Article Hero
Blog8 minutes read
September 19, 2022
  • telegram
  • facebook
  • twitter
  • github

Is the “Dark Web” Really So Dark? An Introduction to TOR

These days there is growing concern about how easy it is for personal data to be viewed, tracked, shared, or stolen. From bank details and credit card info to browser history and passwords. Add to this, the rise in government surveillance, and it seems that in the digital age, nothing is sacred.

For these reasons more and more internet users are becoming increasingly privacy-minded and looking for safer browsing solutions. Enter Tor.

In this article, you'll find Tor explained, including where it came from, who uses it, and explore why it's got such a bad rep. We'll also tell you where you can find a Tor browser download that's safe.


Tor explained: An introduction to the Tor browser

Tor is free and open-source software enabling anonymous communication. But Tor also provides a convenient cloak of anonymity to cybercriminals, allowing them to conduct their dirty deeds without detection.

For this reason, Tor is often referred to as “the dark web” giving off rather sinister connotations. It's a reputation that the Tor Project Inc, the non-profit in charge of keeping the Tor network alive, would probably say is unfair.

Their mission as stated on the Tor Project website is:

“To advance human rights and freedoms by creating and deploying free and open source anonymity and privacy technologies, supporting their unrestricted availability and use, and furthering their scientific and popular understanding.”

Hardly menacing.

So, where does this bad-boy-internet image come from?

To understand that, we first need to answer the questions of what is Tor, how did it come to be, how Tor works, and who is it designed for.

What is Tor?

You can't have a Tor explained article without going into a little technical history. Tor stands for The Onion Routing, which is why you sometimes see the dark web referred to as “the onion”.

So, “what is onion routing?” you ask.

Onion routing is a technique for transmitting data over the internet or a computer network anonymously. The communication protocol has multiple encrypted layers (much like an onion) which help to protect and hide both the senders and receivers of data over the network.

The Tor Browser acts as the gateway to the “Tor” onion network— a free, decentralized, worldwide, and volunteer network— through which internet users can communicate or browse the web anonymously. It's designed in such a way as to conceal users' identities and their activity from any government surveillance and make eavesdropping and general tracking more difficult.

A brief history of the Tor browser

The very first research designs and prototypes of onion routing were deployed in 1995 by David Goldschlag, Mike Reed, and Paul Syverson at the U.S. Naval Research Lab (NRL). It was initially designed and developed solely to be a privacy tool to protect US intelligence communications on the internet.

Fast-forward to the early '00s, when Roger Dingledine and Nick Mathewson, then-recent MIT graduates, joined forces with one of the original onion router developers, Paul Syverson.

Together they began working on a new project that would bring onion routing to the general masses and benefit the global online community, beyond the realms of US intelligence.

They named it Tor, to distinguish it from other onion routing projects that were beginning to appear around the same time.

In 2002, the Tor network was deployed and its code was released under a free and open software license. The project caught the attention of the digital privacy, free speech, and innovation organization, Electronic Frontier Foundation (EFF). With their funding and backing, the Tor Project Inc. was founded in 2006 as a non-profit.

Two years later, in 2008, work on the Tor Browser began as a means to enable onion network access to the wider public and non-tech-savvy internet users.

How does onion routing work?

We'll keep this simple. On an onion network, data is structured by “wrapping” it in layers of encryption and bouncing it randomly through a series of intermediary servers known as relay nodes or in this case Tor relays.

As it passes through the network, each Tor relay that receives the message peels away (decrypts) a single encrypted layer before passing it on to the next relay. The unwrapping process is repeated until the final layer is decrypted and the message reaches its destination.

The underlying data stays hidden as it is transmitted from relay to relay. Each relay node that interacts with a message only knows the location of the immediately preceding and following node. This means that no Tor relay ever knows both the origin AND the final destination. This in turn means that both the sender and receiver can remain anonymous.

Who is the Tor browser for?

Before you look into getting a Tor browser download, you need to know what character's you're like to meet on the dark web.

