Tor Guide

If you want to browse through a vast sea of unindexed internet, aka the Dark Web, you will tor-network-anonymous-proxyhave to use something called Tor, otherwise you won’t be able to access the Darknet inside Deep Web.

So, what is Tor and why do I need it?

Tor stands for The Onion Router. You’ll soon see why the onion and not some other veggie.

It provides fairly good level of online anonymity, privacy and security to the user. It’s  the most well know tool for internet privacy

If you’ve ever stumbled upon a 16-character alpha-semi-numeric hashes followed by .onion, and tried to open it in your regular browser; it returned the “This webpage is not available” result, right? This address can only be accessed by Tor browser, specially designed to provide a safe and private environment.

Tor browser bundle can be downloaded for free here There is no need for installation; you simply extract it anywhere on your computer and run it.

Your TOR usage is being watched

If you open the extracted folder with Browser folder in it, you will notice that the actual application is called Firefox, and that’s what Tor browser actually is – a modified Firefox browser with a set of plugins installed.

Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router.

However, if you try to install any other plugin you might compromise your anonymity online, and it is not advisable to make any changes in settings unless you know exactly what you are doing.

Don’t even enable scripts or flash player, because those applications demand direct internet connection, not via Tor network, which will compromise your IP address and other information and make you an easy target for hackers.

Tor network can also be used for online chatting. There’s an app called TorChat, and it can be downloaded from here Many journalists use it for interviews with their confidential sources or whistleblowers.

To put it briefly…

…Tor is essential; there are no two ways about it. If you wish to browse the deep web, you will have to use Tor. However as I mentioned, it will also protect your anonymity by passing your computer through several relays.


The main drawback that I see with it is that it can lull you into a false sense of security. For anonymous browsing, it’s an excellent first step, but it’s not the only one you need to take.

For more protection, I would strongly advise using Tor within a VPN service that allows P2P (peer to peer) networking.

Without this, while the sites you visit can’t be seen, any eavesdroppers will be able to see that you are using Tor. While that is not illegal by any means, it does stand out, so you lose some of the anonymity you fought to get.

Other non-important drawbacks include not being able to run torrents over Tor, and not being able to use browser plugins.

How deep down the rabbit hole do you wish to go?

Those were really the basics of Tor browser and Tor network and these would probably suffice if you only wish to explore and experiment with it.

But if you want to know the core mechanics behind Tor network and the way it provides the anonymity and privacy, I’ll be happy to get into more details about it.

Regular internet

Before going into any details about Tor, let me first cover how the regular internet works.

Let’s say that Alvin for example wishes to send a message to Barbara, or visit Barbara’s webpage. When Alvin sends his message, a data package is created,containingAlvin’s message, his and Barbara’s IP addresses.

This data package travels directly from Alvin’s to Barbara’s computer, making it an easy target for anyone who wishes to intercept the message or learn the information about Alvin or Barbara.

Spooky, isn’t it? Even if your messages aren’t confidential at all; why would you allow anybody to have access to you messages? It’s insane.

So, if you want to keep your privacy intact, I suggest using Tor, even for browsing that is not related to Deep Web.

Almighty Tor

How it works?

Well, as mentioned earlier, here is the detailed explanation for the choice of a veggie. Tor stands for The Onion Router and Tor Network is a series of connected routers.

Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router.

When using Tor, Alvin’s data package would firstly be encrypted, and then sent through three routers, called nodes, before the data package reaches Barbara.

Mathematical Cryptography comes first

Remember that data package that was created when Alvin sent his message to Barbara? Now using Tor, that data package is encrypted – not once, but three times.

Mathematical encryption basically means that you take a set of information, Alvin’s message, and together with the encryption key you put it in a box.

When opening the box without the decryption key, the message looks totally different than the original data package. It can look like some other message or like a random messed-up code.

To decrypt the code you simply put in reverse – take the encrypted data package and the decryption key, put them in the box together, and you get the original message when you open the box. Simple, right?

Now, Tor takes this encrypted data package and encrypts it twice more, both times using different encryption keys.

Journey through a tunnel

As mentioned earlier, Tor is a series of routers connected to form a tunnel. They’re “a set of relays volunteering their resources to forward traffic for Tor users.” Now let’s see how they work.

