Cybersecurity Education

Understand the
Dark Web.

A comprehensive, technical guide to Tor, onion routing, anonymity layers, and the real architecture behind the internet's hidden network.

Scroll to explore

The Internet Has Layers
What we call "the internet" is really only the visible surface. Underneath it exist layers of networks that require special tools and knowledge to access — each with different purposes, users, and risk profiles.
Surface Web ~5% — Google-indexed sites, social media, news
Deep Web ~90% — Databases, intranets, medical records, paywalled content
Dark Web ~5% — .onion sites, only reachable through Tor

Surface Web

Everything that traditional search engines can find and index. This includes news sites, social media platforms, e-commerce stores, and public-facing websites. It represents a surprisingly small fraction of total web content.

Deep Web

Content that isn't indexed by search engines but isn't inherently sinister — your email inbox, banking portals, academic databases, private corporate intranets, medical records, and content behind paywalls. You access the deep web every day.

Dark Web

A small subset of the deep web that requires special software — specifically the Tor Browser — to access. Sites here use .onion addresses instead of traditional domains. The dark web exists because of legitimate privacy needs: journalists communicating with sources, activists in authoritarian regimes, and privacy-conscious individuals.

While illegal activity does exist on the dark web, that's also true of the regular internet. The technology itself is neutral — it was originally developed by the U.S. Naval Research Laboratory for secure intelligence communications.


A Brief History of Tor
From U.S. Navy research project to the world's most important anonymity network.
1995

Onion Routing Conceived

Researchers at the U.S. Naval Research Laboratory — David Goldschlag, Michael Reed, and Paul Syverson — develop the concept of onion routing for protecting intelligence communications online.

2002

Tor Alpha Released

Roger Dingledine and Nick Mathewson, along with Syverson, deploy the Tor network alpha. The name "Tor" originally stood for "The Onion Router."

2004

Tor Goes Public

The Naval Research Laboratory releases the Tor source code under a free license. The Electronic Frontier Foundation (EFF) begins funding Tor development.

2006

The Tor Project Founded

The Tor Project, Inc. is established as a 501(c)(3) nonprofit organization dedicated to maintaining and advancing the Tor software.

2008+

Tor Browser Bundle

A user-friendly browser based on Firefox is packaged with Tor, making anonymous browsing accessible to non-technical users. The .onion ecosystem begins growing rapidly.


How Tor Actually Works
Tor routes your traffic through three relays (nodes) around the world, encrypting it in multiple layers. No single node ever knows both who you are and what you're accessing.
👤
You
Your device
3× encrypted
TLS tunnel
🛡
Guard Node
Entry relay
2× encrypted
Peeled 1 layer
🔀
Middle Node
Relay
1× encrypted
Peeled 2 layers
🚪
Exit Node
Final relay
Plaintext*
To destination
🌐
Destination
.onion / clearnet

👆 Click any node or encryption badge to learn more

Each node in the Tor circuit has a specific role — click one to see what it knows and can't see. You can also click the encryption labels between nodes (like "3× encrypted") to understand what each encryption state means and why it matters.

🛡

Guard / Entry Node

The first relay your traffic touches. It knows your real IP address but cannot see what you're requesting or where traffic ultimately goes. You keep the same guard node for 2–3 months to resist certain profiling attacks.

🔀

Middle / Relay Node

The anonymous intermediary. It only knows the guard node sent it traffic, and that it needs to forward it to the exit node. It can't see your IP or your destination. Its entire purpose is to break the link between origin and destination.

🚪

Exit Node

The final relay that sends your request to the actual internet. It can see the destination and any unencrypted traffic content, but it has no idea who you are. If you visit an HTTPS site, the exit node only sees encrypted data. For .onion sites, there is no exit node at all.

Key principle: No single node in the Tor circuit knows both the sender and the destination. The guard knows who but not where. The exit knows where but not who. The middle knows neither. This is the fundamental guarantee of Tor's design.


Onion Services (.onion)
When you visit a .onion address, there is no exit node at all. Both you and the server are anonymous, and all traffic remains inside the Tor network end-to-end.

How .onion Addresses Work

An onion service generates a public-private key pair. The .onion address is derived from the public key — for v3 onion services, it's a 56-character base32-encoded string ending in .onion.

The server publishes "introduction points" to the Tor network. When a client wants to connect, both sides build circuits to a mutually agreed "rendezvous point," so neither side reveals their IP to the other.

This means .onion sites never touch the regular internet. There's no DNS, no exit node, no IP exposure. The connection is end-to-end encrypted within Tor.

Why This Matters

Onion services provide the strongest anonymity model Tor offers: both parties are hidden. This is used for sensitive applications like SecureDrop (media whistleblowing platform), the Facebook .onion mirror, and ProtonMail's .onion access.

