Step by step guide to safely accessing the dark net and deep web

Published by on September 12, 2018 in VPN & Privacy

the flame
Google only indexes a tiny fraction of the internet. By some estimates, the web contains 500 times more content than what Google returns in search results. The links that Google and other search engines return when you type in a query is known as the “surface web,” while all the other, non-searchable content is referred to as the “deep web” or “invisible web”.

Most of that information is hidden simply because the vast majority of users won’t find it relevant. Much of it is tucked away in databases that Google is either not interested in or barred from crawling. A lot of it is old and outdated. The contents of iPhone apps, the files in your Dropbox account, academic journals, court records, and private social media profiles are all examples of data that aren’t necessarily indexed by Google but still exist on the internet.

See also: The best VPNs for Tor

Warning: Your ISP can detect you are using Tor

Much of this article revolves around the use of anonymity networks like Tor, which are used to access the dark net. Internet providers can detect when Tor is being used because Tor node IPs are public. If you want to use Tor privately, you can use either a VPN or Tor Bridges (Tor nodes that are not publicly indexed). US Tor users in particular may want to use a VPN, which will be faster and more reliable.

Recent changes in US legislation mean internet providers are free to sell and share data on their customers, including their browsing habits. When using a VPN, your ISP will not be able to see that you are connected to a Tor entry node, only an encrypted tunnel to a VPN server.

NordVPN is the  #1 choice for Tor and has been designed with Tor users in mind.

Deep web vs dark net

The deep web is often confused with the dark net, also called dark web, black web, and black net. Put simply, the deep web is all of the information stored online that isn’t indexed by search engines. You don’t need any special tools or a dark net browser to access the deep web; you just need to know where to look. Specialized search engines, directories, and wikis can help users locate the data they’re looking for.

Many of the best general deep web search engines have shut down or been acquired, like Alltheweb and CompletePlanet. Still, a few are hanging around to get you started:

  • DeeperWeb – Deep web search engine that leverages Google Search
  • The WWW Virtual Library – The original index of the web, but more of a directory than a search engine.
  • Surfwax – Indexes RSS feeds. Not certain this is still working…
  • IceRocket – Searches the blogosphere and Twitter

These are all okay, but specialized search engines tend to be better than general ones for finding info on the deep web. If you’re looking for a court case, for example, use your state or country’s public records search. If you need academic journals, check out our article on using deep web search engines for academic and scholarly research. The more specific you can be, the better, or else you’ll just end up with the same search results that you would find on Google. If you need a specific file type, like an Excel file or a PDF, learn how to specify searches for that type of file (e.g. type “filetype:PDF” in your DeeperWeb query).

The dark net is a small part of the deep web that is kept hidden on purpose. Websites and data on the dark web do typically require a special tool to access. The type of site most commonly associated with the dark web are marketplaces where illicit goods such as narcotics, firearms, and stolen credit card numbers are bought and sold. The darkest corners are used to hire hitmen, engage in human trafficking, and exchange child pornography. More than that, though, the dark web contains content and data that can be accessed with anonymity. It could be a blog, forum, chat room, or private gaming server.

The beauty of the dark net is anonymity. No one knows who anyone else is in the real world, so long as they take the necessary precautions. Users are free from the prying eyes of governments and corporations.

The dark web and Tor are often used by journalists and whistleblowers to exchange sensitive information, including Edward Snowden himself. The Ashley Madison data dump, for instance, was posted to a site only accessible to Tor users.

How to access the Dark Web safely

The dark web is not a single, centralized place. Just like the surface web, it is scattered among servers around the world. This article will instruct you on how to access the dark web through Tor, short for The Onion Router. Dark net website URLs are often appended with “.onion” in lieu of “.com” or “.org”, indicating they are only accessible to Tor users.

Tor is a network of volunteer relays through which the user’s internet connection is routed. The connection is encrypted and all the traffic bounces between relays located around the world, making the user anonymous.

welcome to tor browser

So how does one get on the Tor network? The easiest way is to download and install the Tor Browser. Based on Firefox, you can surf the web just like any other web browser, except all your traffic is automatically routed through the Tor Network. Make sure to download the Tor Browser only from the official website, lest you risk downloading malware, spyware, or some other virus to your device. Officially, the Tor Browser is only available on Windows, Mac, and Linux, so many experts advise against using third-party mobile browsers that utilize the Tor Network.

tor browser wikileaks url bar

How to access the dark web on Android with Tor Browser (UPDATE)

The official Tor Browser is now available on Android. You can get it from the Play Store or the Tor downloads page. As of writing, Tor Browser for Android is still in alpha, and additionally requires you install Orbot as a prerequisite.

