What is the dark web and how does it vary from the internet most of us use everyday? Which darknet should I use for my investigation? And how can I access it safely?

The dark web is a small part of the internet reachable only with special software (e.g., Tor) where .onion sites aren’t indexed by search engines. Access isn’t illegal in most jurisdictions, but many activities there are. Investigators should use non-attributable, isolated browsing with full auditing to reduce legal, security, and privacy risk.

Here's a quick overview of some of the dark web topics we'll cover.

Surface vs. deep vs. dark web (at-a-glance):

  • Surface web: Public pages indexed by search engines; open access
  • Deep web: Content behind logins/subscriptions (e.g., databases, SaaS); not indexed
  • Dark web: Hidden services (.onion, I2P, Freenet) accessible only via specialized clients

How to access the dark web safely (for investigators):

  1. Use an isolated, anonymous, and secure browser like Silo to prevent host exposure
  2. Enforce non-attribution (managed identity, location, language, time)
  3. Log and audit all actions for legal defensibility
  4. Apply read-only controls and malware detonation barriers
  5. Follow policy and legal guidance; avoid engagement on illicit forums

What’s on the dark web?

Perhaps best known for its association with illicit activities, the dark web has become infamous for its role in the illegal drug trade. But there are less nefarious reasons to access the encrypted dark web. In many countries, the dark web allows demonstrators to subvert authoritarian regimes and provides a free and open internet model that can evade censorship and provide privacy. 

Dark web sites are similar in content and style to the surface web, or the internet most people are familiar with, but the traffic is routed and shared differently, making it more difficult to shut down or find the original sources of content.

For investigators, it can hold crucial information that would otherwise be inaccessible. To acquire these datasets, it is important to understand each area of the web, the different clients available to use them and what precautions should be taken before diving in.

Is the dark web illegal?

The dark web isn't inherently illegal. It's what you do on the dark web that leads you to the blurred lines of legality.

The dark web is infamous for illicit underground dark web marketplaces selling contraband across international borders. The Silk Road rose to notoriety in 2011 after an article was featured on the then-popular site Gawker. The Silk Road was eventually shuttered by law enforcement agents in 2013. But since the bust, several more dark web markets have appeared in its wake, each seeming more competent then the last. Well-known dark web marketplaces for illegal drug sales and other items include Alpha Bay, Agora, and countless others. 

The digitized version of the black market means the contraband being offered can go further in larger quantities than any physical predecessor. It also sells more than the illicit substances it's often known for, contraband can include stolen data, illegal firearms and exploitation material. These dark web commerce sites are often powered by cryptocurrency, so the users can shroud their purchases in purported anonymity.

So with all this illegal activity taking place on to the dark web, is it really okay to log on? While the nature of the dark web has led to abuses and exploitations by bad actors, this underside of the internet is not illicit by nature. The dark web can be a beacon of free speech in authoritarian countries.

Free speech on the dark web 

The dark web’s role as an anonymous and reliable source of information to dissidents in foreign countries, alongside privacy enthusiasts, is important and legitimate. Many reputable websites have mirrored dark web versions of their website, including news organizations like the BBC, The New York Times and ProPublica.

Just because you can’t get there by popular search engine doesn’t automatically make it nefarious. But it’s important to know the legal, security, and privacy implications that come with before attempting to logon to the dark web for research or any other reason. 

It may not be illegal to access the dark web, but doing so comes with considerable risks. The dark web is a place where stumbling into the wrong place (including illegal places) is easy to do. Be sure to read the risks and implications section to learn more.

What is the surface web? 

The internet most of us use daily—and probably assumed until now is the entirety of the internet—is actually what’s known as the open web or surface web. It is the format of the web we’re all used to, composed of open pages easily accessed by traditional search engines on any browser. Despite being where so many users default to, the surface web only accounts for a small portion of the entire internet.

What is the deep web? 

The deep web is the next layer of internet information. These are sites that require login or subscription services to access, such as academic journals, court record databases, or even services like Netflix. The deep web has some barriers to accessibility while being adjacent to the surface web and is typically accessed via the same browsers.

Surface web vs. deep web vs. dark web

Understanding how the surface web, deep web, and dark web differ is essential for investigators conducting online research safely and effectively.

While the surface web is open and easily searchable, the deep web contains valuable but restricted information behind logins or paywalls. The dark web, by contrast, exists on encrypted networks that hide user identity and site locations. For investigators, the dark web can hold critical intelligence—but safe, non-attributable access through an isolated browser is essential to avoid exposure or legal risk.

Here is some key information at-a-glance about the surface web, deep web, and dark web.

Layer of the Internet

How to access

Indexed by search engines?

Typical content

Who uses it

Surface web (clear web)

Any standard browser (Chrome, Firefox, Edge, etc.)

