{"id":37306,"date":"2020-04-09T14:26:46","date_gmt":"2020-04-09T11:26:46","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=37306"},"modified":"2025-08-29T15:09:50","modified_gmt":"2025-08-29T12:09:50","slug":"what-is-the-darknet-what-is-tor","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/what-is-the-darknet-what-is-tor\/","title":{"rendered":"What is the darknet? What is Tor?"},"content":{"rendered":"<div id=\"cards_wrapper\">\n<div class=\"single_card\">\n<p id=\"card_counter_1\" class=\"card_counter\"><span class=\"card_counter_span\">1<\/span><\/p>\n<p><strong>What is the darknet?<\/strong><\/p>\n<div class=\"card_description\">\n<blockquote>\n<p><strong>Attention! The article is outdated and awaiting an update.<\/strong><\/p>\n<\/blockquote>\n<p>The darknet is a hidden network on the internet in which connections are established only between trusted peers, using non\u2011standard ports and custom data\u2011transfer protocols.<\/p>\n<p>The term \u201cdarknet\u201d is often used interchangeably with \u201cdark web\u201d. The dark web is the part of the World Wide Web accessible via overlay networks\u2014that is, the \u201cdarknets\u201d themselves.<\/p>\n<p>The darknet (dark web) is sometimes confused with the so\u2011called <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%93%D0%BB%D1%83%D0%B1%D0%BE%D0%BA%D0%B0%D1%8F_%D1%81%D0%B5%D1%82%D1%8C\" target=\"_blank\" rel=\"noopener noreferrer\">deep web<\/a>\u2014web pages not indexed by search engines. Unlike the darknet, accessing the deep web does not require specialised software.<\/p>\n<p>The opposite of the darknet is the visible or surface web\u2014the part of the internet indexed by search engines and publicly accessible.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_2\" class=\"card_counter\"><span class=\"card_counter_span\">2<\/span><\/p>\n<p><strong>When and how did the darknet emerge?<\/strong><\/p>\n<div class=\"card_description\">\n<p>Originally, the term \u201cdarknet\u201d referred to computers on ARPANET, <a href=\"https:\/\/ru.wikipedia.org\/wiki\/ARPANET\" target=\"_blank\" rel=\"noopener noreferrer\">created<\/a> in 1969 by the Defense Advanced Research Projects Agency (DARPA) of the US Department of Defense. ARPANET was a prototype of the internet. Computer networks\u2014\u201cdarknets\u201d\u2014were configured to receive messages from ARPANET, but their addresses were not listed and they did not respond to external queries, thereby remaining \u201cdark\u201d.<\/p>\n<p>The term gained prominence after the 2002 publication of a <a href=\"https:\/\/www.itworld.com\/article\/2775896\/the-darknet-and-the-future-of-content-distribution.html\" target=\"_blank\" rel=\"noopener noreferrer\">research paper<\/a>, \u201cThe Darknet and the Future of Content Distribution\u201d, by Microsoft employees Brian Willman, Marcus Peinado, Paul England and Peter Biddle. They argued that the presence of a darknet is the main obstacle to the development of digital\u2011rights\u2011management (DRM) technologies and will inevitably lead to copyright infringement. In the paper, the darknet was described broadly as any network requiring a specific protocol for access and existing \u201cparallel\u201d to the surface or visible web.<\/p>\n<p>The term spread widely via the media, which associated it with the anonymous marketplace Silk Road, active from 2011 to 2013 in the .onion zone of the Tor network.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_3\" class=\"card_counter\"><span class=\"card_counter_span\">3<\/span><\/p>\n<p><strong>How is the darknet used?<\/strong><\/p>\n<div class=\"card_description\">\n<p>It is used to bypass censorship, content\u2011filtering systems and surveillance. It also supports file\u2011sharing.<\/p>\n<p>The technology can be used by political dissidents and criminals alike.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_4\" class=\"card_counter\"><span class=\"card_counter_span\">4<\/span><\/p>\n<p><strong>Which anonymous networks does the darknet use?<\/strong><\/p>\n<div class=\"card_description\">The total number of anonymous darknet networks is unknown. There are small networks with only a few dozen users.