also referred to as hidden services since they cannot be found with normal browsers.

When online in the Darknet, all data traffic is encrypted, even IP addresses, which are usually easy to follow. This ensures greater security and anonymity but also makes surfing somewhat slower.

How Do I Enter the Darknet?

But how to access the dark side of the World Wide Web if not through regular search engines and browsers? The answer is surprisingly easy, as you'll only need a special browser, Tor, a favorite for anonymous surfing in the Clearnet as well.

Tor is short for "The Onion Router", which relates to how the software operates. To preserve anonymity, Tor routes each data request through a randomly selected computer, known as a node, until it reaches an exit node, from which it enters the Internet.

To enter the Darknet, you'll need to download and install Tor browser.

By default, Tor encrypts data multiple times, like the rings of an onion. Each computer that participates in a data transfer, encrypts one level. The main attraction? Should someone monitor your data flow, the packet that they see will appear completely different than what the node forwards. In this way, all traces are blended together, making it nearly impossible to reconstruct them.

It's also possible to anonymously surf the Clearnet with Tor browser. DuckDuckGo is the default search engine.

Onion Links: Navigating the Virtual Shadow World

Once you've downloaded and installed Tor, your system should connect to the network without issue. Now, you'll need to choose: Normal, anonymous surfing in the Clearnet or a trip to the Darknet. To do the latter, you'll need to go a bit deeper into the virtual universe of the Web.

As mentioned above, regular browsers and search engines don't work for Darknet pages, so you'll need to use Ahmia.fi or Torch instead, both of which are Darknet search engines. You won't find domain names like .com either, with all Darknet addresses consisting of combinations of letters and numbers with the ending .onion.

Ahmia is one of the Darknet's most popular search engines.

Those who operate Darknet sites are rarely made public. As such, it's almost impossible to censor or take down .onion pages.

Why Use the Darknet?

Basically, using the Darknet makes sense for anyone who wants to remain anonymous and protect their privacy.

For most of us, whenever you surf the Clearnet, you leave traces of your activity and behavior. Suppose that you've just searched for a vacation rental in Myrtle Beach or Cape Cod. Within a few days, you should start to notice advertisements for those locations in pop-ups and web banners. After hundreds or thousands of searches, companies like Google build up a fairly accurate user profile for you, which helps them to sell more ads and generate revenue. As companies like Google attempt to get to know you better, your anonymity and privacy all but vanish.

Tor prevents the above, but it's also live-saving for dissidents and journalists in countries where the flow of information is tightly managed by authoritarian or dictatorial governments. For that reason, plenty of news agencies, such as the New York Times maintain .onion pages.

Similarly, whistleblowers also utilize the Darknet owing to the possibilities it offers to encrypt data and anonymously communicate online.

Edward Snowden, who released a cache of top-secret NSA documents, cites Tor as one of the most important tools for online anonymity.

Nerds and techies also flock to the Darknet, since they're able to find like-minded individuals with whom they can freely and openly communicate with.

According to Tor's developer, Roger Dingledine, more than two million people use the anonymous browser per day to surf anonymously and circumvent state censorship. Only 1-3% of Tor users use the browser to access the Darknet, which explains why the most visited websites (according to CHIP, a tech magazine), are Facebook, OnionShare, a file-sharing service, and news portals.

The Black Sheep

As always, anything can be misused or abused. During our research, we determined that quite a good deal of content in the deeper Darknet exists which we are neither interested in, nor wish to see.

Can I Make Purchases in the Darknet?

Yes, but it's better not to. Even though there are numerous marketplaces in the Darknet where you can purchase both legal and illegal goods, we advise against doing so for the following reasons:

  • Bitcoins are tracked and must be washed, which takes a long time and is illegal.
  • Goods need to be sent to a real address, whether digital or physical. This negates any anonymity.
  • No protection is offered against fraud.
  • Most things for sale in the Darknet are illegal.

So long as you don't do anything illegal, accessing the Darknet is 100% legal. Many of the goods and services offered for sale on the Darknet are not legal. The same rules that apply in real life apply to the Darknet: If purchasing drugs, weapons, or other illegal things, you'll become criminally liable. The same applies to movie or music downloads.

The German Federal Office for Information Security summed up the situation nicely: "Movement on the Darknet is not illegal in and of itself, but it is a security risk." This is because you can wind up on an illegal site with a single click. Fraudsters hawking fake goods wait around every corner for unsuspecting newbies, who they can infect with a Trojan or virus. Accordingly, it's important to enter the Darknet with a great deal of caution and observe the following rules:

  • Trust no one
  • Make sure your virus scanner is up to date
  • Tape over your webcam's lens
  • Never post personal data or pictures
  • Never download anything
  • Never buy anything

What Kinds of Sites Can I Find on the Darknet?

Despite how easy it is to enter the Darknet, it's relatively difficult to find interesting or sensible things to do. Sites worth visiting or even functioning links are in short supply.

A good starting point for your first trip to the Darknet is a link index, like The Hidden Wiki.