The media would have you believe that “the dark web” is only used for dark deeds committed by cybercriminals, drug lords, human traffickers, and the like. And while we can't deny that such characters do utilize Tor's anonymity function, they aren't the intended target market.

For the average internet user looking at memes and double tapping on their friend's foodporn pics, remaining anonymous might not be such a big deal. But the Tor Project believes that everyone should have the ability to explore the internet with privacy.

They've stated that their users tend to fall into three main categories:

  • Those who want to keep their internet activities private from website tracking cookies, fingerprinting, and advertisers;
  • Anyone concerned about cyberspying (Tor's user base skyrocketed after Snowden's NSA surveillance revelations in 2013);
  • Users, such as activists and journalists, who wish to hide their identity or evade strict censorship of the media and the internet.

Of course, military and intelligence bodies are also key users as well as bloggers, IT professionals, and law enforcement officers. Onion routing can be a useful tool for investigating the dark sites and services that the media like to warn you about.

Which brings us neatly to…

The dark side of Tor explained

Onion routing makes it possible for anyone to mask their identity and provide “hidden services”. Such hidden websites can only be accessed by Tor network users. It also hides the IP addresses of the service provider and the searcher. This level of anonymity makes it an attractive option and a powerful tool for criminals.

While the right to remain anonymous is not illegal, in fact, it is a fundamental human right, what people choose to do with that anonymity is where things can get very “dark”.

In February 2021, an international operation involving Europol, the UK's National Crime Agency, and the DEA, FBI, and IRS took down the world's largest illegal marketplace on the dark web.

“DarkMarket” was a marketplace selling drugs, counterfeit money, stolen or counterfeit credit card details, anonymous SIM cards, and malware. At the time of the bust, the site had half a million users, more than 2400 sellers, and over 320 000 transactions in cryptocurrencies amounting to €140 million ($170 million).

However, dark markets are highly lucrative enterprises and despite the takedown, multiple similar marketplaces have since popped up to take their place.

Is Tor safe to use?

If you're careful and avoid the dodgy sites full of criminals then using Tor can be a much safer way to browse the internet.

That said, Tor isn't perfect— it has its limitations. There are always people, websites, and third-party trackers who will be able to identify you, especially if you provide them with enough details.

The Tor network is a decentralized network made up of thousands of volunteer nodes, a characteristic that is both a strength and a weakness. It's harder to hack but it also means you can't be 100% certain about the security of each relay.

Another weak link in the Tor chain is the last node in the network, otherwise known as the exit node. At this point, the data message has been “unwrapped” of its encrypted layers, and if that exit traffic happens to include identifying information, the exit node could be abused.

Tor relays are usually run by upstanding internet users who genuinely believe in the mission of Tor, but “bad onions” do exist.

Here are a few handy tips for making Tor safe to use:

Keep personal details personal

If you're entering the onion network for privacy reasons, then keep your identity private. Handing over your personal data while using Tor is like going to a masked ball wearing a name tag. The mighty Onion can't protect you if you lack common sense!

If you don't want your Tor activity to be traced back to you, create a virtual identity or multiple, not connected to your real-world identity. Don't share your real name, email address, social media accounts, or anything else that could be used to identify the real you.

Make use of Tor security settings

The Tor Browser has three different security levels: Standard, Safer, and Safest. Click on the shield button located on the right of the Tor browser address bar and select “Advanced Security Settings”.

Standard: Every browser and website function is enabled. It will be the most comfortable browsing experience, but you may be at greater risk.

Safer: JavaScript on HTTP sites is disabled as are some fonts and symbols, and all audio and video will be click-to-play only. This can affect the functionality of some sites.

Safest: You get the same as above but the difference is that JavaScript is disabled on all sites. While it's the “safest”, only the most basic websites will work unimpeded. For example, Wikipedia will look exactly the same, but something like Imgur won't be usable.

Use Tor over VPN

Although Tor encrypts your traffic, your ISP can still see that you're using the browser. This can make some ISPs (and governments) suspicious. Even if you are just using it to look at memes!