<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_5\" class=\"card_counter\"><span class=\"card_counter_span\">5<\/span><\/p>\n<p><strong>What is Tor?<\/strong><\/p>\n<div class=\"card_description\">Tor (short for The Onion Router) is the best\u2011known and most popular anonymous network on the darknet. It is a system of proxy servers that supports \u201c<a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%9B%D1%83%D0%BA%D0%BE%D0%B2%D0%B0%D1%8F_%D0%BC%D0%B0%D1%80%D1%88%D1%80%D1%83%D1%82%D0%B8%D0%B7%D0%B0%D1%86%D0%B8%D1%8F\" target=\"_blank\" rel=\"noopener noreferrer\">onion routing<\/a>\u201d, a technology for anonymous information exchange over a computer network. Tor enables anonymity online and protects user traffic from analysis.<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_6\" class=\"card_counter\"><span class=\"card_counter_span\">6<\/span><\/p>\n<p><strong>How does Tor work?<\/strong><\/p>\n<div class=\"card_description\">\n<p>Unlike a regular browser, which sends user data straight to a server and allows third parties to determine location, the Tor Browser relays data through a chain of nodes\u2014intermediate relays scattered around the world. This model makes tracking far harder.<\/p>\n<div id=\"attachment_95189\" style=\"width: 830px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-95189\" class=\"wp-image-95189 size-full\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/image2-16-e1586429570391.jpg\" alt=\"What is the darknet? What is Tor?\" width=\"820\" height=\"544\" \/><\/p>\n<p id=\"caption-attachment-95189\" class=\"wp-caption-text\">Tor architecture<\/p>\n<\/div>\n<p>How Tor works:<\/p>\n<ul>\n<li>On launch, the program forms a circuit of three random nodes through which traffic flows.<\/li>\n<li>When a request is sent, the data are wrapped in three layers of encryption (the multilayer design resembles an onion, hence the \u201conion\u201d name).<\/li>\n<li>The first node removes the outer layer of encryption. It learns the address of the previous and the next node, then forwards the data onward.<\/li>\n<li>The process repeats and the data reach the last node in the circuit\u2014the exit node.<\/li>\n<li>The exit node fully decrypts the payload and forwards the request to its destination.<\/li>\n<li>The response returns along the same path, passing through the same stages.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_7\" class=\"card_counter\"><span class=\"card_counter_span\">7<\/span><\/p>\n<p><strong>Does Tor guarantee complete anonymity?<\/strong><\/p>\n<div class=\"card_description\">Tor does not provide 100% anonymity. Nodes see the real IP address, and it can theoretically be intercepted. Anonymity can be increased by combining Tor with specialised operating systems and VPNs.<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_8\" class=\"card_counter\"><span class=\"card_counter_span\">8<\/span><\/p>\n<p><strong>How did Tor originate?<\/strong><\/p>\n<div class=\"card_description\">\n<p>Development of Tor began in 1995 under a US government contract at the High\u2011Performance Computing Systems Center of the US Naval Research Laboratory (NRL), as part of the Free Haven project in collaboration with DARPA. The source code <a href=\"https:\/\/www.onion-router.net\/History.html\" target=\"_blank\" rel=\"noopener noreferrer\">was distributed<\/a> as free software.<\/p>\n<p>In the early 2000s the project was named The Onion Routing (Tor). In October 2002 a network of routers was deployed which, by the end of 2003, included more than ten nodes in the United States and one in Germany.<\/p>\n<p>Since 2004 the project has received financial and informational support from the civil\u2011liberties organisation <a href=\"https:\/\/www.eff.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Electronic Frontier Foundation<\/a>.<\/p>\n<p>In 2006 a non\u2011profit organisation was created in the United States to develop the network, the <a href=\"https:\/\/www.torproject.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Tor Project.<\/a><\/p>\n<p>In 2008 the Tor Browser <a href=\"https:\/\/blog.torproject.org\/torbrowser-101\" target=\"_blank\" rel=\"noopener noreferrer\">appeared<\/a>.