How to access the Dark Web

The Dark Web is an infamous digital hive of scum and villainy, where people around the world visit their black markets and conduct encrypted business away from any watching eyes. Naturally, that makes a lot of people curious.

However, there are other, more innocent reasons to use the Dark Web. Reporters, for example, may use it as a way to communicate with whistleblowers who want to protect their identity. Internet users under oppressive regimes may access the Dark Web to communicate freely with the outside world. White hat coders may want to search for and study various bits of malware to prepare defenses, and so on.

Here’s the bottom line: If you are interested in checking out the Dark Web, we can show you how to access it — just be careful out there. Check out the steps below to learn more.

Step 1: Start with encryption: Download Tor and the Tor browser

Tails

Tor is the encryption program people use to navigate the Dark Web. While this encryption can work with several different dark browsers, the most common option is the Tor browser, because it’s free and easy to use.

These days, however, it’s common practice to add Tails, which is an additional security measure to protect your IP address. We suggest you start by downloading a safe version of Tails here. This Tails download should include Tor and the Tor browser as one complete package, so you have everything you need to get started. However, note that Tails requires an attached, empty USB storage drive to work, so you may have to buy an extra flash drive.

You may also want to download and enable a VPN (virtual private network) for additional security when using Tor and Tails. When getting ready for the Dark Web, you can never have too much security.

Step 2: Prepare your computer

LG 65EC9700 4K OLED TV review webcam

You don’t want anything on your computer that a hacker could take advantage, which is pretty much everything. So take a minute to clear things up — shut down all apps and ongoing functions.

Close any files you may be working on. Disconnect or cover up your webcam and do the same with any mic settings your computer has – yes, these can be used against you. It’s okay to get a little paranoid at this juncture.

Step 3: Open the browser with a clear destination in mind

Tor Messenger - Onion router anonymous messaging
Linux Screenshots/Flickr

Without browsers like Google carefully organizing search results, the Dark Web is somewhat disarrayed, which can make it difficult to find what you are looking for. We strongly suggest that you do a lot of research and know exactly where you are going before you start.

To help with this, there are wikis that collect various Dark Web sites or directories that are (relatively) popular stops and good places to begin. Popular options include the Onion Directory and the Hidden Wiki. Take a look at the sites that these directories have collected and see what topics interest you (and yes, these categories include absolutely everything, so please stay away from the naughty stuff like hiring hitmen or buying stolen goods).

We also suggest that you do a search for the sites that you intend to visit, to see what people are saying about their security and how safe they are. Just because a site is on these directories doesn’t mean it won’t harm you or your computer. Never visit one of these sites directly on a normal browser — draw the line at research.

Once you have a clear destination in mind, close down your browser as we detailed in step 2, and open up the Tor browser to visit these same directories. It’s also a good idea to turn off JavaScript before you begin, for additional safety. The Tor browser is essentially a rebuilt version of early Firefox browsers, so if you’ve used Firefox in the past navigation should feel familiar to you.

Step 4. Understand how transactions work before you do anything

Bitcoin wallet

There are no rules in a black market, but there are some agreed-upon methods of exchange so that people can trade. On the Dark Web, that means using cryptocurrency like Bitcoin.

We aren’t suggesting you try to buy anything—that’s another big can of worms—but if you do look into a transaction, understand that you’ll need a cryptocurrency to do it safely, and even then “safely” is a tricky prospect.

Generally, people who purchase anything on the Dark Web first move Bitcoins (or their cryptocurrency of choice) from the Bitcoin exchange into a heavily secured wallet. Then they move the coins from the wallet into the Dark Web. Even then, it’s advisable to use a separate wallet solely for Dark Web activity, and only move the coins you intend to spend into the wallet. Use a separate name and password for the wallet that you will never use anywhere else. Many people have had their exchanges and wallets hacked by being careless.

Step 5: Always remember, safety first

silke road shut down new arrest made silk 2

The FBI can absolutely track people on the Dark Web, and it keeps the extent of those capabilities a carefully guarded secret, which means you could still get prosecuted for breaking the law even when encrypted. Silk Road wasn’t brought down by amateurs.