Yes

Public websites, blogs, news articles, e-commerce pages

Everyone

Deep web

Requires login or credentials

No

Academic databases, subscription services, private portals, cloud storage

Businesses, institutions, individuals

Dark web (Darknet)

Requires specialized software (Tor, I2P, Freenet)

No

Hidden .onion sites, encrypted marketplaces, forums, leak repositories

Researchers, journalists, investigators, threat actors

Dark web networks and possible risks

To access the dark web, a special software or client is needed. Each version of the dark web provides its own dataset, encryption services and risks from attempting to access it.

The Tor browser

The most commonly used darknet service is the Tor browser. It stands for The Onion Router, developed by the U.S. Naval Research Laboratory in 2002. It was created to provide layers of encryption (hence the reference to onions) in order to anonymize communication between intelligence professionals. Tor operates almost like a traditional web browser; you can download it to your machine and use it to access different sites.

By diverting traffic through multiple nodes on its way to the client, the originator of files and sites can be hidden, making them more difficult to trace. The multi-layered encryption gives anonymity to its users and service providers alike. Many sites are given a random URL that ends in .onion. Anyone can download the Tor browser onto their machine, but like any other browser, there are still ways to track activity and hacking risks.

In the Tor browser, the biggest weakness is the point information travels between the exit node and the destination site. This unencrypted area presents a vulnerability to users.

ZeroNet

Lesser known darknets include ZeroNet, a peer-to-peer-based web hosting model developed in 2015 that doesn’t use IP addresses or domains for websites. Sites are not hosted via a typical service and can only be accessed by public key. It makes sites free to create and share and almost impossible to shut down.

To access ZeroNet, you can use a regular browser with the application running in the background. Information from it can also be downloaded and made available offline. The content is made available via BitTorrent, which shares bits of information across many peers, each one hosting a piece of the information needed. By distributing the information through many hosts, it makes it nearly impossible to track down or scrub all of the pieces of content from the web. Each peer can then reshare and distribute themselves once they have downloaded it.

Unlike Tor, ZeroNet is not anonymous.

I2P, Invisible Internet Project

Another network is I2P, or the “Invisible Internet Project,” released in 2003. Unlike the previous two sources for websites and file sharing, I2P focuses mostly heavily on encrypting communication between users. Unlike Tor, it encrypts via a peer-to-peer model instead of a single thread.

Access to I2P uses a browser and an application in the background. It provides untraceable communication by establishing one-way tunnels through peers. Each client becomes a node in the tunnel and tunnels then expire after 10 minutes. The system is referred to as “garlic routing.” The one-way messages are encrypted for recipients, as well as their delivery instructions.

Freenet

Freenet is another peer-to-peer network for sharing decentralized data created in 2000. It is used in two forms: the “opennet” allows connection to any user, while the “darknet” connects only to friends. The ability to access only known contacts provides a higher degree of trust than other software.

Access is created through a backend web application and requires a key to access. While it was originally used by dissidents to circumvent censorship laws, it is now popularly used by cyber criminals to offload stolen and malicious content.

The traffic is routed via the closest nodes in the open net to create efficient routing. In the darknet, routes are set up manually and only trusted parties know your node’s IP address. The inconvenience of the darknet infrastructure is outweighed by the security it provides. In this system, the information stays available after the publisher has disconnected.

Use cases for dark web networks

Here are the key use cases, pros, and cons between the most common dark web services (Tor, ZeroNet, I2P, and Freenet).

Dark web serviceCommon use casesProsCons
Tor (The Onion Router)Anonymous browsing, hosting hidden services, communicating securely under surveillance
  • Provides true anonymity through layered encryption
  • Supports access to .onion sites
  • Vulnerable to tracking and analytical attacks
  • Used for illegal marketplaces and illicit content
  • Slower performance due to multiple routing layers
ZeroNetPeer-to-peer website hosting and file sharing
  • Distributed model makes content resilient to takedown
  • Offline access after download
  • No centralized server
  • Not anonymous by default
  • Popular among criminal and terrorist groups (e.g., ISIS)
  • Potential for misuse due to unregulated hosting
I2P (Invisible Internet Project)Secure peer-to-peer communication and messaging
  • Anonymity for communications
  • Uses garlic routing (multi-layer encryption tunnels)
  • Expiring tunnels increase privacy
  • Complex setup for casual users
  • Can be used for selling malware and exchanging stolen data
  • Limited to I2P network (not for open web browsing)
FreenetDecentralized file storage and data sharing
  • Resistant to censorship
  • Supports opennet and darknet modes
  • Enables private large file sharing
  • Can host illegal content
  • Slower and less user-friendly
  • May be exploited by criminals for malicious distribution

Should you access the dark web for your investigation? 

Each of these darknet services can benefit investigators of law enforcement agencies, intelligence practitioners, financial services analysts and other researchers. The dark web can be a resource to help evaluate leads, corroborate or disprove information and track data leaks. The dark web can also provide the context of how criminal marketplaces are operating and what tactics are being used to commit hacks or to track stolen data.

