The darknet is a hidden part of the internet that cannot be accessed via conventional search engines such as Google and others. The darknet is based on encrypted connections and anonymized networks, and only special software provides access to the Tor network, which serves as the foundation for the operation of the darknet.
Tor stands for “The Onion Router” and, like an onion, it has several layers. Unlike normal surfing on the World Wide Web (www), the computer does not connect directly to the server on which the requested website is located. Instead, the user’s internet connection is routed through various servers (layers) worldwide and the data traffic is encrypted multiple times. This obscures the user’s identity and makes their activities difficult to trace. This anonymity is also the reason for the popularity of the darknet.
Access to the darknet is gained using special browsers such as the Tor Browser or similar applications that anonymize the path taken by the data. The path can be imagined as follows:
For each request, the Tor client establishes a new random connection via several nodes to the destination server where the target page is located. Each node only knows the IP address of the previous and next node, and all data transmitted between the nodes is encrypted. Only the last section to the destination server is not automatically encrypted. The destination server then only knows the IP address of the previous node, the exit node, but not that of the computer from which the request originated.
Although the queries submitted are anonymized, the data sent is not necessarily secure. Log-in data or credit card information entered into web forms can still be read despite Tor.
The darknet is often associated with illegal activities such as drug or arms trafficking. But it is not only criminals who use this dark, hidden network. Politically oppressed individuals, dissidents, and members of the opposition also use the darknet, which can also be used to access the clear web, i.e., the normal internet.
Darknet users can be roughly divided into three groups:
-
Criminals: Hackers who sell stolen data or offer fraudulent services. Drugs, unregistered weapons, explosives, and more are also sold on the darknet and often paid for with cryptocurrencies.
-
Journalists, activists, whistleblowers: People who need the protection of the darknet for their communications without pursuing criminal activities. This includes anyone who wants to communicate securely in repressive states, publish information anonymously, or access content that is unavailable due to political restrictions. Or simply people who value their privacy.
-
Companies and security researchers: IT security companies and businesses use the darknet for threat analysis to identify potential security risks at an early stage, as the risk of malware spreading is higher on the darknet than on the clear web.
In addition to the darknet, there is also the deep web. The terms “darknet” and “deep web” are often used interchangeably, but they differ fundamentally:
Deep Web: The part of the internet that is not publicly indexed. It accounts for around 90% of the entire World Wide Web. This includes corporate networks, cloud storage, databases, and protected websites.
Darknet: An encrypted and anonymous network within the deep web that requires special software. The total number of all darknets is also referred to as the dark web.
Simply put, every darknet is part of the deep web, but not every deep web is a darknet.