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_9\" class=\"card_counter\"><span class=\"card_counter_span\">9<\/span><\/p>\n<p><strong>Who funds Tor?<\/strong><\/p>\n<div class=\"card_description\">The project\u2019s main <a href=\"https:\/\/www.torproject.org\/about\/sponsors\/\" target=\"_blank\" rel=\"noopener noreferrer\">sponsors<\/a> are the US Department of State and the National Science Foundation. Another source of funding is donations, including cryptocurrencies.<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_10\" class=\"card_counter\"><span class=\"card_counter_span\">10<\/span><\/p>\n<p><strong>How is the Tor project developing?<\/strong><\/p>\n<div class=\"card_description\">\n<p>The team promotes the project, urging the use of Tor to defend the right to free access to information and to privacy.<\/p>\n<p>The Tor Project\u2019s administrators oppose cybercrime: together with the US Agency for International Development, the Brookings Institution, the Cato Institute, the Bill &#038; Melinda Gates Foundation, Trend Micro and the Bitcoin Foundation, they are part of a working group on combating cybercrime.<\/p>\n<p>Tor is supported by many advocates of online security and privacy, including former NSA employee Edward Snowden and WikiLeaks founder Julian Assange.<\/p>\n<p>On the pretext that Tor hosts numerous markets for drugs, weapons, pornography and the like, law\u2011enforcement agencies in various countries have targeted it. In 2014 the FBI paid $1m to researchers at Carnegie Mellon University in the United States for help de\u2011anonymising Tor users.<\/p>\n<p>In 2017 Russia passed a law obliging anonymisers, including Tor, to block services and websites on Roskomnadzor\u2019s blacklist, but Tor refused to comply.<\/p>\n<p>In July 2019 the hacker group 0v1ru$ hacked the server of Saitek, a company presumed to be a contractor to Russian special services. Documents obtained by the hackers contained information on several secret projects by the Russian authorities aimed, among other things, at analysing Tor traffic.<\/p>\n<p>In October 2019 the Tor administration conducted a large\u2011scale \u201ccleanup\u201d of the network, blocking 13% of all active nodes. They were blocked for using outdated software. The \u201ccleanup\u201d was intended to make the network faster and safer.<\/p>\n<p>In November 2019 Tor released a software update capable of automatically blocking connections to obsolete nodes. Abandoned entry points whose IP addresses were not listed in public directories were also blocked.<\/p>\n<p>In March 2020 the Russian \u201cMain Radio Frequency Centre\u201d, subordinated to Roskomnadzor, began studying the possibility of restricting mesh networks, IoT networks and anonymous protocols. The technologies under review included The Onion Router (TOR), Invisible Internet Project (I2P), Telegram Open Network, Freenet, Zeronet, anoNet, and the mesh networks Yggdrasill, cjDNS, Briar, Signal Offline and FireChat.<\/p>\n<p>The work was assigned to the Federal Research Centre \u201cInformatics and Control\u201d of the Russian Academy of Sciences. It was allocated 9.2m roubles, with a report due by 30 June 2020.<\/p>\n<p>Russia ranks second by number of Tor users after Iran. In 2019 slightly more than 330,000 Russians used the browser <a href=\"https:\/\/metrics.torproject.org\/userstats-relay-table.html\" target=\"_blank\" rel=\"noopener noreferrer\">daily<\/a>, accounting for 17.39% of all users.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_11\" class=\"card_counter\"><span class=\"card_counter_span\">11<\/span><\/p>\n<p><strong>What other anonymous darknet networks exist?<\/strong><\/p>\n<div class=\"card_description\">\n<p><a href=\"https:\/\/freenetproject.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Freenet<\/a> is a peer\u2011to\u2011peer network designed for decentralised, distributed data storage.<\/p>\n<p>Unlike Tor and I2P, Freenet provides anonymity only within its own network.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-95193 aligncenter\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/image1-136.png\" alt=\"What is the darknet? What is Tor?