Many hackers discuss trade secrets in dark web forums. This information can help mitigate cyberthreats before they are committed or be used to recover leaked data from a breach. They may also post leaked passwords and accounts or sales of hacked devices. Financial crimes are often the subject of posts too. Stolen online bank account access or credit cards may be traced on the dark web.

When tips come in, following them in all places they lead may necessitate dark web access and help gain information on how bad actors operate.

Implications and risks of dark web research

Despite the benefits, many may have reasonable doubts and concerns about accessing the dark web. While accessing it is not illegal per se, it is important to take steps to mitigate any risks or potential legal threats, especially when entering areas of the dark web where illegal activity is being conducted. Dark web research requires careful policies, auditing abilities and security measures before logging on.

→ Here are a few tips to keep in mind on  what not to do on the dark web.

First, develop processes and procedures for your company and any employees who may be utilizing the dark web for their research. Be sure to consult your company’s legal counsel in this step, as they will have the best guidance for your circumstances and organization.

Since dark web marketplaces or forums are often monitored by law enforcement, it can be difficult to distinguish between criminal actors and good faith investigators. Avoid implications or attributions by having a plan. Be sure to document your plan of operation before gathering information or accessing a criminal forum. Maintain a complete record of activities while on the dark web and have a policy in place for “rules of engagement” when on sites where criminal activity may occur.

For more resources on the legality of dark web access, consult "Legal Considerations when Gathering Online Cyber Threat Intelligence and Purchasing Data from Illicit Sources" by the United States Department of Justice.

Other risks include the security of investigators and their machines. While the dark web’s purpose is to provide some anonymity, there are still risks of malicious content or attribution when accessing. The safest way to gain access is by using a secure cyber-service product.

How to access the dark web safely

Each dark web service can be accessed via self-installed software or a special browser from the services themselves. However, simply downloading the Tor browser or that of any other darknet could come with malicious content, analyst attribution, or risk your company’s IT or security policies, not to mention the potential for legal hot water if you were to accidentally stumble into the wrong dark web forum. Even relying on a virtual private network cannot protect you or your research from bad actors.

Analysts need a secure remote browser to access dark websites. That means the ability to have all activity completely auditable to ensure the safety of the company and analysts alike. It also means the ability to manage attribution so angry site admins don't track a researcher back to their real-life persona, and protection from easy-to-click malware. A cloud-based isolated browser, such as Silo for Research, is needed to allow you full access with an easy-to-use service that works in sync with your company’s IT security and compliance. There are security controls in place and built-in auditing.

To see firsthand how tools like Silo can help you safely use the dark web in your investigation, experience Silo for yourself for 30 days or request a demo.

More from our dark web blog series:


Dark web FAQs

Is the dark web illegal?

Accessing the dark web is generally legal, but many activities there are not. Investigators should avoid transacting, engaging, or downloading from illicit markets and use isolated, non-attributable browsing with audit logs. Consult organizational policy and legal counsel before any dark-web collection.

What’s the difference between deep web and dark web?

The deep web is content behind logins or paywalls and isn’t indexed, while the dark web is reachable only with special software like Tor and hosts hidden services (.onion). Deep-web access uses normal browsers; dark-web access requires specialized clients and stronger operational security.

How do I access the dark web safely?

Use a cloud-isolated, remote browser with non-attribution (managed identity, location, language), audit logging, and read-only file handling. Follow organizational rules of engagement and legal guidance. Avoid interacting with illicit markets or downloading untrusted files.

Can police track you on the dark web?

Yes. Dark-web users can be identified through operational mistakes, malware, de-anonymization, and service-level leaks. Investigators should assume attribution risk exists and rely on isolation, policy, and auditing rather than personal devices or consumer VPNs.

How much of the internet is the dark web?

The dark web is a very small portion of total internet traffic compared to surface and deep web content. Its significance stems from the types of data (forums, marketplaces, leaks), not its size. For investigations, safe access and governance matter more than volume.

What does .onion mean?

.onion is a pseudo-TLD used by hidden services on the Tor network. These sites aren’t indexed by traditional search engines and require Tor to access. Investigators should reach .onion resources via isolated, non-attributable browsers with logging and file controls.

What is non-attribution traffic?

Non-attribution traffic masks an analyst’s identity, location, device, and language to prevent linking research to real personas. Organizations implement it through managed browser isolation, identity controls, and audit logs, reducing risk during dark-web or high-risk surface-web collection.

What is SOCMINT?

SOCMINT (social media intelligence) is the collection and analysis of publicly available social-media data. For dark web investigations, SOCMINT often complements .onion research by correlating threat actor chatter, handles, and infrastructure across open, deep, and dark web sources.

Tags
Dark web basics Dark web research