The Dark Web Explained: How It Works, Risks, and What You Should Know

The Three Layers of the Internet

The internet can be classified into three layers based on accessibility:

  • Surface Web: The portion indexed by search engines like Google, accessible to anyone
  • Deep Web: Content not indexed by search engines — email inboxes, membership sites, databases, and similar resources
  • Dark Web: A highly anonymous layer that can only be accessed using specialized software

The deep web and dark web are often confused, but they are distinct. The vast majority of the deep web consists of legitimate content.

How the Dark Web Works Technically

Access to the dark web primarily relies on the Tor (The Onion Router) network.

Tor routes communications through multiple nodes (relay servers), adding layers of encryption at each stage to make it extremely difficult to link the source and destination of a communication. This multi-layered encryption is the origin of the term "onion routing." For more details on the Tor browser, see our dedicated article.

Sites on the dark web use the special ".onion" domain and cannot be accessed with a standard browser. Both site operators and visitors can communicate without knowing each other's IP addresses.

What Happens on the Dark Web

Illegal Activity

Much of the attention the dark web receives stems from its role as a marketplace for illegal transactions. Stolen personal data and credit card information are bought and sold, malware is traded, and illicit drugs are distributed.

Legitimate Uses

On the other hand, the dark web also serves legitimate purposes. Journalists and activists in countries with restricted freedom of speech use it to bypass censorship and share information. Whistleblowing platforms and privacy-focused communication tools also operate on the dark web.

Has Your Information Been Leaked to the Dark Web

Personal information exposed through data breaches can end up being traded on the dark web. There are ways to check whether your information has been compromised:

  • Check for email address leaks at Have I Been Pwned (haveibeenpwned.com)
  • Use your password manager's dark web monitoring feature
  • Take advantage of your credit card company's fraud monitoring service

If a leak is confirmed, follow the steps outlined in our data breach response guide to take immediate action.

Common Misconceptions About the Dark Web

Several misconceptions about the dark web are widely held:

  • "Accessing the dark web is illegal" — In most countries, using Tor and accessing the dark web is perfectly legal. What's illegal is engaging in criminal activity once there
  • "The dark web is completely anonymous" — While Tor provides a high degree of anonymity, it is not absolute. Operational mistakes or technical vulnerabilities can lead to identification
  • "The dark web is enormous" — In reality, it is very small compared to the surface web