How to access the Dark Web

The Dark Web is an infamous digital hive of scum and villainy, where people around the world visit their black markets and conduct encrypted business away from any watching eyes. Naturally, that makes a lot of people curious.

However, there are other, more innocent reasons to use the Dark Web. Reporters, for example, may use it as a way to communicate with whistleblowers who want to protect their identity. Internet users under oppressive regimes may access the Dark Web to communicate freely with the outside world. White hat coders may want to search for and study various bits of malware to prepare defenses, and so on.

Here’s the bottom line: If you are interested in checking out the Dark Web, we can show you how to access it — just be careful out there. Check out the steps below to learn more.

Step 1: Start with encryption: Download Tor and the Tor browser

Tails

Tor is the encryption program people use to navigate the Dark Web. While this encryption can work with several different dark browsers, the most common option is the Tor browser, because it’s free and easy to use.

These days, however, it’s common practice to add Tails, which is an additional security measure to protect your IP address. We suggest you start by downloading a safe version of Tails here. This Tails download should include Tor and the Tor browser as one complete package, so you have everything you need to get started. However, note that Tails requires an attached, empty USB storage drive to work, so you may have to buy an extra flash drive.

You may also want to download and enable a VPN (virtual private network) for additional security when using Tor and Tails. When getting ready for the Dark Web, you can never have too much security.

Step 2: Prepare your computer

LG 65EC9700 4K OLED TV review webcam

You don’t want anything on your computer that a hacker could take advantage, which is pretty much everything. So take a minute to clear things up — shut down all apps and ongoing functions.

Close any files you may be working on. Disconnect or cover up your webcam and do the same with any mic settings your computer has – yes, these can be used against you. It’s okay to get a little paranoid at this juncture.

Step 3: Open the browser with a clear destination in mind

Tor Messenger - Onion router anonymous messaging
Linux Screenshots/Flickr

Without browsers like Google carefully organizing search results, the Dark Web is somewhat disarrayed, which can make it difficult to find what you are looking for. We strongly suggest that you do a lot of research and know exactly where you are going before you start.

To help with this, there are wikis that collect various Dark Web sites or directories that are (relatively) popular stops and good places to begin. Popular options include the Onion Directory and the Hidden Wiki. Take a look at the sites that these directories have collected and see what topics interest you (and yes, these categories include absolutely everything, so please stay away from the naughty stuff like hiring hitmen or buying stolen goods).

We also suggest that you do a search for the sites that you intend to visit, to see what people are saying about their security and how safe they are. Just because a site is on these directories doesn’t mean it won’t harm you or your computer. Never visit one of these sites directly on a normal browser — draw the line at research.

Once you have a clear destination in mind, close down your browser as we detailed in step 2, and open up the Tor browser to visit these same directories. It’s also a good idea to turn off JavaScript before you begin, for additional safety. The Tor browser is essentially a rebuilt version of early Firefox browsers, so if you’ve used Firefox in the past navigation should feel familiar to you.

Step 4. Understand how transactions work before you do anything

Bitcoin wallet

There are no rules in a black market, but there are some agreed-upon methods of exchange so that people can trade. On the Dark Web, that means using cryptocurrency like Bitcoin.

We aren’t suggesting you try to buy anything—that’s another big can of worms—but if you do look into a transaction, understand that you’ll need a cryptocurrency to do it safely, and even then “safely” is a tricky prospect.

Generally, people who purchase anything on the Dark Web first move Bitcoins (or their cryptocurrency of choice) from the Bitcoin exchange into a heavily secured wallet. Then they move the coins from the wallet into the Dark Web. Even then, it’s advisable to use a separate wallet solely for Dark Web activity, and only move the coins you intend to spend into the wallet. Use a separate name and password for the wallet that you will never use anywhere else. Many people have had their exchanges and wallets hacked by being careless.

Step 5: Always remember, safety first

silke road shut down new arrest made silk 2

The FBI can absolutely track people on the Dark Web, and it keeps the extent of those capabilities a carefully guarded secret, which means you could still get prosecuted for breaking the law even when encrypted. Silk Road wasn’t brought down by amateurs.

However, a more immediate danger for beginners is the great number of traps and hackers in the Dark Web trying to steal personal information and follow any trace back to your computer to learn more about you. Identity theft and blackmail are rampant. So stay alert, don’t wander around too much, and don’t trust any site or contact that you find.

Step 6: Close everything when you are done

hp envy x2 eight_mp power button macro

While on the Tor browser, avoid any other activity on your computer—keep everything shut down. In fact, it’s common advice to avoid even change the settings (outside of the JavaScript step we mentioned) or window size of the Tor browser, since in theory this could be used to track you.

When you are finished, close the Tor browser and shut down/restart your computer entirely. Pay close attention when starting up again, and if everything appears to be acting normally, you can enable your mic settings, webcam, and other functions again.