The Tor Browser is the most popular dark web browser. Once Tor Browser is installed, you can now access those .onion dark net websites.

Navigating the dark net

You can now safely browse dark web sites and hidden wikis, but if you plan to do anything more than that, you’ll need to take several precautions. If you plan to make a purchase on a dark net marketplace like Silk Road to get those drugs your dying mother so desperately needs to survive, for instance, you’ll need to create a fake identity. That means setting up encrypted email with a new email address, using a pseudonym, setting up an anonymous bitcoin wallet, disabling Javascript in Tor Browser, researching vendors, and more.

Obviously, finding these .onion websites is the first challenge, as they won’t show up in Google search results. You can’t just Google “Silk Road” and hope to land on the dark web site. A handful of dark net search engines that do index .onion sites include,, and NotEvil. To search multiple marketplaces for specific products, particularly drugs and narcotics, there’s Grams.

Reddit is also a valuable resource for finding the dark net or deep web site you’re looking for. Try the /r/deepweb, /r/onions, and /r/Tor subreddits. Hidden wiki directories like this one can also be useful to help narrow your search.

Again, we can’t emphasize enough that security and anonymity are paramount to those on dark web sites. Your ISP and the government might not be able to view your activity when on the Tor Network, but they do know you are on the Tor Network, and that alone is enough to raise eyebrows. In fact, a recent judgment by the US Supreme Court denoted that simply using Tor was sufficient probable cause for law enforcement to search and seize any computer around the world.

Another vital precaution is to ensure that your .onion URLs are correct. Onion URLs generally contain a string of seemingly random letters and numbers. And because there’s very little use of HTTPS on the dark net, verifying whether or not a website is legitimate using an SSL certificate is not feasible. We recommend verifying the URL from three separate sources before using any site on the dark net. Once you are certain that you have the correct URL, save it in an encrypted note—the Tor browser will not cache it for later. Otherwise, there’s a good chance of falling victim to a phishing scam like this fake bitcoin mixer.

For that reason, we highly recommend employing another layer of security via a VPN.

VPN over Tor versus Tor over VPN

A VPN allows a user to encrypt all the internet traffic traveling to and from his or her device and route it through a server in a location of that user’s choosing. A VPN in combination with Tor further adds to the security and anonymity of the user.

While somewhat similar, Tor emphasizes anonymity, and a VPN emphasizes privacy.

Combining them reduces risk, but there’s an important distinction in how these two tools interact. Let’s first discuss Tor over VPN.

If you connect to your VPN and fire up Tor Browser, you’re using Tor over VPN, this is by far the most common method. All your device’s internet traffic first goes to the VPN server, then it bounces through the Tor Network before ending up at its final destination. Your ISP only see’s the encrypted VPN traffic, and won’t know you’re on Tor. You can access .onion websites normally.

Tor over VPN requires you trust your VPN provider, which can see that you are using Tor and keep metadata logs, though it can’t actually see the content of your encrypted Tor traffic. A logless VPN, which doesn’t store any traffic logs nor session logs is highly preferable. Traffic logs contain the content of your internet traffic, such as search queries and websites you visited, while session logs contain metadata like your IP address, when you logged into the VPN, and how much data was transferred. Traffic logs are a bigger concern than session logs, but neither are good.

For built-in Tor over VPN functionality, NordVPN operates servers that automatically route you through the Tor network  (full details here). You don’t even need to use to Tor Browser, but keep in mind other browsers can still pass identifying information through the network. Alternatively, there’s IPVanish who claim to be the world’s number one VPN for Tor and come highly recommended, you can save 60% on the annual plan here.

DEAL ALERT: NordVPN IS running a 2 year deal with a huge 66% discount here.

Tor over VPN also doesn’t protect users from malicious Tor exit nodes. Because Tor nodes are made up of volunteers, not all of them play by the rules. The final relay before your traffic goes to the destination website is known as the exit node. The exit node decrypts your traffic and thus can steal your personal information or inject malicious code. Additionally, Tor exit nodes are often blocked by websites that don’t trust them, and Tor over VPN can’t do anything about that, either.