After encrypting the data package 3 times, it’s ready for sendoff. Unlike regular network, the data package is not going directly from Alvin to Barbara.

Its first stop is the entry node – the first router or node as they call it.

In order for the data package to reach the entry node it must be addressed to it, right? So, the package contains information about the receiver and the sender, in other words Alvin and the entry node.

Once the data package reaches the entry node it’s being decrypted only one time. One layer of encrypted information peels and the other will be peeled when it reaches the middle node.

Once the data package reaches the middle node the process repeats – one more layer of encryption down.

It kind of reminds the onion layers, no? The package that reached the middle node contains a different set of information about the sender and the receiver: the sender is the entry node and the receiver is the middle node.

Now, Alvin’s message is sent to the last router, the exit node. The last layer of encryption is peeled at the exit node.

The information of the data package that exit node has received is again – different. It contains info about the middle node as the sender and the receiver – the exit node.

Once the message has been decrypted at the exit node, it is finally ready for Barbara.

Barbara gets the message that Alvin sent her, but the information about the sender and receiver is different.

Barbara knows it came from Alvin, because he probably signed it, but if anybody intercepts the message and tries to find out who sent it to Barbara, the data package will only give him information about the exit node as the sender.

The only possible way to reconstruct the journey of the message is to have access to all routers and have all three decryption keys.

So, now that you know how Tor works, if you still feel you need more protection, try using VPN with Tor, but that’s the story for another time.

Write for us


The articles and content found on Dark Web News are for general information purposes only and are not intended to solicit illegal activity or constitute legal advice. Using drugs is harmful to your health and can cause serious problems including death and imprisonment, and any treatment should not be undertaken without medical supervision.


  1. Anonymous

    Is TOR safer than VPN?

    • Anonymous

      It would seem so. But still read all about Anonymity before thinking you’re Anon.

    • Anonymous


      • Anonymous


      • Anonymous

        How u trying to make money r u a vendor just curious loo k ing for one nick

    • Anonymous

      help… my pictures + adress has been put on the dark web… I need access to as the person to delete it (Netherlands) I get stalked so badly and I’m scared to death…….

  2. Anonymous

    I agree with the reply above. However, using VPN *AND* TOR will add an extra layer of security when you browse the darknet.

  3. Anonymous


  4. Anonymous


  5. Anonymous

    It can also be called Cabbage, thanks for the article!!

  6. Anonymous

    how u to get anonymous user, please tell me.

  7. Anonymous

    great list , but I saw a better one on customerso

  8. Anonymous

    i am starving and have no
    can’t find a job to support my family..denied on benefits and medical…i am lost

    • Anonymous

      Sorry to hear that

    • Anonymous

      Sell your computer and buy food

    • Anonymous

      When’s ur next pay fallow my advice you will be rich

  9. Anonymous

    I have just being released from Correctional division on can’t find a job my house is in foreclosure have two young kids I’m looking for help any suggestions. my family and myself will be homeless pretty soon please help me save my home

    • Anonymous

      Even a felon can find a job these days – everyone is hiring, esse!

      • Anonymous

        There is work out there, Everywhere, for Felons too! You may not get a Government gig but, they are out there.

  10. Anonymous


  11. Anonymous

    Really need help, got fired from my job.. Now i am jobless , dont feel like working for anyone. Just want to work from home. Need some hint on how to commence pls

  12. Anonymous

    I am lost about this and I’m not computer smart and I have no job because I get ssi and I pay all my bills and don’t have money to play with so pl help me on this ty so much

  13. Anonymous


    • Anonymous

      HELLO ANONYMOUS I need money.
      what should I do

  14. Anonymous

    okey ty bro

  15. Anonymous


    • Anonymous

      you need some money??

    • Anonymous

      please help me make money

  16. Anonymous

    Hi boss plese heleb me make money

  17. Anonymous

    okay thank for the info

  18. Anonymous

    Hello can I ask you something

  19. Anonymous

    VPN company has to give up your logs if they get a court order. no one is safe

  20. Anonymous

    Hi gys
    can you help me to make some mony?