Using a VPN with Tor can increase your anonymity, security, and privacy. But this is an approach best left to the more tech-savvy!

If you don't know how to configure both of them in just the right way you could actually compromise your privacy instead. You can check Tor's Wiki for extra reading on the subject.

Update your operating system

The Tor browser is only as secure as the system it's operating on. Make sure your device's OS is up to date, and you have a working firewall and a reliable antivirus system. Without this basic level of protection, attackers can get access to your computer's operating system, and then not even running Tor can protect your data or your digital communications.

Tor browser download

Now that you're aware of the dangers and how to protect yourself, it's time to learn how to access the Tor network safely. Luckily, it's not rocket science. All you have to do is go to the official Tor Project website, download Tor and launch the browser.

The Tor browser download is available for macOS, Windows, and Linux. If you want to use Tor on your smartphone, the only option is for Android with no official iOS version yet.

Image Source: Tor Project

If Tor is blocked in your country or network, there are alternative Tor browser download methods such as using an official Tor mirror such as Calyx Institute or sending an email stating your operating system and location to GetTor.

Only use “alternative download methods” that have been recommended by the official Tor Project.

After downloading and launching, you can use Tor just like you would a regular browser to access the regular internet, but anonymously. All of your web traffic will automatically go through the onion network.

The downsides to Tor explained

A possible downside to using the Tor browser is the fact that it may make it look like your connection is coming from a different country. This is going to be an issue for some websites, such as internet banking providers and email services. For their security systems, it will appear your account is being hacked and could result in you being locked out.

There is no real way to avoid this. If it does happen, the only thing you can do is jump through all the account recovery hoops or call the organization and explain the situation. Not ideal.

You're also likely to have a slower browsing experience simply because your requests have to pass through multiple relays. And, get used to seeing more annoying CAPTCHAs since Tor triggers the bot-hunting system more than regular browsers.

Tor explained: Dark or just misunderstood?

Tor has had a strong tech-savvy following, attracting privacy nuts (and cybercriminals alike) with its anonymity functions. But as public concerns over tracking, government surveillance, censorship, and exploitative browser behaviors increase, so too does Tor's popularity with mainstream internet users.

More people are waking up to the realization that their privacy, freedom of speech, and right to anonymity are at risk. While the Onion Router might not be a perfect solution, a Tor browser download will provide a safer alternative to regular browsing and a way to bypass censorship.

Onion routing technology, just like any other innovation, will always have its “bad actors”. Even the regular internet has sites that regular users would consider unsavory. By being aware of the dangers and taking the right security measures, you can get a Tor browser download and browse the web without being tracked, keeping your privacy intact. Enjoy and stay safe!

If you want to know why privacy is so important in the first place, check out 11 Quotes About Privacy That Prove You Need Hoody.

Ruby M
Hoody Editorial Team

Ruby is a full-time writer covering everything from tech innovations to SaaS, Web 3, and blockchain technology. She is now turning her virtual pen to the world of data privacy and online anonymity.

Latest


Blog
Timer7 minutes read

How the Government Hacks You, Final Chapter: IoT Hacks

Chapter 14: IoT Hacks

Will R
6 months ago
Blog
Timer9 minutes read

How the Government Hacks You, Chapter 13: GPS Tracking

Dive into the unsettling world of government-controlled GPS tracking!

Will R
6 months ago
Blog
Timer7 minutes read

How the Government Hacks You, Chapter 12: Garbage Day

Trash Talk: How your garbage can be exploited by hackers, law enforcement, and government agencies

Will R
7 months ago
Blog
Timer8 minutes read

How the Government Hacks You, Chapter 11: Resonance Attacks

It’s time to uncover how government surveillance gets personal.

Will R
7 months ago

Bulletproof privacy in one click

Discover the world's #1 privacy solution

  • Chrome Icon
  • Brave Icon
  • Edge Icon
  • Chromium Icon
  • Coming soon

    Firefox Icon
  • Coming soon

    Safari Icon
  • Coming soon

    Opera Icon

No name, no email, no credit card required

Create Key