Then there’s the less popular VPN over Tor, which is advised against by the official Tor Project. Only two VPN providers that we know of, AirVPN and BolehVPN, offer this service, although neither of these score highly for speeds. In this case, the order of the two tools is switched. Internet traffic first passes through the Tor Network, and then through the VPN. This means the VPN provider doesn’t see your real IP address and the VPN protects you from those bad exit nodes.

The big downside is that your ISP will know you are using Tor, which is cause for concern in some places and will put many people off using this method. In this instance, too, it is important to use a logless VPN and pay with Bitcoin if you can to stay anonymous. The VPN over Tor technique is also susceptible to an end-to-end timing attack, though it’s highly unlikely.

Tor over VPN requires you place some trust in your VPN provider but not your ISP and is best if you want to access .onion websites. VPN over Tor requires you place trust in your ISP but not your VPN and is best if you want to avoid bad Tor exit nodes. Some consider VPN over Tor more secure because it maintains anonymity throughout the entire process (assuming you pay for your VPN anonymously). Although the official Tor Project advises against VPN over Tor, both methods are superior to not using a VPN at all.

The major caveat is speed. Due to all the nodes that your traffic passes through, Tor by itself significantly limits bandwidth. Adding a VPN to it, even a fast one like IPVanish will make it even slower, so please be patient.


I2P is an alternative anonymous network to Tor. Unlike Tor, however, it cannot be used to access the public internet. It can only be used to access hidden services specific to the I2P network. I2P cannot be used to access .onion sites because it is a completely separate network from Tor. Instead, I2P uses its own brand of hidden sites called “eepsites”.

So why would you use I2P instead of Tor? After all, it’s much less popular, can’t be used to access normal websites, and isn’t as easy to use, among other disadvantages. Both rely on a peer-to-peer routing structure combined with layered encryption to make browsing private and anonymous.

I2P does have a few advantages, though. It’s much faster and reliable than Tor for a number of technical reasons. The peer-to-peer routing structure is more advanced and it does not rely on a trusted directory to get route information. I2P uses one-way tunnels, so an eavesdropper can only capture outbound or inbound traffic, not both.

Setting up I2P requires more configuration on the user’s part than Tor. I2P must be downloaded and installed, after which configuration is done through the router console. Then individual applications must each be separately configured to work with I2P. On a web browser, you’ll need to configure your browser’s proxy settings to use the correct port.


Like I2P, Freenet is a self-contained network within the network that can’t be used to access sites on the public web. It can only be used to access the content uploaded to the Freenet, which is a peer-to-peer distributed datastore. Unlike I2P and Tor, you don’t need a server to host content. Once you upload something, it stays there indefinitely even if you stop using Freenet, so long as it is popular.

Freenet allows users to connect in one of two modes: darknet and opennet. Darknet mode allows you to specify who your friends are on the network and only connect and share content with them. This allows groups of people to create closed anonymous networks made up solely of people they know and trust.

Alternatively, users can connect in opennet mode, which automatically assigns peers on the network. Unlike darknet mode, opennet uses a handful of centralized servers in addition to the decentralized peer-to-peer network.

Configuration is fairly straightforward. Just download, install, and run. When you open your default browser, Freenet will be ready and running through its web-based interface. Note you should use a separate browser than the one you normally use to help ensure anonymity.

Freenet is still an experiment designed to resist denial-of-service attacks and censorship.

Useful Links:

Download the Tor browser

The Flame” by Aaron Escobar licensed under CC BY 2.0

55 thoughts on “Step by step guide to safely accessing the dark net and deep web

  • VPN then startpage then search tor browser and download then search using the tor browser am I missing anything?

    • you may want to open your normal browser in incognito mode with the VPN on to get to the Tor Browser download page.

  • Assalam o Aleikum
    To my fellow brother( ) thanks for the great help you have enlightened us partaining the use of TOR. Could someone help me with links to deepweb markets.
    Thank you.

  • It’s fine if you’re doing it the right way?? Literally read his advice and you’ll be fine if you add a few more safety precautions along side.

  • Hi Paul. Well thanks for this wonderful article . Hmm is it need to root your android device before downloading tor browser? in-order to use it as availability ?

  • I’d recommend using a pre-built Darknet Box or Darknet Key for maximum security when accessing the darknet. That way there’s no risk by using your own pc/laptop.

    Google ‘DarknetBros’ to find them for sale.

