/
Tech-study-notes

01_overview

Source: The Complete Deep Web Course 2025: From Beginner to Expert | Zero to Hero: Become a Deep Web Expert

Foundations

Three distinct layers of the internet:

LayerApproximate shareIndexed by search enginesAccess requirementsTypical LegalityExamples
Surface WebSmall fraction of total web (commonly cited ~5-10%)YesStandard web browserLegalNews sites, blogs, Wikipedia, YouTube
Deep WebMajority of web content (commonly cited ~90-95%)NoAuthentication, paywalls, or dynamically generated accessMostly legalPrivate email inboxes, online banking portals, medical records, corporate databases, cloud storage
Dark Web (subset of the Deep Web)Very small fraction of total webNoSpecial software or network configuration (e.g., Tor, I2P)Mixed (legal and illegal activity)Tor (“onion”) sites, anonymous forums, whistleblowing platforms, darknet marketplaces

Common Misconceptions

Myth 1: Deep Web is illegal

Myth 2: It’s Dangerous to access

Myth 3: You’ll Be targeted/hacked

Myth 4: Deep web = criminal activity

Myth 5: Red rooms exist

Core technologies

The Tor Network

Tor is an anonymity network that hides your IP address by routing your internet traffic through multiple volunteer-operated servers called relays. Instead of connecting directly to a website, your traffic is passed through a chain of nodes.

User → Entry Guard → Middle Relay → Exit Relay → Destination
  1. Entry Guard (Node 1)

    • First relay your device connects to
    • Knows your real IP address
    • Does not know your final destination
    • Usually stays the same for a period of time
  2. Middle Relay (Node 2)

    • Forwards traffic between entry and exit
    • Knows only the previous and next hop
    • Cannot see your identity or destination
  3. Exit Relay (Node 3)

    • Sends traffic to the public internet
    • Knows the destination website
    • Does not know your real IP address
    • Appears as the origin of the request to the destination server

This is called Onion Routing, because Tor encrypts traffic in multiple layers before sending it:

Each node removes only its own encryption layer and forwards the rest. No single node knows both who you are and where you are going

Also, the 3-hop circuits (entry, middle, exit) rotate periodically, among the thousands of relays worldwide.

Traffic between the Exit Relay and Destination is not encrypted by Tor itself. If visiting an HTTP site (not HTTPS), the exit node can read page contents, login credentials, form data. Tor provides anonymity, not guaranteed content confidentiality.

PGP Encryption

PGP (Pretty Good Privacy) is a cryptographic system used to:

Unlike Tor, PGP protects message content, not your IP address.

PGP is based on Asymmetric encryption. Each user has two keys:

Sender                  Transmission                  Receiver
  โ”‚                          โ”‚                            โ”‚
  โ”‚ Encrypt with             โ”‚                            โ”‚
  โ”‚ Recipient's              โ”‚    Encrypted Message       โ”‚ Decrypt with
  โ”‚ Public Key โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ผโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€→โ”‚ Private Key
  โ”‚                          โ”‚                            โ”‚
  1. Sender obtains recipient’s public key
  2. Message is encrypted using that public key
  3. Encrypted message is transmitted
  4. Only the recipient’s private key can decrypt it

If intercepted, the message remains unreadable without the private key.

With this metodology, PGP can also verify identity:

This provides:

OS security

It’s better to avoid Windows for accessing the Deep Web. Being this popular, means more malware targeted at it. It also has inherently less secure design. Other better alternatives exist for privacy, like many Linux distros (Qubes OS) that can be run inside virtual machines.

Practical tools

Tor Browser configuration

Security Levels:

  1. Standard - Normal browser functionality
  2. Safer - JavaScript disabled on HTTP sites
  3. Safest - JavaScript disabled everywhere, click-to-play media

Key features:

Deep Web search engines

Search EngineBest ForFeatures
AhmiaGeneral searchClean UI, fast results, sorts by relevance
CandleRecent contentMinimalist, sorts by recency
Not EvilAlternative indexSimple interface, title/URL filtering
GramsMarket searchProduct-focused, vendor info
TorchArchive searchLarge index, older content

Communication platforms

Anonymous email providers

ProviderAccessEncryptionNotes
ProtonMailClear + Dark webEnd-to-endFree tier available
TorBoxTor onlyServer-sideSimple, fast
BitmessageTor onlyGateway serviceAdvanced users
Mail2TorTor onlyBasicFree, simple interface

Forums & social networks

Encrypted chat rooms

CryptoDog:

Daniel’s Chat:

Markets & Directories

Market Characteristics

Common Features:

Notable Markets (for educational purposes):

MarketFeaturesCryptocurrencies
Empire Market2FA, PGP supportBTC, LTC, XMR
Wall Street MarketEscrow systemBTC, XMR
Dream MarketLong-runningBTC, BCH, XMR

Purpose: Curated collections of “onion” links

DarkDir Features:

Security Best Practices

Essential Guidelines

  1. Never maximize Tor Browser window - Can reveal screen resolution
  2. Disable JavaScript when possible – Reduces attack surface
  3. Use HTTPS everywhere - Encrypts exit node traffic
  4. Verify “onion” URLs - Many fake/scam sites exist
  5. Don’t trust random links - Use established directories
  6. Use separate identities - Different usernames per service
  7. Enable 2FA when available
  8. Never torrent over Tor - Leaks real IP address

Operational Security (OpSec)