Accessing The Dark Net
Accessing The Dark Net
Accessing The Dark Net
Kenji Logie
12/26/2016
Introduction
The Dark Net (Tor/Onion) project was started by Paul Syverson along with two students
Michael Reed and David Goldschag. According to Sir David Omand in his article The Dark
Net Policing the Internets Underworld the Dark Net started as a U.S. Naval Research
Laboratory to allow military units and field agents to communicate online without being
identified and tracked (Omand, 2016). The research team also believed it could be used as
an alternative to access military websites if for some reasons the regular version of the site
was inaccessible due to hostile attacks or not reachable for another reason (Omand, 2016).
Omand describes the Tor browser as software able to send communications over the
Internet, including requests for access to Dark Net services that are automatically wrapped
volunteer network of some 6,000 servers (Omand, 2016). This randomness and multiple
levels of encryption which utilizes rerouting servers which are unaware of the origin of the
request protects its user from being monitored, and the origin of the request is thought to
be impossible from determining. The researchers also realized that if all the traffic on the
site was military with high level secrecy level it would be vulnerable to being compromised
if an organization or foreign government was able to connect to the onion router. To prevent
this in 2003 the project was placed in the public domain and the civilian population was
allowed to use it blending the traffic transmitted over the network while still providing
The original researchers who worked on the project never envisioned that their software
would allow persons living in highly censored societies or military conflict a chance to share
their stories, and those of their fellow countrymen without fear of being identified and
penalized for their pictures or post. On the other end of the spectrum they never saw the
Page 1 of 17
billion dollar business of Silk Road and Drug Haven where criminals and persons looking
for recreational drugs can secure them in a safe space (Omand, 2016). On the dark net both
criminals and oppressed are equally protected, which forms the foundation of the two most
significant questions of this paper; where is the dark net and more importantly how does
someone access this hidden section of the internet, which is home to both villains and
Before we can answer these questions the terms dark net and deep web must be defined for
the purpose of this paper. The deep web is defined as the part of the internet comprised of
all the web pages that aren't indexed by search engines, such as intranets (Weisskopf,
Shopping on the dark net, 2015) . Carmen Weisskopf in her Shopping on the Dark Net
interview describe the dark net as the part of the deep web is encrypted and accessed
through TOR browsers to hide where you come from (Weisskopf, Shopping on the dark net,
2015). Also, for the purpose of this research paper the terms dark net and dark web will be
used interchangeably.
This paper will seek to examine how individuals gain access to the dark web and what they
can potentially discover while trying to gain access to the dark web. The researcher will use
some of the top ten search engines used in the US to discover what a user may encounter if
they were to query How do I access the dark web. The researcher will also examine the
sites someone is likely to visit in the top 10 results to this query, depending on their
propensity to take risk while researching the dark web. Finally an examination of student
testimonies will be done to determine why someone would want to access the dark web and
Page 2 of 17
Search Engine results to How to access the dark web query
The most common place for anyone seeking information about an unknown in 2016 is the
internet, in particular search engines and the Dark Web is no different. With this in mind
the researcher first determined the top twelve search engines in the world to determine the
type of information someone researching the dark web would come across. Given the scope
of the research some limitations were placed. First, search engines used predominately by
non-English speakers were omitted. Second, a single query was used for all the search
engines to compare the results returned by the different search engines for significant
similarities and differences. Finally, only the first 10 results of each search engine were
considered since, it is common knowledge that the average user does not normally go past
According to Rahul Biswal in his article Top 10 Best Search Engines in the World the top
search engines in order of use are: Google, Bing, Yahoo, Baidu, AOL, Ask.com, Excite,
DuckDuckGo, WolframAlpha, Yandex, Lycos, Chacha.com (Biswal, 2016). For the purpose
of this paper Baidu, Yandex were excluded due to their results being in a language other
than English and their audience being non-English speakers, WolframAlpha was excluded
since it does not return webpages but answers to data queries, and Chacha.com because it
When the search engines were asked to return results for the query how do I access the
dark web it was surprising the level of overlap between the search engines. Six out of seven
(Bing, Yahoo, DuckDuckGO, AOL, Excite, and Lycos) of the search engines returned an
article from the website straightdope.com as the top search result. Ask.com the only search
engine not to return the straightdope.com article returned the Wikipedia dark net page as
the top result; the Ask search engine also did not list the straightdope.com article as one of
Page 3 of 17
its top 10 search results. Later in this paper the implications of a website with a name like
straightdope.com and the type of person who would use this webpage to investigate
accessing the dark web will be discussed. 3 out of 7 of the search engines placed YouTube
instructional videos above the top search result and a 4th website included YouTube videos
in its top 10 search results for the query; these YouTube videos were the same and
appeared in the same sequence on the search engines results page. After an analysis of the
top 10 results from each search engine the level of overlap between the results was
significant and would be noticeable to even a casual observer. Also noteworthy was the
following rests:
4 of the results returned by all the search engines appeared in the list of the top 10
3 other results appeared on 6 of the search engines top 10 results with the exclusion
being ask.com.
