Tor Guide

If you want to browse through a vast sea of unindexed internet, aka the Dark Web, you will tor-network-anonymous-proxyhave to use something called Tor, otherwise you won’t be able to access the Darknet inside Deep Web.

So, what is Tor and why do I need it?

Your TOR usage is being watched

Tor stands for The Onion Router. You’ll soon see why the onion and not some other veggie.

It provides fairly good level of online anonymity, privacy and security to the user. It’s  the most well know tool for internet privacy

If you’ve ever stumbled upon a 16-character alpha-semi-numeric hashes followed by .onion, and tried to open it in your regular browser; it returned the “This webpage is not available” result, right? This address can only be accessed by Tor browser, specially designed to provide a safe and private environment.

Tor browser bundle can be downloaded for free here There is no need for installation; you simply extract it anywhere on your computer and run it.

If you open the extracted folder with Browser folder in it, you will notice that the actual application is called Firefox, and that’s what Tor browser actually is – a modified Firefox browser with a set of plugins installed.

Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router.

However, if you try to install any other plugin you might compromise your anonymity online, and it is not advisable to make any changes in settings unless you know exactly what you are doing.

Don’t even enable scripts or flash player, because those applications demand direct internet connection, not via Tor network, which will compromise your IP address and other information and make you an easy target for hackers.

Tor network can also be used for online chatting. There’s an app called TorChat, and it can be downloaded from here Many journalists use it for interviews with their confidential sources or whistleblowers.

To put it briefly…

…Tor is essential; there are no two ways about it. If you wish to browse the deep web, you will have to use Tor. However as I mentioned, it will also protect your anonymity by passing your computer through several relays.


The main drawback that I see with it is that it can lull you into a false sense of security. For anonymous browsing, it’s an excellent first step, but it’s not the only one you need to take.

For more protection, I would strongly advise using Tor within a VPN service that allows P2P (peer to peer) networking.

Without this, while the sites you visit can’t be seen, any eavesdroppers will be able to see that you are using Tor. While that is not illegal by any means, it does stand out, so you lose some of the anonymity you fought to get.

Other non-important drawbacks include not being able to run torrents over Tor, and not being able to use browser plugins.

How deep down the rabbit hole do you wish to go?

Those were really the basics of Tor browser and Tor network and these would probably suffice if you only wish to explore and experiment with it.

But if you want to know the core mechanics behind Tor network and the way it provides the anonymity and privacy, I’ll be happy to get into more details about it.

Regular internet

Before going into any details about Tor, let me first cover how the regular internet works.

Let’s say that Alvin for example wishes to send a message to Barbara, or visit Barbara’s webpage. When Alvin sends his message, a data package is created,containingAlvin’s message, his and Barbara’s IP addresses.

This data package travels directly from Alvin’s to Barbara’s computer, making it an easy target for anyone who wishes to intercept the message or learn the information about Alvin or Barbara.

Spooky, isn’t it? Even if your messages aren’t confidential at all; why would you allow anybody to have access to you messages? It’s insane.

So, if you want to keep your privacy intact, I suggest using Tor, even for browsing that is not related to Deep Web.

Almighty Tor

How it works?

Well, as mentioned earlier, here is the detailed explanation for the choice of a veggie. Tor stands for The Onion Router and Tor Network is a series of connected routers.

Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router.

When using Tor, Alvin’s data package would firstly be encrypted, and then sent through three routers, called nodes, before the data package reaches Barbara.

Mathematical Cryptography comes first

Remember that data package that was created when Alvin sent his message to Barbara? Now using Tor, that data package is encrypted – not once, but three times.

Mathematical encryption basically means that you take a set of information, Alvin’s message, and together with the encryption key you put it in a box.

When opening the box without the decryption key, the message looks totally different than the original data package. It can look like some other message or like a random messed-up code.

To decrypt the code you simply put in reverse – take the encrypted data package and the decryption key, put them in the box together, and you get the original message when you open the box. Simple, right?

Now, Tor takes this encrypted data package and encrypts it twice more, both times using different encryption keys.

Journey through a tunnel

As mentioned earlier, Tor is a series of routers connected to form a tunnel. They’re “a set of relays volunteering their resources to forward traffic for Tor users.” Now let’s see how they work.

After encrypting the data package 3 times, it’s ready for sendoff. Unlike regular network, the data package is not going directly from Alvin to Barbara.