However, a more immediate danger for beginners is the great number of traps and hackers in the Dark Web trying to steal personal information and follow any trace back to your computer to learn more about you. Identity theft and blackmail are rampant. So stay alert, don’t wander around too much, and don’t trust any site or contact that you find.

Step 6: Close everything when you are done

hp envy x2 eight_mp power button macro

While on the Tor browser, avoid any other activity on your computer—keep everything shut down. In fact, it’s common advice to avoid even change the settings (outside of the JavaScript step we mentioned) or window size of the Tor browser, since in theory this could be used to track you.

When you are finished, close the Tor browser and shut down/restart your computer entirely. Pay close attention when starting up again, and if everything appears to be acting normally, you can enable your mic settings, webcam, and other functions again.

Computing

Adobe’s craziest new tools animate photos, convert recordings to music in a click

Adobe shared a glimpse behind the scenes at what's next and the Creative Cloud future is filled with crazy A.I.-powered tools, moving stills, and animation reacting to real-time tweets.
Smart Home

Keep an eye on your kingdom with the best home security cameras

When it comes to the best home security cameras, the choice often comes down to the one that simply knows how to stay out of your way. Here are some of our favorites, both indoor and outdoor.
Gaming

Apple Mac users should take a bite out of these awesome games

Contrary to popular belief, there exists a bevy of popular A-list games compatible for Mac computers. Take a look at our picks for the best Mac games available for Apple fans.
Computing

How to protect your iCloud account

From Chinese hacking to identity theft, it's not surprising if you're a little worried about your iCloud data. Here's how to protect your iCloud account with a few simple security steps. It will only take a few minutes, and we'll walk you…
Computing

Afraid that Bitcoin could be a bubble? Here's how to sell what you've got

If you're investing in cryptocurrencies, it's important to have your exit strategy in place if prices start to crash. If you've decided it's time to get out or just want to learn how to sell Bitcoins, here's how to get started.
Computing

Problems with Microsoft’s Windows October 2018 Update aren’t over yet

Microsoft's Windows 10 October 2018 update is not having a great launch. More than two weeks after its debut and Microsoft is still putting out fires as new bugs are discovered and there's no sign of its re-release as of yet.
Computing

Chrome 70 is now available and won’t automatically log you in to the browser

Google has officially launched Chrome version 70 on Windows Mac and Linux. The update introduces some new Progressive Web App integrations on Windows 10 and also tweaks the much controversial auto login with Google Account feature.
Computing

Corsair’s latest SSD boasts extremely fast speeds at a more affordable price

Despite matching and besting the performance of competing solid-state drives from Samsung and WD, the Corsair Force Series MP510 comes in at a much more affordable price. Corsair boasts extremely fast read and write speeds.
Computing

New Windows 10 19H1 preview lets users remove more pre-installed Microsoft apps

With the release of the latest Windows 10 19H1 preview build on October 17, Microsoft is letting some consumers remove more of the pre-installed inbox app bloatware from their machines. 
Computing

Apple’s 2020 MacBooks could ditch Intel processors, arrive with ‘ARM Inside’

If you're buying a MacBook in 2020, be on the lookout for a new "ARM Inside" banner. Apple is reportedly working on transitioning away from Intel processors for its MacOS lineup in favor of new custom A-series ARM-based silicon.
Social Media

Tumblr promises it fixed a bug that left user data exposed

A bug on blogging site Tumblr left user data exposed. The company says that once it learned of the flaw, it acted quickly to fix it, adding that it's confident no data linked to its users' accounts was stolen.
Computing

Microsoft patent highlights a potential VR text input system

A new patent awarded to Microsoft could lead to a new typing method for virtual reality and on Xbox consoles. The virtual radial dial puts letters within easy reach of joystick commands and offers predictive typing, too.
Computing

Ryzen shine! AMD’s next CPUs could beat Intel at gaming in 2019

AMD's upcoming Zen 2-based Ryzen 3000 CPUs could offer as much as a 13-percent increase in instruction per clock. With clock speed or core count increases, that could gave them a huge performance boost.
Computing

Samsung Galaxy Book 2 packs Snapdragon 850 into Always Connected Windows 2-in-1

The Samsung Galaxy Book 2 is set to go on sale at the start of November and should be a solid addition the collection of Always Connected Windows laptops. It packs a Snapdragon 850 and a 20-hour battery.