The other results appeared on 2 or less of the search engines top 10 results.
With 7 of 10 results appearing on 6 or more of the 7 search engines the search engine used
is in no way a factor as it relates to gaining access to the dark web. It is an irony not lost on
the author that to gain access to the unindexed part of the internet search engines which
are used to index the clear web are used to retrieve the instruction manual to access the
Page 4 of 17
Conservative vs. Frontier Pushers (Mainstream Publications vs. Blogs)
Based on the search results a user chooses to interact with, their image of the dark web
how well informed they are about securely accessing it, and skepticism about how useful
the dark web will be will be formed by the type of publication they choose to interact with
while trying to access the dark web. We will examine the type of websites used to access the
dark net from 3 prospective; the top three result user, Blogs and mainstream publications.
YouTube videos are seen as the compromised between these three perspectives and will be
examined separately.
The first type of user we will consider is one who uses the top three search results from a
search engine. Given the fact that the top three results of the 7 search engines at most
differ by one result, users who only use the top three will be given access to the same
content regardless of the search engine chosen. With the exception of ask.com all the other
search engines offer the same top result. The results webpage offers no conceivable method
of accessing the dark net. The second or third result on all 7 search engines offer step-by-
step instructions on accessing the dark net; with at least one of them discussing the
importance of security and use of VPNs when attempting to access the dark net.
The number of reputable news organizations and publications in the search engine results
for accessing the dark net was capped at a maximum of 2 per search engine used. These
publications clearly outline Tor, how to obtain it and install it. None of these publications
keep any of the required .onion URLs in the body of their articles instead provides links to
sources outside of their domain name, which provided the actual list of .onion URLs. Some
of these sites actually provide slightly inaccurate information with the Business Insider
writer Brandt Ranj in his article How to access the Dark Web, where all sorts of illegal
stuff goes down online claiming that online activist created the dark net to share
Page 5 of 17
information using a private method (Ranj, 2016). This statement is inaccurate, as stated
earlier in this paper it was created initially to allow government and military officials to
transmit data securely. It was also apparent that the business insider considered Tor
private and secure on its own and omitted any reference to the use of VPNs while accessing
the dark net. In comparison Don Patterson in his Tech Republic article Is your business
data on the Dark Web? integrated security into his step by step instructions to access the
dark net (Patterson, 2016). Patterson suggest using Tails in combination with Tor to access
the dark net; Tails is an operating system which is accessible through removable drives,
allowing you to use any computer, even your own anonymously since, its use and operating
system isnt limited to a particular computer (Patterson, 2016). Persons using mainstream
publication to learn how to access the dark net will gain access however, depending on the
article read there will be issues regarding anonymity and security, along with requiring a
leap of faith that the links in the article are trustworthy to click on to obtain .onion domain
names.
The main category of webpages returned from the search engines were blogs, which
composed of 60% 80% of the search engine results. The information provided by the blogs
varied significantly and was determined by the primary focus of the writer of the article.
Blogs which discussed the dark markets and its illegal contents tend to offer little
information regarding accessing the dark net. A key indicator regarding the usefulness of a
blog was whether the instructions were in numerical order and contained information
regarding the Tor browser. The blog search results also varied regarding their emphasis on
security. Some blogs also offered .onion URLs but, similar to mainstream publication
articles many contained links to other sites which hosted the .onion URLs or images of the
Page 6 of 17
.onion URLs. Blogs tend to appeal to a more adventurous type and the well written ones
contained a more detail account of the dark net than any of the mainstream articles.
The third category of search results were YouTube videos which offered a compromise
between blogs and mainstream media articles along with the added security of not needing
to click on unfamiliar links. All of the YouTube videos on the search result page provided
detailed, step-by-step instructions on accessing the dark web. They also provided the added
convenience of being able to see what should be downloaded, how to set up the browser, the
result of each click, and what the .onion URL page should look like when entered into the
browser.
