Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Scams & Phishing Security Education Videos Important Resources & Information Mobile Security Your Security Education Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Taking a Deeper Dive Into the Dark Web; Understanding the Terminology
Facebook   X   LinkedIn   Email

Taking a Deeper Dive Into the Dark Web; Understanding the Terminology

January 5, 2025

There are terms that are often mentioned in the cybersecurity world, especially when the topic of the dark web comes up that some may not exactly understand. The dark web may be confusing enough. However, another term is "tor" as in "tor site" or "tor network." Another is the "deep web." Fortunately, it’s not really that difficult to understand and we’re here to help break it down. So let’s take a deeper dive into the dark web to find out how scary it actually is down there.

A Tor site is a website or online service that is accessible through the Tor network. Tor, which is short for "The Onion Routing" project is a network that enables users to browse the internet anonymously and securely by routing their internet traffic through a series of encrypted relays. The connection goes through several layers to ensure privacy; as in layers of an onion. It was originally created at the U.S. Naval Research Laboratory to help intelligence sources communicate securely and safely, particularly in areas where the safety of personnel is critical. Now, it’s used for all kinds of things, but has gained that reputation for being used for evil.

Unlike regular websites that can be accessed through standard web browsers, Tor sites can only be accessed through Tor browsers and the websites end in “.onion.” The web addresses themselves are made up of a series of randomized characters, making them difficult to remember or guess. For example, a Tor site address might look something like "3g2upl00q6kufc4m.onion." That’s just a random set of characters and may or may not actually go to a dark website.

Tor sites are designed to provide enhanced privacy and anonymity to both website owners and visitors. Because Tor site connections are encrypted and routed through multiple relays, it is challenging for anyone to trace the online activity back to its origination. This makes Tor sites particularly appealing to individuals who want to protect their identity, bypass internet censorship, or engage in activities that require a higher level of anonymity, for example, undercover investigations by law enforcement.

However, due to this anonymity, Tor sites have gained a reputation for hosting a wide range of content, including both legal and illegal activities. While there are legitimate Tor sites that offer services such as secure communication platforms, whistleblower platforms, or alternative social media networks, there are also Tor sites that may host illegal marketplaces, hacking forums, or other illicit content. In the United States, it isn’t illegal to access the dark web or go through a Tor site, but it is illegal in some countries.

It’s important to note that if you are going to dive into the Tor network, ensure you have anti-virus/anti-malware software installed on your device and that it is updated with the latest version. If you’re poking around in there, it’s likely you’ll encounter malware at some point.

Overall, Tor sites offer a unique and anonymous way to access online content, providing both advantages and potential risks depending on how they are used.

One final note, there’s also the “deep web.” Sometimes “dark web” and “deep web” are used interchangeably. However, they are not the same. The deep web goes even further and includes legitimate content that requires a fee for service. For example, while Netflix is accessible on the surface web, a lot of what is available is not. To get to it, you need to pay a fee and/or log in, therefore it’s part of the deep web. The dark web is also one part of this deep web.

This is only a very short introduction to the deep and dark web. If you want to know more, there is no shortage of information freely available to you on the surface web. Just type the terms into a search engine and you’ll find it.


Your Data For Sale On The Dark Web And What You Can Do About It

Identity Theft

Your Data For Sale On The Dark Web And What You Can Do About It

As much as we love the convenience of our digital world, we know a hefty price tag can come with it. The world is full of bad actors whose goal is to get their hands on our sensitive, personally identifiable information, or PII. Should you find your PII is for sale on the dark web, it helps to know there are options for doing something about it, even if you think it’s too late. Just some of that hijacked PII can include passwords, email and physical addresses, Social Security numbers, financial accounts, and much more. READ FULL STORY

Financial Services Robust Security Forces Cybercriminals To Target Customers

Your Security

Financial Services Robust Security Forces Cybercriminals To Target Customers

Cybersecurity experts are focused on finding ways to foil attempts by cyber criminals to access information related to client accounts and the cyber criminals themselves, who are continually in search of loopholes in security solutions to access sensitive personal information. And if research from Akamai is true in their annual “State of the Internet” report, then cybersecurity teams are fighting a desperate fight against professional malware groups intent on using a variety of tactics. READ FULL STORY

When Sharing Isn't Always A Good Thing: TikTok Shares Your PII

Mobile Security

When Sharing Isn't Always A Good Thing: TikTok Shares Your PII

Growing up, our elders taught us to share with others. Of course, we know they weren’t talking about sharing personal information online. If anything, the latest TikTok hack should be a lesson to us all to be extremely careful about the PII (personally identifiable information) we share online, especially on social media sites. TikTok’s “Find Friends” option was exploited by hackers who used it to steal PII from the account holder and their contacts. READ FULL STORY

Should I, Could I Freeze My Credit Report?

Education

Should I, Could I Freeze My Credit Report?

Having your private information or identity stolen is no picnic. It takes quite a long time to make it right, so one of the best ways to help ensure that neither happens in the first place is to protect it as much as you can. In light of the recent Capital One data breach, many may be considering putting a freeze on their credit reports and that is a great idea. However, it's a good idea to be sure to know what that means before taking that action. READ FULL STORY

How Your Instagram and Facebook “Friends” Can Steal Your Social Media Account

Your Security

How Your Instagram and Facebook “Friends” Can Steal Your Social Media Account

It’s time to resurrect the old adage “With friends like these, who needs enemies?” Thanks to the nonprofit Identity Theft Resource Center (ITRC), their work has uncovered a social media hack victimizing users of Facebook and Instagram using friendship as a lure. Although attacks targeting social media users are nothing new, this latest scam tugs on the heartstrings of helping a friend in need. But the only thing this friend really needs is overtaking your social media account with your help, of course. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...