Its first stop is the entry node – the first router or node as they call it.

In order for the data package to reach the entry node it must be addressed to it, right? So, the package contains information about the receiver and the sender, in other words Alvin and the entry node.

Once the data package reaches the entry node it’s being decrypted only one time. One layer of encrypted information peels and the other will be peeled when it reaches the middle node.

Once the data package reaches the middle node the process repeats – one more layer of encryption down.

It kind of reminds the onion layers, no? The package that reached the middle node contains a different set of information about the sender and the receiver: the sender is the entry node and the receiver is the middle node.

Now, Alvin’s message is sent to the last router, the exit node. The last layer of encryption is peeled at the exit node.

The information of the data package that exit node has received is again – different. It contains info about the middle node as the sender and the receiver – the exit node.

Once the message has been decrypted at the exit node, it is finally ready for Barbara.

Barbara gets the message that Alvin sent her, but the information about the sender and receiver is different.

Barbara knows it came from Alvin, because he probably signed it, but if anybody intercepts the message and tries to find out who sent it to Barbara, the data package will only give him information about the exit node as the sender.

The only possible way to reconstruct the journey of the message is to have access to all routers and have all three decryption keys.

So, now that you know how Tor works, if you still feel you need more protection, try using VPN with Tor, but that’s the story for another time.

Write for us


The articles and content found on Dark Web News are for general information purposes only and are not intended to solicit illegal activity or constitute legal advice. Using drugs is harmful to your health and can cause serious problems including death and imprisonment, and any treatment should not be undertaken without medical supervision.

4.50 / 5 (14 votes)


  1. I have just being released from Correctional division on can’t find a job my house is in foreclosure have two young kids I’m looking for help any suggestions. my family and myself will be homeless pretty soon please help me save my home

  2. Really need help, got fired from my job.. Now i am jobless , dont feel like working for anyone. Just want to work from home. Need some hint on how to commence pls

  3. I am lost about this and I’m not computer smart and I have no job because I get ssi and I pay all my bills and don’t have money to play with so pl help me on this ty so much

  4. please let me reference that can break into a bank account, I’m broke and in debt chase, I have some account numbers that can be in collapse

  5. Check the related boards. Always one more soul willing to take chances. Of course you are chancing losing your cash.I suppose if that happens you can always put up a post that reads,”Oxy for sale. Cash In Envelope only.” Maybe someone will actually send you their hard earned cash.

  6. What is wrong with these donkeys, why do they keep asking the writer of as online article for help with money?

    I have been thrown back on dating market at 58 years old and men are lying to me constantly. I’m talking about from the first email they will tell me they live somewhere they don’t, or work here or there. My nephew knows how to ping cell phones and was able to tell me who was lying and who wasn’t by where their phones pinged. where can I learn how to do that?

  8. selam ben bir hacker olmak istiyorum ama bunun nasıl olacağını bilmiyorum bana yardımcı olurmusunuz

  9. Helo sir can u help me buy universal studio singapore ticket use credit card other people.i will market the ticket for u.maybe we can make coperation.i got many buyer.

    • dude – don’t worry about it trust me. all you need to know, is that with tor, your data is encrypted and people cant’ see what you’re doing. forget all the “node”s and “encryption/decryption keys” and all that shit… all you need to know is 1. purchase a GOOD vpn. like ipvanish or nordvpn. 2. use tor for your web browsing/illicit activity

  10. can anyone tel me who to contact to get to my wallet from the first Silk Road? I have key but put wallet in my trash. Trash was emptied only 6 months ago. Wallet sat there for 4 years prior. Any info mucho appreciated.

  11. I don’t NEED anything, just being nosey trying to see sealed or confidential shit about aliens and other scary shit. Any recommendations??

  12. if your about to lose your house first off look online or in windows find a good Debt Validation letter fill it out with all pertnant info and send it to the CEO of your mortgage company and has to be to the CEO. wiat for his response then look me up and we will go from there but i can help you get ownership of your house with a deed and not pay them another dime.

  13. I am not Russian, but also my parents came from Albania. Dark web, how can you buy a cannula for liposuction on yourself? or have somebody else doing it. Does Alibaba sell it? does China sells it?
    I also accept ideas on how to get plastic surgery for free (as a guinea pig). I also like fillers for the face.


Please enter your comment!
Please enter your name here