Because both sides build their own circuits that meet at a rendezvous point, an attacker would need to compromise six relays simultaneously (three in each circuit) to deanonymize the connection — a dramatically harder attack than compromising a standard three-node circuit.

v3 addresses: Modern .onion addresses are 56 characters long and use Ed25519 public key cryptography — a significant security upgrade from the older 16-character v2 addresses.


Layered Encryption
Tor wraps your data in multiple layers of encryption — like the layers of an onion. Each relay peels off exactly one layer, revealing only the instructions for the next hop.
🟣
Layer 3 — Guard Key Outermost encryption
🔵
Layer 2 — Middle Key Second encryption layer
🟢
Layer 1 — Exit Key Innermost encryption
📄
Your Data Original plaintext
Your data starts wrapped in three encryption layers. Click "Peel a Layer" to see each relay strip its layer.

The Encryption Process

When your Tor client builds a circuit, it negotiates a unique symmetric encryption key with each of the three relays using Diffie-Hellman key exchange. None of these keys are shared between relays.

Before sending your data, the client encrypts the payload three times — first with the exit node's key, then the middle node's key, then the guard node's key. Each relay decrypts one layer with its key and forwards the result.

Why Layered?

If the client used a single encryption key, any relay that obtained it could read the traffic. With layered encryption, compromising one relay reveals nothing — you'd need all three keys to reconstruct the original data.

This is also why Tor circuits are rotated every 10 minutes for new connections. Even if an adversary is statistically analyzing traffic patterns, frequent circuit rotation limits how much correlated data they can gather.


VPN + Tor: The Nuanced Truth
This is one of the most debated topics in the privacy community. The answer isn't a simple yes or no — it depends on your threat model and what you're trying to protect against.
Configuration What ISP Sees What Guard Sees Risk Profile Verdict
Tor Only You're connecting to Tor (visible entry node IPs are public) Your real IP address ISP knows you use Tor but can't see content Sufficient for most
VPN → Tor You're using a VPN (doesn't know it's Tor) VPN's IP address, not yours VPN provider could log that you use Tor; adds latency Situational
Tor → VPN You're connecting to Tor Your real IP address VPN sees traffic destination; becomes a fixed exit point; defeats Tor's rotation Not recommended
Tor with Bridges Encrypted traffic to unknown IP (doesn't look like Tor) Your real IP (bridge is the guard) Best for hiding Tor usage from ISP without trusting a VPN Best alternative

Does VPN + Tor Draw More ISP Attention?

This is a common misconception. Your ISP can see that you're connecting to known Tor entry nodes (the list of guard node IPs is public). Adding a VPN hides the Tor usage from your ISP — they only see VPN traffic.

However, using a VPN is also visible to your ISP, and in some contexts VPN usage itself may draw scrutiny. The more important question is: does your threat model require hiding Tor usage from your ISP?

For most users in democratic countries, ISP visibility of Tor is not a practical concern. For users in restrictive environments where Tor is blocked or surveilled, Tor bridges (especially with pluggable transports like obfs4 or Snowflake) are the recommended solution — not VPNs.

The VPN Trust Problem

When you use VPN → Tor, you're moving trust from your ISP to your VPN provider. Your VPN now knows your real IP and that you're using Tor. You're betting that your VPN provider is more trustworthy than your ISP — and that they truly keep no logs.

The Tor Project's official stance is nuanced: they don't universally recommend or discourage VPN + Tor, but emphasize that most users don't need it, and misconfiguring it can actually weaken anonymity.

The Tor Project recommends: If you need to hide Tor usage, use bridges with pluggable transports rather than VPNs. Bridges are unlisted entry points that make your traffic look like normal HTTPS — no VPN trust required.


What Tor Protects Against
(And What It Doesn't)
No tool provides absolute anonymity. Understanding what Tor can and cannot do is critical to using it effectively.

✓ ISP Surveillance

Your ISP can see Tor usage but cannot see what sites you visit, what data you transmit, or your browsing behavior. All traffic between you and the guard node is encrypted.

✓ Website Tracking

Websites see the exit node's IP, not yours. Combined with Tor Browser's anti-fingerprinting features (uniform window size, disabled WebGL, spoofed user-agent), you blend in with all other Tor users.

✓ Local Network Snoopers

Anyone monitoring your Wi-Fi (coffee shop, hotel, university) only sees encrypted Tor connections — no browsing content leaks through.

⚠ Traffic Correlation

A powerful adversary monitoring both your entry and destination traffic simultaneously could potentially correlate timing patterns. This is Tor's hardest unsolved problem, but requires nation-state resources.