To help, we found and tested a few pages worth checking out, which are listed below. Your first stop should be an authoritative index like DeepLink Onion or a Tor-specific search engine like Ahmia or TOR66. It goes without saying, but you should also exercise caution when clicking on links that these search engines return.

NameType of Site

Search Engine

Search Engine

Search Engine

Search Engine

Link Index

Link Index

Link Index



Information About Surveillance Activities





There are plenty of reasons to check out the Darknet. The most interesting of these is probably to take a first-hand look at something that most people haven't. Beyond that, it's also refreshing to read news and stories which aren't hyped or pushed by marketing algorithms. While visiting isn't illegal, it also isn't for the faint of heart. If you're only expecting to find journalists and dissidents, you're in for a rude awakening.

Anyone who is shocked by what is written on the Clearnet will probably have a heart attack from Darknet content. Some might find it thrilling to watch in real-time what is usually only shown on the silver screen or TV shows. Others could come away from a trip to the Darknet with a better understanding of why humanity behaves the way it does.

Like basically everything digital, when snooping around the Darknet, it's important to neither lose your sense of proportion nor to throw caution to the wind.

With that said, Tor browser is much more than just the Darknet, also providing a means for those who live under dictatorships to stay informed about what's not reported by government propaganda. It also greatly anonymizes surfing the Clearnet, making all Internet activity you engage in safer in the process. For that reason alone, installing and downloading the software is highly recommended.


What Is the Darknet?
The Darknet is an anonymous, hidden part of the Internet, inaccessible by normal search engines or web browsers. To visit websites on the Darknet, you'll need special software, the most well-known of which is Tor. Darknet sites don't have regular addresses but consist instead of combinations of numbers and letters. When using Tor, these end with the .onion domain name.

How Can I Access the Darknet?
To enter the Darknet, you'll need special software, like the Tor browser. This browser can also be used to surf the Clearnet with greater anonymity. In terms of appearance, Tor looks very similar to most other browsers like Firefox or Chrome, however, it offers greater functionality. Once you've connected to Tor, you can explore the Darknet or surf the Clearnet. Darknet pages will have .onion domain names.

Is It Illegal to Surf the Darknet?
No, neither downloading a Darknet-capable browser, like Tor, nor surfing the Darknet are illegal. Most of the products and services that are offered on the Darknet are illegal though. Should you visit a site with prohibited or illegal content, even inadvertently, you could be liable to criminal prosecution. A fine line exists between what is allowed and what isn't, so tread carefully.

What Can I Do on the Darknet?
The Darknet is great for securely sending emails or anonymously listening to a radio station. Through a reputable link index, you can even find funny or interesting pages. Tor browser can be used for surfing the Clearnet as well, making whatever you do there more anonymous. For precisely this reason, it's the go-to tool for journalists, dissidents, and whistleblowers.

Author: Julia P. Manzau
Julia P. Manzau has more than 30 years of professional experience in leading editorial and marketing positions in the premium automotive, mechanical engineering, and healthcare industries. She studied Political Science and History in Bonn, Marketing at the St. Galler Business School and earned a BA in Media Engineering (CCI). Since 2015, she has worked as a freelance writer. For EXPERTE.com, she focuses on software, the Internet, and marketing.
Other languages:
Deutsch Français 
More about IT-Security
Cyber Attacks - 3 Current Threats and Countermeasures
HDD and SSD - How to Safely Wipe Your Hard Drive
Phishing: Recognizing the Threat
Data Theft: What Is It? How Can I Protect Myself?
Best Password Manager - 12 Tools Reviewed
How To Remove Junk Files From Your Windows PC
VPN Leak Test - Is Your Private IP Public?
Browser Fingerprinting - What Is It and How Can I Protect Myself?
Best VPN - Review of 22 VPN Providers
Internet Censorship - Site Blocked in China, Russia or Turkey?
Password Generator - Generate a Secure Password
Browser Privacy Check - Which Traces Do I Leave on the Web?
Password Checker - How Secure Is My Password?
Data Breaches - What Is a Data Leak? Have You Been Affected?
Internet Pitfalls - The 7 Biggest Dangers Online
Data Recovery - Restoring Deleted Files
Secure Messengers - The 5 Best Alternatives to WhatsApp
Anonymous Search Engines - 3 Alternatives to Google
Doxing - What It Is and How You Can Protect Yourself
Privacy Browsers: The Best Browsers for Maximum Security
Two-Factor Authentication - This is how you secure your accounts
Ad Blocker - How to Protect Yourself From Annoying Ads
Secure Password - What Makes a Strong Password?
Do Not Track - What It Is and How It Can Protect You
Manage Passwords - Best Way to Store Passwords
Anonymity Online: Tor and the Tor Browser
Identity Theft on The Web – How To Protect Yourself
Best Cloud Backup - 7 Online Backup Providers Reviewed
Best Antivirus Software - 11 Programs Reviewed
How To Change Your IP Address - 3 Simple Ways
Email hacked? How To Find Out if Your Email Has Been Hacked
Anonymous Browsing - How to Surf Anonymously Online
Hide IP - How to Hide My IP Address