The onion analogy is based on the many layers of encryption that wrap each message. Then it is transmitted through a chain of intermediate nodes – onion routers. Each of them removes one layer of the onion to get the coordinates of the next node. In addition, the route of passage is changed randomly every 10 minutes.

As a result, no intermediary has access to either the content or the address of the message. And its full decryption occurs only on the recipient’s server. However, Tor is not perfect, so since 2004 an even more secure and anonymous network has become widespread – I2P, or the Invisible Internet Project.

How to get into the darknet

Instead of the usual .com and .net, the dark web uses its own .onion and .i2p domain systems. Therefore, to travel on the dark side of the Internet, you will need the Tor browser or I2P program. But if everything is simple with the onion browser – install and use it, then it is quite difficult for ordinary users to deal with I2P. For this reason, we chose Tor to get acquainted with the dark web.

Note that you can download the Tor distribution for free from the official website. There are versions for Windows, macOS, Linux and Android. Unfortunately, there is no Tor Browser for iPhone in the App Store. But the official website recommends using Onion Browser.

Installing Tor is very simple, just select a folder and wait. Then the program prompts you to choose one of two options: just connect or configure network settings. In the first case, you will leave the default connection settings. In the second, you can set up bridges and change the default search engine.

Bridges are special chains of relay nodes through which a signal passes. Like normal nodes, they are run by volunteer Tor users. But bridge addresses are not published publicly, so they cannot be traced and blocked. This allows you to use an anonymous browser in places where it is blocked and, in addition, hides the very fact of its use.

You can select a bridge from the list in the “Connection” settings section. It is important to understand that some bridges work faster, others are more stable. And you can only determine which one will be best for you by trial and error. If everything is done correctly, then in the same “Connection” section, opposite the “Tor Network” column, a purple checkmark and the inscription “Connected” will appear.

Here you are on the dark web! But that’s not even half the battle. First, you just have to find useful resources in the shadow web. Secondly, it is important to prevent data leakage and make your surfing on the dark web as anonymous as possible. By default, DuckDuckGo is responsible for searching Tor. But it does not index onion sites, so it is better to replace it with any search engine from this list:

  • TORch, one of the best search engines on the dark web, has over a million indexed pages.
  • Ahmia is a search engine with a simple interface and relatively few ads.

Deep search – reminiscent of websites from the 90s in terms of the number of flashing ads and pop-ups, but has many good reviews.
Regarding anonymity, it is important to know a few details. Tor Browser is based on the Mozilla Firefox browser and by default has protection against surveillance and blocking of functions that can threaten security. However, after installing it, it is desirable to make a few additional settings.

Go to the “Privacy and Security” section and select one of the values: “Normal”, “High”, “Highest”. Be prepared for the fact that at the highest level of security, JavaScript elements are completely disabled on sites and a number of characters will not be displayed.

An interesting feature of the Tor browser is the ability to change your IP address at any time at will. It’s very easy to do: click on the “Change identity” button to the right of the address bar, and you are a different user. After that, the browser will automatically restart to provide us with an additional layer of protection.

Deep search engine

There are other recommendations as well. Never use Tor to access your social networks or any other accounts that you used with a regular browser. Remember that on each visit, the server records the client’s IP address and location. Therefore, when you visit the same account again, your disguise will be revealed.

For additional security, experts advise using special operating systems in the shadow network. An example is the anonymous operating system Tails. It is said that the famous spy Edward Snowden used it when he contacted journalists. The Tails system can be run from a flash drive to “surf” the dark web completely anonymously.