While the Onion Router (TOR) is the most well-known dark web network, there are a number of other networks that have been developed which are used for various different reasons, while these sites do have some legitimate users and use cases, the anonymous nature of these networks also makes them attractive to criminal and other illicit actors. In this blog, we will explore some of the different networks that are available and how they are used by criminals.
The birth of the dark web can be traced back to the early 1990s when researchers at the United States Naval Research Laboratory (NRL) began exploring ways to create anonymous and secure communication channels. Driven by the need for a secure, untraceable network for intelligence communications, the NRL researchers, laid the groundwork for what would become known as onion routing.
This project became the foundation of the darkweb, a network within the broader internet that required specialized software to access. Its origins were rooted not in cybercrime or illicit activities, but in the need for strong anonymity and privacy for sensitive governmental communications.
Although superseded by Freenet, which was launched in 2000 by Ian Clarke, a computer science student at the University of Edinburgh, to offer anonymous and censorship-resistant content sharing and communications, the Onion Routing Project was released publicly, in 2002, as Tor (The Onion Router). By making the software freely available, the NRL aimed to create a more robust and diversified network, one where traffic would be harder to trace due to the increased number of users. This move allowed civilians, journalists, and other non-government users to benefit from the anonymity that Tor provided, thereby expanding the user base and enhancing network security through sheer volume. Tor’s release as an open-source software encouraged further development by a global community of privacy advocates and researchers, transforming Tor into a more versatile tool over time.
The public release of these tools as well as the advent of blockchain technology allowed for more of these networks to be developed over time, each being accessed in a slightly different way and used in different ways by different types of individuals.
We will explore nine different dark web networks that are currently available, reviewing how they work, how they are accessed and how they are used by criminals. Although there are many networks it is worth noting that they do not all serve the same function and they are not all equally popular.
Tor is the most well-known anonymizing network that helps users maintain privacy and anonymity online. It routes your internet traffic through a series of volunteer-operated servers (called nodes), making it difficult to trace your online activity. Websites accessed via Tor use the “.onion” domain, providing anonymity for both users and hosts. The network is run by a not for profit who prioritize privacy. However TOR is also widely used by criminals to buy and sell illicit goods and activities. It is also used to share CSAM and adult materials. It has also famously been used to advertise hitmen.
I2P is an anonymizing network, known as eepsites, designed to offer privacy and censorship resistance, particularly for hosting and accessing “hidden” services. Unlike Tor, which is more focused on browsing the surface web anonymously, I2P is optimized for internal, peer-to-peer communication. For this reason it can be popular with individuals wishing to communicate directly. It is known to be sued for sharing CSAM material, but the network also hosts marketplaces and forums similar to TOR.
ZeroNet is a decentralized, peer-to-peer network that uses blockchain technology to host websites. Sites on ZeroNet are resistant to censorship and operate through distributed nodes, meaning that users don’t rely on central servers. It uses Bitcoin’s blockchain for verifying content and uses the BitTorrent protocol for content distribution. This can make it very difficult to identify new content.
Freenet is a decentralized, peer-to-peer platform designed for anonymous browsing and file sharing. It allows users to publish and access content in a way that is both private and resistant to censorship. Freenet operates on a distributed network where data is stored in a way that’s anonymous and cannot easily be removed. Criminals use Freenet to share illegal files, including pirated content, child exploitation material, or stolen intellectual property, with a high degree of anonymity. It can also be used to communicate anonymously.
Loki, now known as Oxen, is a privacy-focused cryptocurrency and decentralized platform. It uses the Oxen blockchain and features the Loki network, which facilitates private messaging, anonymous transactions, and secure browsing. Oxen enables users to create decentralized applications (dApps) that offer privacy and anonymity. Oxen can be used to conduct cryptocurrency transactions for illicit reasons and to communicate anonymously. The apps can also be used to create darkweb marketplaces and forums.
Yggdrasil is a decentralized, encrypted mesh network aimed at offering secure, encrypted, and anonymous communication. It is an experimental, overlay network that seeks to integrate the concepts of privacy, anonymity, and security into a global decentralized infrastructure.
IPFS is a peer-to-peer protocol and network designed to make the web faster, safer, and more open by creating a decentralized file system. It allows for the storage and sharing of data in a distributed way, meaning that files are not stored on central servers but instead across the network. This can make it attractive to criminals who are wishing to share stolen data.
Unigrid is a decentralized, secure, and censorship-resistant platform that focuses on providing internet access and data storage through peer-to-peer networks. It aims to offer a unified and decentralized infrastructure to facilitate hosting and accessing content across the web.
Mysterium is a decentralized VPN and proxy service that allows users to securely access the internet while maintaining privacy. The Mysterium network is built using blockchain technology and is powered by a global network of nodes. Users can choose to either be consumers of VPN services or providers.
Many different dark webs exist, although they were primarily created in order to allow users to anonymously access the internet, to protect privacy and defeat censorship as well as ensuring there are decentralized network that are not controlled by one organization.
However these features mean that these networks are also attractive to criminal users. Although each are used to a different degree, each of them are used in a similar way to conduct similar activities. However as law enforcement becomes more successful at taking down sites hosted on TOR, it is likely that criminals will move to other networks and other means of communications to conduct their criminal activity.
Products
Services
Use Cases