The Dark Web, Demystified: Beyond the Shadows of Tor

The Dark Web, Demystified: Beyond the Shadows of Tor

TLDR

  • The "dark web" is widely misrepresented in media and advertising, often used to scare people away from privacy-focused technologies like Tor.
  • Tor is just one of many internet protocols and was originally developed and funded by the U.S. Naval Research Laboratory to enhance privacy and security.
  • Tor works like an onion, routing traffic through multiple encrypted layers so no single relay knows both the source and destination, greatly improving user anonymity.
  • Major organizations such as DuckDuckGo, Proton Mail, and even the CIA operate .onion sites, highlighting Tor’s legitimate and mainstream uses.
  • Tor and the dark web provide critical protection for journalists, whistleblowers, political dissidents, and everyday users who want to avoid tracking and surveillance.
  • Rather than being inherently criminal, Tor is a neutral tool that upholds core internet values of privacy, open access, and user freedom in an increasingly monitored online world.

The term "dark web" has become synonymous with fear in popular culture, frequently exploited in commercial advertisements that warn users their personal information may be compromised. These marketing campaigns, particularly those heard on public radio, often serve to keep users tethered to commercial Internet platforms rather than exploring privacy focused alternatives.

What exactly is the dark web, and why does it garner such a bad reputation in the media? In this article, I will untangle the mystery and misrepresentation surrounding the dark web while shedding light on its more positive aspects and legitimate uses.

What Is the Dark Web?

Depending on who you ask, you may get different answers to the question "What is the dark web?" It is often equated with illicit activities taking place via the Internet and commonly used when referring to The Onion Routing network, or Tor, for short. However, this perspective oversimplifies a complex technology with legitimate origins and valuable applications.

Understanding Internet Architecture

A Foundation for How the Internet Works

Before diving into Tor, let us briefly explore the technical makeup of the Internet. The Internet as we know it today is nothing more than an amalgamation of different networking protocols working in concert to provide a feature rich experience. Each protocol serves a specific purpose:

  • When browsing websites, we are using the Hypertext Transfer Protocol (HTTP) or its secure variant Hypertext Transfer Protocol Secure (HTTPS)
  • For remote work, we might use Microsoft's proprietary Remote Desktop Protocol (RDP) or Citrix's Independent Computing Architecture (ICA) protocol
  • Text messaging relies on the Short Message Service (SMS) protocol
  • Voice over Internet Protocol (VOIP) calls over the Internet use Session Initiation Protocol (SIP) and Real time Transport Protocol (RTP)

These aforementioned protocols represent only a fraction of the networking protocols used daily by individuals engaging on the Internet.

Protocols, Ports, and Services

Each protocol, or service, operates on a designated port number. For connection oriented protocols like TCP, there are 65,535 potential ports any service may use. The table below shows some common protocols and their associated port numbers:

Protocol (Full name)AbbreviationPort Number
Remote Desktop ProtocolRDP3389
Hypertext Transfer ProtocolHTTP/HTTPS80/443
Independent Computing ArchitectureICA1494
Short Message ServiceSMS2775
Session Initiation Protocol (VoIP)SIP5060/5061
Real time Transport Protocol (VoIP)RTP8500–59999
The Onion RoutingTOR9050/9150

With the understanding that a myriad of protocols, or services, make up the Internet, Tor is just one more protocol to be added to the long list.

The Birth of Tor

Military Origins for Privacy Protection

Contrary to popular belief, The Onion Routing protocol was not created by cybercriminals. It was funded and developed by the United States Naval Research Laboratory in the mid 1990s, a fact that surprises many who associate it exclusively with illicit activity.

The fundamental concept behind Tor is elegant in its approach to privacy:

Onion routing is a general approach to securing both routing and traffic flow information for network communications by separating identification of network location from routing.

In its basic form, Tor uses public key cryptography to build a cryptographic circuit along an unpredictable path of onion routers. Symmetric keys, established during path building, are then used to pass data back and forth between the path originator and a network destination, such as an Internet web server.

The technology was so innovative that the Onion Routing patent received the NRL Edison Invention Award in 2002. It was also identified as one of NRL's top 100 technology contributions to sea power and national security during its Centennial celebration in 2024.

How Tor Works

The Onion Metaphor

The name "Tor" is not arbitrary. It reflects how the technology functions. Like an onion with multiple layers, Tor encapsulates your data in multiple layers of encryption. As your data passes through each volunteer operated relay in the network:

  • A layer of encryption is removed, like peeling an onion
  • Only the information needed to send the data to the next relay is revealed
  • No single relay knows both where the data came from and where it is going

This layered approach makes it extremely difficult to track the original user and provides significant privacy protection.

Who Uses Tor?

.onion Domains and Hidden Services

Tor websites are denoted by their use of the ".onion" top level domain in their URL. For example, the following domains are accessible via Tor and a Tor browser. Note that the CIA has its own Tor website.

Duck Duck Go – Search Engine
https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/

Proton Mail – Secure Email Service
https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion/

CIA – US Central Intelligence Agency
https://ciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.onion/

As you can see from the URL of each Tor website, no one in their right mind would be able to seamlessly remember and type in the domain address to access the website. For this purpose, QR codes are often used to easily access Tor websites.

Legitimate Uses of Tor and the Dark Web

Protection for Vulnerable Users

Despite its infamous reputation, Tor and the dark web serve several crucial legitimate purposes:

  • Avoiding commercial tracking and targeted advertising
  • Allowing journalists in repressive regimes to report safely
  • Enabling whistleblowers like Edward Snowden to communicate securely
  • Supporting political dissidents in authoritarian countries as they organize and share information

Freedom and Privacy for Everyday Users

  • No need to register or pay for domains
  • Ability to share deeply personal or controversial thoughts without fear of recourse
  • Researching sensitive topics without creating a lasting digital footprint
  • Preventing Internet Service Providers from monitoring browsing habits
  • Maintaining privacy from government surveillance programs

Research and Education

  • Academic research into privacy technologies and anonymous communication
  • Security professionals testing network vulnerabilities and improving defenses
  • Training in cybersecurity, operational security, and privacy protection

Future Implications for the Internet

As mobile technology advances and privacy awareness grows, the Internet may evolve toward a dual access model:

  • Commercial Internet: Traditional, tracked browsing and corporate oversight
  • Free Privacy Focused Internet: Tor based, free and anonymous access

This evolution could establish privacy as a fundamental user choice rather than an exception in digital communications.

Tor as a Neutral Tool

Like many powerful technologies, Tor and the dark web are tools that can be used for both positive and negative purposes. Their technical design does not make them inherently evil. Instead, they reflect the fundamental Internet principles of open access and privacy protection.

Understanding Tor's military origins, its technical operation, and its legitimate applications helps dispel the mystique and fear often associated with the "dark web." By looking beyond sensationalist headlines, we can appreciate how these privacy technologies serve essential roles in protecting vulnerable users and preserving fundamental rights in the digital age.

Call for Discussion

Have you ever used Tor or similar privacy tools? What was your experience like? Share your thoughts in the comments below.

Read more