Based on the results of the search engines they offer very little variation in the content
offered when seeking a way to access the dark web. The content of the blogs, mainstream
publication articles, and YouTube videos all offered detailed instructions regarding a way to
access the dark web. Where these mediums differed was regarding security when accessing
Page 7 of 17
VPNs and the Dark Web
While the dark web offers a refuge for activists and criminals alike to conduct activities, to
truly improve your chances of remaining anonymous, additional level of anonymity should
be obtained by utilizing a virtual private network (VPN). Kavitha and Rao in there article
Connect Users to Private Networks Securely over Public Networks using Virtual Private
over a public network using encryption, authentication and integrity protection (Rao &
Kavitha, 2015). They describe the use of VPNs as a person possessing the security of a
private network over public communication; combining the benefits of private and public
networks (Rao & Kavitha, 2015). For the purpose of this paper the only VPN architecture
being considered is Remote VPN Access. Remote VPN access is defined as one which allows
single computer user to connect to a network and use its resources from a remote location;
the data packets are given the appearance of originating from the remote server (Rao &
fact that VPNs can perform this function by utilizing SSL agreements, network packet
camouflage by using file servers, dummy packet data, random transit communication
points, and special security surfers (Lu, 2015). This principle of misdirection and
transmitting data through multiple servers is similar to the Tor browsers use of multiple
nodes. While its clear that VPNs have a beneficial function, the question regarding why
they are essential in accessing the dark net must still be answered. Lucian Constantin in
his article 5 Things You Need to Know About Virtual Private Networks believes
protection provided by these networks is essential for anyone using an open network, or
more importantly live in a region where the government monitors Internet traffic
Page 8 of 17
(Constantin, 2016). Constantin however warns that all VPNs do not provide the same level
of protection, with some opting for speed using point-to-point tunneling protocol while
others at a reduced speed offer most security utilizing open VPN or SSL/TLS (Constantin,
2016). In the case of accessing the dark net this definitely pragmatic and essential to utilize
a VPN that increases the level of security and anonymity even if your activities are
completely legal.
Page 9 of 17
The Deep Web
As defined earlier the deep web the part of the internet that is comprised of all the
unindexed part of the internet (Weisskopf, Shopping on the dark net, 2015). Or more
precisely it was defined in Publishing Deep Web Geographical Data as a term to make a
contrast with the surface web, referring to data sources with back-end databases that are
only accessible through a query interface (Piccinini, Casanova, Leme, & Furtado, 2014).
According to the authors of the article Selecting queries from sample to crawl deep web
data sources the deep web contains more data than available on the clear net sometimes in
formats other than hyperlinks preventing search engines from indexing its content (Wang,
Lu, Liang, Chen, & Liu, 2012). While it is true that the dark net resides on the deep web
the dark net and its encrypted Tor accessible web pages only make up a small fraction of
the deep web. It is easy for someone new to accessing the dark net with little or no
understanding of the dark net to confuse a deep web site as a dark net site.
The key component of distinguishing a deep web site from the more specific dark net
website is twofold; was the Tor browser used to open the URL and secondly did the URL
have the .onion domain. Only by passing these two requirements could a user be assured of
the content being accessed residing on the dark net. The only questions left to answer are
what content exclusive of Tor is available on the deep web, the type of URLs. The most
notable sites comprising the deep web are government intranets that include; state court
case records, library databases, and state issued licenses. Some examples of these websites
include:
Page 10 of 17
The deep web sites as described earlier are webpages that cannot be indexed which is a key
feature of queries regarding government data. Another common type of data stored on the
deep web is achievable newspaper articles, and books. While this information is considered
deep web it can be accessed using the regular browser, and the lack of the correct domain
Page 11 of 17
Student Testimonials Regarding Accessing the Dark Web
While researching the dark net the researcher of this paper had the opportunity to discuss
accessing the dark net with three students. These discussions proved to be invaluable in
providing an alternative view to the dark net not raised by the blogs, videos, or news
articles. This section will be broken down into three parts; first it will be a discussion about
similarities in opinions regarding the dark net, second a discussion regarding the students
differences of opinion regarding the dark net, and finally their misconceptions regarding
All three students were of the opinion the dark net is a place with research material and
books not available on the regular Internet. They were also all aware of the Tor browser
and the requirement of using it to access dark net web pages. None of the students would
recommend accessing the dark net to their family and friends; they believe that navigating
the dark web requires a specialized set of skills. They also did not believe preserving the
dark net .onion on their computers for future use was necessary.