  • paul i need some help …… i need a way to have at least a way of starting up with the dark web did the vpn stuff so waiting for you

  • I had my tor browser working just fine until I switched carriers and all of a sudden I have been unable to access my tor browser and I have even tried reinstalling it…but it just keeps coming up with a dialogue box that says I need to close my tor browser before I can open another! But it won’t relaunch even when I select Close Tor Browser..I believe I am being blocked from using this web browser and there is no reason for this as I am NOT doing anything illegal…I JUST WANT MY PRIVACY to be protected because I HATE THE THOUGHT OF BEING MONITORED LIKE I AM SOME CRIMINAL! ISNT IT UNLAWFUL FOR THE ISP OR ANY AUTHORITY TO INVADE YOUR PRIVACY LIKE THIS AND TO FORCE YOU TO USE A REGULAR BROWSER?

  • Hello Paul,
    thanks for your great, useful and precise article.
    My question is a theoretical one concerning both possibilities to have the most efficient cover.
    “Tor over VPN vs VPN over Tor” issues.
    Both systems have advantages and disadvantages that is clear.

    Now using : VPN1 over (Tor over VPN2*)
    *Using 2 different No log Tier VPN services.

    Is that a possibility that could solve both systems disadventages
    or is there no solution to that problem?

    Thanks for taking time

    • Hi Vince, I’m not sure it would make a huge difference. The main distinction is more about the entry and exit points you use to get into the Tor network. If you plan on visiting .onion sites, you still need a Tor exit point and not a VPN at the other end of your connection, for example. I imagine double VPN + Tor would be very, very slow.

  • Hi Paul

    I know you are away at the moment but I need your help in removing all of my data from the onion peel app on the dark Web. Also, any other data that is linked to me, how do I go about doing This?

    Urgently need some advice

  • What if i lost my coin? Coz my OS was being upgraded and my old Deep Onion Wallet was totally gone.. and now that i installed it again i have new Deep Onion Wallet address! How am I able to retrieve my coins from my old Deep Onion wallet and/or Deep Onion wallet address?

    • Cryptocurrency is another topic entirely I’m afraid. I’m not familiar with your particular wallet, but typically if you lose access then it’s gone forever, save for any recovery measures you put in place prior to losing access.

  • Hi,will you get punished from Gov.if you just access the tor browser? Or only if you get into a sensitive behaviours?

  • I’ve used the Tor browser before (a couple years ago), and my computer got wrecked. It froze while I was playing a game, and when I tried to restart it, it gave me an error saying that system32 needed to be repaired. It was my first time using the browser so I didn’t know what I was doing, and I didn’t use a VPN. Is that why my computer broke? Did I get hacked?

    • Sounds like you may have downloaded a malware or some other form of virus when downloading tor, which could mean you downloaded from the wrong site. System32 is an extremely important asset to windows and is often the go to file to be deleted when an attacker is looking to put you out of comission. Although, it is a very easy fix, you just need to hook the HDD from your computer up to another, and possibly run a repair on your windows. If all else fails, wipe the HDD and reinstall windows, then put it back in your PC. With the second method you WILL lose your files, but at least you will be able to use your computer.

  • Desperate for some help! I had to get a new phone and tried to download the tor browser
    The old way but can’t figure out how to drag file from folder to Applications folder (I’m seriously probably the dumbest computer/phone person to ever successfully do it but not this time) I have checked time and date and it is fine. I downloaded the app and can use it just can’t get onion sites to load. I could really use some help!!

  • I am new to this and don’t know exactly what you mean by malicious exit nodes. Does this mean using Tor over VPN will allow the sites and people and such you visit on tor to see your data such as Ip and other important details that will leave you vulnerable? Thank you in advance for your help.

  • What is the correct way to leave Tor and the deepweb? I want to use regular internet with my Chrome browser.

    • Easiest to turn on the VPN and then open Tor browser, which will run your connection through the VPN server first and then onto the Tor Network.

  • Aaron if you truly say the dark web is over,then why are there continuous bank frauds all over the world with the existence of the NIT(Technologies). Get you facts straight

  • The main problem with TOR now is that the search engine now works using “default search engines.” When you download the TOR browser, you’ll notice that it is configured with StartPage! You can choose another default ( they have a defaultboot of law enforcement in this. I think that the folks at the TOR administration were “forced” to make this change. There seems to be no way around it. In effect, these default search engines that guard the
    entrance way to the Dark Net act like “search nannies” and won’t let you do anything controversial.” Besides, I hear tens of thousands of lawbreakers are getting busted every month by the new global cyber police and their so called “Network Investigative Techniques ( Technologies )anyway. The Dark Web is pretty much “over.”

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.