    • Anonymous

      How much money do you want to make? How much risk are you willing to take? There are legal ways to make money then there’s illegal ways…

    • Anonymous

      make a scandal.. You’ll get countless money..

  21. Anonymous

    hello gys did anyone can help me with a thing plz

  22. Anonymous

    All I want is to buy a fast-acting poison for myself. Help?

    • Anonymous

      Please send me the information if you get it ! I need just the same…. thanks

  23. Anonymous

    can you help me how to hack and get money?

  24. Anonymous

    please let me reference that can break into a bank account, I’m broke and in debt chase, I have some account numbers that can be in collapse

  25. Anonymous


  26. Anonymous

    Where can i purchase some oxy?

  27. Anonymous

    Check the related boards. Always one more soul willing to take chances. Of course you are chancing losing your cash.I suppose if that happens you can always put up a post that reads,”Oxy for sale. Cash In Envelope only.” Maybe someone will actually send you their hard earned cash.

  28. Anonymous

    hy .. bisakah kamu membantu saya mendapatkan banyak uang?

  29. Anonymous

    What is wrong with these donkeys, why do they keep asking the writer of as online article for help with money?

  30. Anonymous

    to make money get ready to work..reach me back only if you have bitcoins

  31. Anonymous

    I have been thrown back on dating market at 58 years old and men are lying to me constantly. I’m talking about from the first email they will tell me they live somewhere they don’t, or work here or there. My nephew knows how to ping cell phones and was able to tell me who was lying and who wasn’t by where their phones pinged. where can I learn how to do that?

  32. Anonymous

    Im mad about. Chemtrails

  33. Anonymous

    selam ben bir hacker olmak istiyorum ama bunun nasıl olacağını bilmiyorum bana yardımcı olurmusunuz

  34. Anonymous

    selm bişi sorablrmym

  35. Anonymous

    Eat bologna sammich

  36. Anonymous

    I am your big fan plz take me under you plzzzz plzzz plzzz plzz

  37. Anonymous

    Comment:how to make many fast

  38. Anonymous


  39. Anonymous

    fucking confusing

  40. Anonymous

    Helo sir can u help me buy universal studio singapore ticket use credit card other people.i will market the ticket for u.maybe we can make coperation.i got many buyer.

  41. Anonymous

    ikr im soooo fuckin confused too

    • Anonymous

      dude – don’t worry about it trust me. all you need to know, is that with tor, your data is encrypted and people cant’ see what you’re doing. forget all the “node”s and “encryption/decryption keys” and all that shit… all you need to know is 1. purchase a GOOD vpn. like ipvanish or nordvpn. 2. use tor for your web browsing/illicit activity

  42. Anonymous

    can anyone tel me who to contact to get to my wallet from the first Silk Road? I have key but put wallet in my trash. Trash was emptied only 6 months ago. Wallet sat there for 4 years prior. Any info mucho appreciated.

  43. Anonymous

    How much space do I need to download all this shyt

  44. Anonymous

    thanks to guide me!!!!!

  45. Anonymous

    I still don’t get the actual information

  46. Anonymous

    Please I want to access dark net on my Android how do I go about it?

    • Anonymous

      Is possible to have a hack to pay pal generator thank you

  47. Anonymous

    How can I will be a good hacker??? I am student of CSE

  48. Anonymous

    hi i want learn use dark web and dark net but idont know how i do? can you help me

  49. Anonymous

    we all wont to make money

  50. Anonymous

    I don’t NEED anything, just being nosey trying to see sealed or confidential shit about aliens and other scary shit. Any recommendations??

    • Anonymous

      Thats exactly what I want to do! Just check stuff out and learn new things..This comment is over a year old, so Im not gonna get a response LOL

  51. Anonymous

    if your about to lose your house first off look online or in windows find a good Debt Validation letter fill it out with all pertnant info and send it to the CEO of your mortgage company and has to be to the CEO. wiat for his response then look me up and we will go from there but i can help you get ownership of your house with a deed and not pay them another dime.

