The internet is vast, yet an enormous chunk of it is still untouched by the ordinary world. For most of us, the web is limited to ten twenty or maybe fifty websites. Most of this limited collection is in the form of Google sites and services. In reality, the internet is enormous, and it has around one billion websites existing on servers around the globe.

Even with those billion websites, the web isn’t complete. Many believe the World Wide Web we see is only the tip of an iceberg. Two terms Darknet and Deep Web, in some sense, justify the presence of this hidden web about which most people are unaware. And those who know about the darknet often confuse it with deep web. Whereas, both are completely separate.


It is parts of the World Wide Web whose contents are not indexed by standard search engines (google, yahoo, Bing, etc.) for any reason. The content is hidden behind HTML forms

The first conflation of the terms "deep web" and "dark web" came about in 2009 when the deep web search terminology was discussed alongside illegal activities taking place on the Freenet darknet

The Darknet

It is an encrypted network built on top of the existing internet, and specific software or tools are required to access the darknet. It is possible, conventional protocols used on the internet might not work on the darknet.

Darknet provides anonymity to the users. One such darknet is Tor or The Onion Router. You require the Tor browser to enter into the Tor’s network.

The darknet is a network, and the deep web constitutes the chunk of the World Wide Web that is beyond the reach of the search engines.

How to access the Dark Web

Technically, this is not a difficult process. You simply need to install and use Tor. Go to and download the Tor Browser Bundle, which contains all the required tools. Run the downloaded file, choose an extraction location, then open the folder and click Start Tor Browser. That's it.

The Vidalia Control Panel will automatically handle the randomized network setup and, when Tor is ready, the browser will open; just close it again to disconnect from the network.

Depending on what you intend to do on the Dark Web, some users recommend placing tape over your laptop's webcam to prevent prying eyes watching you. A tinfoil hat is also an option.


It is impossible to measure, and harsh to put estimates on the size of the deep web because the majority of the information is hidden or locked inside databases. Early estimates suggested that the deep web is 400 to 550 times larger than the surface web. However, since more information and sites are always being added, it can be assumed that the deep web is growing exponentially at a rate that cannot be quantified.


It is not always possible to directly discover a specific web server's content so that it may be indexed, a site potentially can be accessed indirectly

To discover content on the web, search engines use web crawlers that follow hyperlinks through known protocol virtual port numbers. This technique is ideal for discovering content on the surface web but is often ineffective at finding deep web content. For example, these crawlers do not attempt to find dynamic pages that are the result of database queries due to the indeterminate number of queries that are possible.

Services available on deep Web
  • Hiring Hackers in Tor network
    1. Data of Competitor, Competitor Espionage
    2. Computer Hacking and spying Services
    3. Atlantic Carding – Credit card data theft
    4. Phone Syphoning
    5. Hire an hacker, Botnet, exploit kit, 0day, Crypter, DDoS, Doxing, Spam, Malware, Money laundering services
  • Cheap SWATting Service: SWATting is the act of obtaining a victim’s IP address and then anonymously and falsely reporting a critical incident such as a bomb threat or hostage situation to that location.
  • Atlantic Carding: It is a service that sells credit card information, addresses. The more money you’re willing to spend, the better the info. Big spenders can even get access to business accounts and “infinite” credit cards with no limit.
  • Buttery Bootlegging: Here’s the deal: You want something expensive but don’t have enough money. I’m good at stealing and I need money…
  • Hitmen for Hire: The Deep Web is home to numerous murder-for hire sites
  • Euroarms: illegal arms trade

The core principle of Tor, "onion routing", was developed in the mid-1990s by United States Naval Research Laboratory employees and computer scientists with the purpose of protecting U.S. intelligence communications online Tor enables its users to surf the Internet, chat and send instant messages anonymously, and is used by a wide variety of people for both licit and illicit purposes Tor has, for example, been used by criminal enterprises, hacktivism groups, and law enforcement agencies at cross purposes, sometimes simultaneously; or is not meant to completely solve the issue of anonymity on the web. Tor is not designed to completely erase tracks but instead to reduce the likelihood for sites to trace actions and data back to the user. Tor is also used for illegal activities, e.g., to gain access to censored information, to organize political activities, or to circumvent laws against criticism of heads of state.

TOR Operation

Tor aims to conceal its users' identities and their online activity from surveillance and traffic analysis by separating identification and routing. It is an implementation of onion routing, which encrypts and then randomly bounces communications through a network of relays run by volunteers around the globe. These onion routers employ encryption in a multi-layered manner (hence the onion metaphor) to ensure perfect forward secrecy between relays, thereby providing users with anonymity in network location. That anonymity extends to the hosting of censorship-resistant content by Tor's anonymous hidden service feature. Furthermore, by keeping some of the entry relays (bridge relays) secret, users can evade Internet censorship that relies upon blocking public Tor relays.

TOR Originating traffic

A visual depiction of the traffic between some Tor relay nodes from the open-source packet sniffing program Ether Ape A Tor user's SOCKS-aware applications can be configured to direct their network traffic through a Tor instance's SOCKS interface. Tor periodically creates virtual circuits through the Tor network through which it can multiplex and onion-route that traffic to its destination. Once inside a Tor network, the traffic is sent from router to router along the circuit, ultimately reaching an exit node at which point the cleartext packet is available and is forwarded on to its original destination. Viewed from the destination, the traffic appears to originate at the Tor exit node. Tor's application independence sets it apart from most other anonymity networks: it works at the Transmission Control Protocol (TCP) stream level. Applications whose traffic is commonly anonymized using Tor include Internet Relay Chat (IRC), instant messaging, and World Wide Web browsing.

TOR Hidden Services

Tor can also provide anonymity to websites and other servers. Servers configured to receive inbound connections only through Tor are called hidden services. Rather than revealing a server's IP address (and thus its network location), a hidden service is accessed through its onion address, usually via the Tor Browser. The Tor network understands these addresses by looking up their corresponding public keys and introduction points from a distributed hash table within the network. It can route data to and from hidden services, even those hosted behind firewalls or network address translators (NAT), while preserving the anonymity of both parties. Tor is necessary to access hidden services.