\" width=\"560\" height=\"420\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/image1-136.png 560w, https:\/\/forklog.com\/wp-content\/uploads\/image1-136-300x225.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/image1-136-470x353.png 470w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><\/p>\n<p>Freenet has no servers; all data are stored in encrypted form on users\u2019 computers, pooled together. Users contribute bandwidth and disk space to publish or retrieve information. To locate data, Freenet uses key\u2011based routing similar to a distributed hash table.<\/p>\n<p>Users can choose the level of protection: the lower it is, the faster the connection, but at the expense of data security.<\/p>\n<p>Even at low protection, connections remain slow: loading an image can take several minutes, and video playback is impossible, since Freenet does not support the databases and scripts required for dynamic content. The project\u2019s purpose is censorship\u2011resistant data storage, not performance or ease of use.<\/p>\n<p>Freenet is split into two parts: Opennet and Darknet. Opennet is the public segment; access to Darknet is by invitation only.<\/p>\n<\/div>\n<\/div>\n<div class=\"single_card\">\n<p id=\"card_counter_12\" class=\"card_counter\"><span class=\"card_counter_span\">12<\/span><\/p>\n<p><strong>What is I2P?<\/strong><\/p>\n<div class=\"card_description\">\n<p>I2P (Invisible Internet Project) is an overlay anonymous network consisting of two types of nodes:<\/p>\n<ul>\n<li>Routers. They have internal network and regular IP addresses, are reachable on the public internet and keep the I2P network running.<\/li>\n<li>Hidden nodes. They have no IP addresses.<\/li>\n<\/ul>\n<p>I2P separates routers and destinations, hiding where the destination is and which router it is connected to. Each user has several addresses\u2014for websites, torrents and so on\u2014complicating tracking and identification.<\/p>\n<p>I2P is based on tunnels\u2014paths through several routers. As in Tor, multilayer encryption is used: each router decrypts one layer. Unlike Tor, return traffic travels through a separate tunnel.<\/p>\n<p>The user can set tunnel length. The longer the tunnel, the lower the chances of detection, but the slower the connection.<\/p>\n<p>Digital signatures and strong cryptography make I2P the most secure darknet network at the moment.<\/p>\n<p>Subscribe to Forklog on <a href=\"https:\/\/www.facebook.com\/forklog\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"> Facebook<\/a>!<\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>1 What is the darknet? Attention! The article is outdated and awaiting an update. The darknet is a hidden network on the internet in which connections are established only between trusted peers using non\u2011standard ports and custom protocols. The term \u201cdarknet\u201d is often used interchangeably with \u201cdark web\u201d, the part of the web accessible via overlay networks\u2014that is, darknets.<\/p>\n","protected":false},"author":1,"featured_media":37307,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"An explainer on the darknet and Tor: definitions, uses, history, funding and alternatives such as Freenet and I2P.","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[2113],"tags":[2120,477,1256,49],"class_list":["post-37306","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptorium","tag-101-anonymity","tag-darknet","tag-privacy-and-personal-data","tag-tor"],"aioseo_notices":[],"amp_enabled":true,"views":"93","promo_type":"1","layout_type":"1","short_excerpt":"An explainer on the darknet and Tor: definitions, uses, history, funding and alternatives such as Freenet and I2P.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/37306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=37306"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/37306\/revisions"}],"predecessor-version":[{"id":37308,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/37306\/revisions\/37308"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/37307"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=37306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=37306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=37306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}