⚠ Browser Exploits

If the Tor Browser has an unpatched vulnerability, an attacker could execute code that bypasses Tor entirely. This is why keeping Tor Browser updated is essential, and why the security slider exists.

✗ User Behavior

Tor cannot protect you from yourself. Logging into personal accounts, providing identifying information, enabling JavaScript on untrusted sites, or downloading files that execute outside Tor all break anonymity.

✗ Endpoint Security

If your device is already compromised with malware or a keylogger, Tor is irrelevant — the attacker can see everything before it enters the Tor circuit. Device security is a prerequisite.

✗ Global Passive Adversary

An entity that can observe all internet traffic simultaneously (theoretically, a coalition of intelligence agencies) could defeat Tor through traffic analysis. Tor does not claim to defend against this threat model.


Operational Security Essentials
The technology is only as strong as the human using it. Most deanonymization happens through user mistakes, not Tor vulnerabilities.
🔒

Security Slider

Tor Browser includes a security level setting (Standard, Safer, Safest). Higher levels disable JavaScript, remote fonts, and media — dramatically reducing your attack surface at the cost of usability.

🪪

Identity Separation

Never mix your anonymous and real identities. A single login to a personal account, one revealing search query, or a reused username can permanently link your Tor session to your real identity.

📁

File Handling

Downloaded files (especially PDFs and Office documents) can contain resources that load outside Tor when opened. Always open downloads in a disconnected environment or use Tails OS, which forces all traffic through Tor.

Timing Discipline

Consistent connection patterns (same time every day, same session length) can be used to profile users. Varying your usage patterns adds noise to any potential correlation analysis.

🖥

Dedicated Environment

For serious anonymity needs, use Tails (amnesic live OS that routes everything through Tor) or Whonix (isolated VM-based Tor gateway). These prevent accidental traffic leaks that a normal OS can cause.

🔍

Metadata Awareness

Even encrypted content has metadata — file creation dates, GPS data in images, document author fields. Strip metadata from any files before sharing them anonymously.


Frequently Asked Questions
In most democratic countries, using Tor is completely legal. It's a privacy tool, no different in legal status from a VPN. However, some authoritarian countries block or discourage Tor usage. The legality of any activity conducted through Tor follows the same laws as the regular internet — Tor is a transport tool, not a legal shield.
Yes, by default. Your ISP can see you're connecting to known Tor relay IP addresses (the list is public). They cannot see what you're doing on Tor. If hiding Tor usage is important, use bridges with pluggable transports — obfs4 makes Tor traffic look like random noise, and Snowflake makes it look like a WebRTC video call.
Not at all. Incognito mode only prevents your browser from saving local history — your ISP, employer, and the websites you visit can still see everything. Tor Browser routes traffic through three relays, changes your IP, blocks fingerprinting, isolates cookies per-site, and makes all users look identical to web servers. They are fundamentally different technologies solving different problems.
Your traffic bounces through three relays across the globe, each adding latency. Each relay also has limited bandwidth shared among all users routed through it. Additionally, the cryptographic operations at each hop add processing overhead. The Tor network has improved significantly in speed over the years as relay bandwidth has grown, but it will always be slower than a direct connection — that's the inherent cost of layered anonymity.
Bridges are unlisted Tor entry points that aren't published in Tor's public directory. Since ISPs and censors block Tor by blacklisting known relay IPs, bridges provide an unblockable entry point. Combined with pluggable transports (obfs4, meek, Snowflake), bridge traffic is disguised to look like normal HTTPS or WebRTC. Use bridges if you're in a country that blocks Tor, on a network that blocks Tor, or if you want to hide the fact that you're using Tor from your ISP.
Tor is optimized for anonymous access to the regular internet (and .onion services). I2P is a peer-to-peer network focused on internal communication between I2P users (called "eepsites"), with garlic routing instead of onion routing — it bundles multiple messages together. Freenet is a distributed data store focused on censorship-resistant publishing and file sharing, where content is stored in encrypted chunks across participating nodes. Each tool has a different design philosophy and threat model.
In targeted investigations, law enforcement has historically used browser exploits (deploying malware through compromised .onion sites), traffic correlation (with cooperation from ISPs), operational security mistakes by targets (reusing usernames, logging into personal accounts), and traditional investigative methods. Tor itself hasn't been "broken" — most successful deanonymizations exploit human error or software vulnerabilities, not weaknesses in the onion routing protocol itself.
You can, but there are trade-offs. Tor is slower, many sites present CAPTCHAs or block Tor exit nodes, and some services may flag your account for "suspicious" logins. For everyday privacy, a combination of a reputable VPN, a privacy-focused browser (Firefox with hardened settings, or Brave), and good digital hygiene often provides a better balance of privacy and usability. Reserve Tor for situations where strong anonymity is specifically needed.