The students also had varying views on a number of issues regarding the dark net along
with experiences. Student 1 was familiar would bit coins and the dark market; while not
going into great detail about his experience during our discussion it was clear that he had
at minimum acquired bit coins, and possibly used one of the dark net sites to make a
purchase. Student 2 claimed she was able to access the dark net using a service other than
Tor; given the limited scope of the research question this service was not explored. The
third student was able to use the dark net to find research on topics not readily available or
Page 12 of 17
The students also had some obvious misconceptions regarding the dark net. Student 3
believed the Tor browser and VPNs provided the same function, he also believed that using
Tor provided better security than VPNs. He believed that VPNs knew your IP address
while Tor has a way of keeping it hidden even from Tor. Student 2 believed that .onion was
not the only domain name used on the dark web. This student possibly at one time
stumbled onto a deep website site and was under the assumption that a deep web site
accessed using a regular web browser was a dark net site. Student 2 believed that Tor
The student testimonials regarding the dark web show a level of comfort with using the
dark net as they would a clear website. They also exhibit a level of belief in security albeit
false in their anonymity on the dark net because of Tor. While dark net URLs tend to be
dynamic in nature especially regarding dark markets, it was surprising that no student
considered storing a .onion URL to preserve access to the dark net at a later date. The
student who mistook the deep web site as the dark net webpage is not surprising
occurrence since, many dark web blog pages make little distinction between the two and in
Page 13 of 17
Limitations of Research
While this research paper successfully addresses the topic of accessing the dark net, it
The researcher assumes someone trying to access the dark net will use a top 10
The researcher assumes that closely related search terms to the one chosen will
The researcher assumes someone trying to access the dark net only utilizes the top
10 search results.
YouTube videos being the compromise when selecting a top 10 result for a search
engine query.
The researcher assumes that Tor browser is the only way to access the dark net;
since the other methods do not appear in any of the top 10 results. The researcher is
aware of technology like I2P given the results of the query it was unnecessary to
The researcher also takes the position that discussing the technical details of Tor
Page 14 of 17
Conclusion
It can be concluded that it is possible to answer the question of how do I access the dark
net, using a search engine. It is also clear that the search engine used does not affect the
results to the question. The research into this topic showed that search engines in 85% of
the cases returned the same top result. The top three results were also in most cases
indistinguishable between the search engines. With 70% of the results in 85% of the search
engines being the same with the only variation being the order in which they appear. It was
also clear that blog websites, mainstream publications, and videos all offered instructions
that would allow you to access the dark net. Blog websites provided greater information
regarding how to anonymously and with a greater level of security access the dark net.
YouTube provided the most comprehensive access tutorial including both Tor installation
and the .onion websites required to access the dark net. The blogs and mainstream
publications occasionally had misinformation regarding what the dark net is and in many
cases confusing it with the deep web, however this misinformation holds little bearing on a
person being able to actually accessing the dark net. This misconception is comparable to
the way the terms Internet and World Wide Web are used.
The researcher was also able to determine which VPN protocols offer the greatest security
to users online and most specifically on the dark net. A combination of academic research
and the blogs provided evidence that when selecting a VPN a person should look for one
which utilizes open VPN or SSL/TLS as opposed to point-to-point tunneling. While VPNs
are not essential in accessing the dark net they improve the level of safety, security and
The dark net has been around publicly for over a decade yet it was surprising to the
researcher how little the general public, reporters, and technology enthusiast understood
Page 15 of 17
about accessing, identifying, and utilizing it safely. It has demonstrated its ability to keep
the most vulnerable Internet users safe in geographical regions with high levels of
atrocities committed. As time passes and Internet users continue to look for greater privacy
the dark net will become essential and accessing it will become easier and safer. The
researcher is of the hope and belief that instead of users having to learn about the dark net
search engines and browsers will integrate Tor technology and onion router services into
Page 16 of 17
References
Biswal, R. (2016, October 15). Top 10 Best Search Engines In The World. Retrieved from eCloudBuzz:
http://www.ecloudbuzz.com/top-10-best-search-engines-in-the-world/
Constantin, L. (2016). 5 things you need to know about virtual private networks. CIO (13284045), 1.
Omand, S. D. (2016). The Dark Net Policing the Internets Underworld. World Policy Journal, 75-82.
Patterson, D. (2016, July 11). Security: Tech Republic. Retrieved from Tech Republic:
http://www.techrepublic.com/article/how-to-safely-access-and-navigate-the-dark-web/
Piccinini, H., Casanova, M., Leme, L., & Furtado, A. (2014). Publishing deep web geographic data.
GeoInformatica, 769-792.
Ranj, B. (2016, May 23). Tech Insider: Business Insider. Retrieved from Business Insider:
http://www.businessinsider.com/how-to-access-the-dark-web-using-tor-2016-5/#what-is-the-
dark-web-1
Rao, B. B., & Kavitha, S. (2015). Connect Users to Private Networks Securely over Public Networks using
Virtual Private Networks. International Journal of Advanced Research in Computer Science, 4-7.
Wang, Y., Lu, J., Liang, J., Chen, J., & Liu, J. (2012). Selecting queries from sample to crawl deep web data
sources. Web Intelligence & Agent Systems. , 75-88.
Weisskopf, C. (2015, 12 19). Shopping on the dark net. (C. Weisskopf, & A. George, Interviewers)
Page 17 of 17