  52. Anonymous

    Stop snding me money

  53. Anonymous

    Send me some money

  54. Anonymous

    I need a good trainer to aid me get into this

  55. Anonymous

    I need kratom red vain leaf where can i buy this

  56. Anonymous

    I need earn money please help me Z…

  57. Anonymous

    What the fuck is wrong with you people!!!!!!! Just buy some studs and be done with it

  58. Anonymous

    Am jobless and need some money can there be a job online for me …

    • Anonymous

      can you hack a bank account? and get half the contents?

  59. Anonymous

    The question is . … ??? I ve been studying reading and prepping for learning more
    How can I trust anyone to help me learn more?

  60. Anonymous

    I am not Russian, but also my parents came from Albania. Dark web, how can you buy a cannula for liposuction on yourself? or have somebody else doing it. Does Alibaba sell it? does China sells it?
    I also accept ideas on how to get plastic surgery for free (as a guinea pig). I also like fillers for the face.

  61. Anonymous

    How do I change the language of the site

  62. Anonymous

    Pls send my message,how to join hakers official site: darknet.

  63. Anonymous

    tor is better than freenet

  64. Anonymous

    This is fake. Not helpful

  65. Anonymous

    VPN + Tor = Safe

  66. Anonymous

    reading this. shit makes you wonder what is wrong with humanity eventually hopefully all this will end start fresh and maybe we’ll get it right

  67. Anonymous

    i want to use the darkweb markets but to get a bitcoin wallet you need ID like driving licence or passport which i do not have,is there a way around this please help me

  68. Anonymous

    How can I access
    a private area of entering into on the deep web

  69. Anonymous

    The latest article today was called – “Protect your ass” and have a question about it:

    “Turning off JavaScript will eliminate one of the easiest ways to identify you when Tor is compromised. JavaScript can run and ping your real location without you knowing.”

    Alright, what if you accessed Tor thru a VPN service that has ZERO logs, wouldn’t the ping only reveal the VPN IP address, and Not your home address?

  70. Anonymous

    Once installed Tor installed would I be able to switch back and forth between Tor and how I normally function on my computer, non-dark net like Amazon, my bank etc. ?

  71. Anonymous

    Hello please help me to learn about hack and spam

  72. Anonymous

    What is hack with out otp a/c

  73. Anonymous

    we all talking about making money but no one is letting us know how…fine thats illegal and truth is that even our government aint making money legally either…all we need is to make the money if you really do have the idea just let us know it and whosoever is willing to learn should also note that he or she is ON HIS/HER OWN if caught….do i make any sense here!

  74. Anonymous

    We all want to make money, my identity was stolen, lost everything, ruined my credit, my career, etc. I finally got sick of feeling desolate, repaired a crappy laptop on my own with out any knowledge on how to do so. Then I began to research, and more research, over a year before I even attempted to browse the dark net. I found many legit ways to make money, if your willing to sit at the computer and learn. I found a few chatroom’s and after much misdirection and terrible advice, I met a few good people. These wonderful humans have guided me with cryptic advice and nib-lets of information, that I have used to slowly rebuild my life and gain a substantial amount of useful, and safe methods of protecting myself. The answers are out there, put in the time and effort to find them. REMEMBER, ALWAYS AND I MEAN ALWAYS, BE GRATEFUL TO ANYONE TAKING THE TIME TO GIVE YOU THE TIME OF DAY!!!!

  75. Anonymous

    Wow! No fool, scumbag, whining loser, criminal, smart arse school child filter and you have the above 90% rubbish as they exercise their freedom to be what they really are. Freedom of speech while totally desirable and essential has always been like walking through a cow paddock with pats everywhere to step upon. I guess that this is the newer version of the Nigerian email. Thank you to the minority of helpful posts while the rest of you get a life.

    • Anonymous

      I totally disagree with your comments about Nigerians. Majority of themare smart and have well enough activities to engaged in. Looking at the context of the numerous comments here, it’s very obvious to say the constructions vocabs are not from Nigerians so please be guided with your comments as we all are here to learn. Thanks

  76. Anonymous

    i cant access tor browser in my laptop need help advise to anyone

  77. Anonymous

    I’m in china,I use expressvpn and chrome to visit this site successful,how can use tor to visit darkweb?i had try tor,it’s very slowly


Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.