Introduction: Separating Myth from Reality

The term "dark web" has become synonymous with fear in popular culture, frequently exploited in commercial advertisements that warn users their personal information may be compromised. These marketing campaigns, particularly those heard on public radio, often serve to keep users tethered to commercial Internet platforms rather than exploring privacy-focused alternatives.

What exactly is the dark web, and why does it garner such a bad reputation in the media? In this article, I'll untangle the mystery and misrepresentation surrounding the dark web while shedding light on its more positive aspects and legitimate uses.

Depending on who you ask, you may get different answers to the question "What is the dark web?" It's often equated with illicit activities taking place via the Internet and commonly used when referring to The Onion Routing network, or Tor, for short. However, this perspective oversimplifies a complex technology with legitimate origins and valuable applications.

Understanding Internet Architecture: A Foundation

Before diving into Tor, let's briefly explore the technical makeup of the Internet. The Internet as we know it today is nothing more than an amalgamation of different networking protocols working in concert to provide a feature-rich experience. Each protocol serves a specific purpose:

  • When browsing websites, we're using the Hypertext Transfer Protocol (HTTP) or its secure variant Hypertext Transfer Protocol Secure (HTTPS)
  • For remote work, we might use Microsoft's proprietary Remote Desktop Protocol (RDP) or Citrix's Independent Computing Architecture (ICA) protocol
  • Text messaging relies on the Short Message Service (SMS) protocol
  • Voice over Internet Protocol (VOIP) calls over the internet use Session Initiation Protocol (SIP) and Real-time Transport Protocol (RTP)

These aforementioned protocols represent only a fraction of the networking protocols used daily by individuals engaging on the Internet.

Each protocol, or service, operates on a designated port number. For connection-oriented protocols like TCP, there are 65,535 potential ports any service may use. The table below shows some common protocols and their associated port numbers:

Protocol (Full name)AbbreviationPort Number
Remote Desktop ProtocolRDP3389
Hypertext Transfer ProtocolHTTP/HTTPS80/443
Independent Computing ArchitectureICA1494
Short Message ServiceSMS2775
Session Initiation Protocol (VoIP)SIP5060/5061
Real-time Transport Protocol (VoIP)RTP8500-59999
The Onion RoutingTOR9050/9150

With the understanding that a myriad of protocols, or services, make up the Internet, Tor is just one more protocol to be added to the long list.

The Birth of Tor: Military Origins for Privacy Protection

Contrary to popular belief, The Onion Routing protocol wasn't created by cybercriminals. It was funded and developed by the United States Naval Research Laboratory in the mid-1990s—a fact that surprises many who associate it exclusively with illicit activity.

The fundamental concept behind Tor is elegant in its approach to privacy:

"Onion routing is a general approach to securing both routing and traffic-flow information for network communications by separating identification of network location from routing."

In its basic form, Tor uses public-key cryptography to build a cryptographic circuit along an unpredictable path of onion routers. Symmetric keys, established during path building, are then used to pass data back and forth between the path originator and a network destination, such as an Internet web server.

The technology was so innovative that the Onion Routing patent received the NRL Edison Invention Award in 2002. It was also identified as one of NRL's top 100 technology contributions to sea power and national security during its Centennial celebration in 2024.

How Tor Works: The Onion Metaphor

The name "Tor" isn't arbitrary—it reflects how the technology functions. Like an onion with multiple layers, Tor encapsulates your data in multiple layers of encryption. As your data passes through each volunteer-operated relay in the network:

  1. A layer of encryption is removed (just like peeling an onion)
  2. Only the information needed to send the data to the next relay is revealed
  3. No single relay knows both where the data came from and where it's going

This layered approach makes it extremely difficult to track the original user, providing significant privacy protection.

Who is using Tor

Tor websites are denoted by their use of the '.onion' Top-level domain in their URL. For example the following domains are accessible via Tor, and a Tor browser. Note the CIA has their very own Tor website

Duck Duck Go - Search Engine
https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/

Proton Mail - Secure Email Service
https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion/

CIA - US Central Intelligence Agency
https://ciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.onion/

As you can see from the URL of each Tor website, no one in their right mind would be able to seamlessly remember and type in the domain address to access the website. For this purpose, QR Codes are used to easily access Tor websites.

Beyond the Shadows: Legitimate Uses of Tor and the Dark Web

Despite its infamous reputation, Tor and the dark web serve several crucial legitimate purposes:

Protection for Vulnerable Users

  • Avoiding commercial tracking and targeted advertising
  • Journalists in repressive regimes use Tor to report safely
  • Whistleblowers like Edward Snowden have relied on Tor to communicate securely
  • Political dissidents in authoritarian countries depend on Tor for organizing

Freedom & Privacy for Everyday Users

  • No need to register or pay for domains
  • Share your deepest thoughts without any fear of recourse
  • Researching sensitive topics without creating a digital footprint
  • Preventing ISPs from monitoring browsing habits
  • Maintaining privacy from government surveillance programs

Research and Education

  • Academic research into privacy technologies
  • Security professionals testing network vulnerabilities
  • Training in cybersecurity and privacy protection

Future Implications

As mobile technology advances and privacy awareness grows, the internet may evolve toward a dual-access model:

  • Commercial Internet: Traditional, tracked browsing and corporate oversight
  • Free Privacy-Focused Internet: Tor-based, free and anonymous access
This evolution could establish privacy as a fundamental choice rather than an exception in digital communications.

Conclusion: A Tool, Not a Villain

Like many powerful technologies, Tor and the dark web are tools that can be used for both positive and negative purposes. Their technical design doesn't make them inherently evil—instead, they reflect the fundamental internet principles of open access and privacy protection.

Understanding Tor's military origins, its technical operation, and its legitimate applications helps dispel the mystique and fear often associated with the "dark web." By looking beyond sensationalist headlines, we can appreciate how these privacy technologies serve essential roles in protecting vulnerable users and preserving fundamental rights in the digital age.


Have you ever used Tor or similar privacy tools? What was your experience like? Share your thoughts in the comments below.