As a child in the ’90s I was fascinated by the internet. That tiny browser window in a flashing CRT display became a portal to an exciting world. Not much later, in the early 2000s I realized that the online land of possibilities has another side. The hidden part of the internet is protected by a chain of relays and a tool that is specially developed to reach this area. No ordinary web browser can surf this web, nor the search engines like Google can index and show them in search results. The Tor hidden services was all over in the news in the 2010s because of its dark and lawless side. The Silk Road was taken down by the authorities in October 2013. Ross Ulbricht, the alleged founder and operator of the Silk Road, was arrested and later convicted on multiple charges. The case drew significant attention due to its connection to the dark web and the use of cryptocurrency (particularly Bitcoin) for transactions on the platform. The hidden services and the onion routing was developed for a very different purpose: to help people stay anonymous from governments, dictatorship and to help whistleblowers, journalists and the free speech.
To understand it better, we have to understand the internet we have today. It is often conceptualized as a multi-layered ecosystem consisting of the surface web, deep web, and hidden services.
The surface web is the portion of the internet that is indexed and easily accessible through search engines. It includes websites and information that are open to the public and intended for widespread consumption. News sites and companies’ public websites are the surface web.
In contrast, the deep web refers to the vast, non-indexed portion of the internet that cannot be accessed through traditional search engines. This includes private databases, academic resources, and other content that requires specific permissions or credentials. Our private Facebook profile, or the LinkedIN profiles are on the deep web because we have to log in to see the data shared there.
Lastly, the hidden services exists as a layer within the deep web, accessible only through specialized hidden networks like Tor. It is notorious for its anonymity. A partition of the hidden services is called dark web, this is hosting illicit activities, and providing a platform for illegal transactions.
While the surface web is the most familiar to the average user, the deep and dark web reveal the hidden complexities and layers beneath the surface of the internet.
Beyond the well-known Tor hidden services, there are various other hidden services and alternative networks that provide users with privacy, security, or specialized functionalities.
Some of these include:
- I2P (Invisible Internet Project): Similar to Tor, I2P is an anonymous network that allows users to access hidden services and communicate with increased privacy.
- Freenet: Freenet is a decentralized network that focuses on providing anonymous and censorship-resistant access to information. It allows users to share files and browse websites without revealing their identity.
- ZeroNet: ZeroNet is a decentralized web platform that uses Bitcoin cryptography and the BitTorrent network. Websites on ZeroNet are hosted by users, making them resistant to censorship.
- GNUnet: GNUnet is a peer-to-peer framework that provides privacy and security features for communication and file-sharing. It aims to create a decentralized and censorship-resistant network.
- RetroShare: RetroShare is a decentralized communication platform that allows users to securely chat, share files, and communicate in private groups. It uses friend-to-friend (F2F) technology to establish connections.
- IPFS (InterPlanetary File System): IPFS is a protocol designed to create a content-addressable, peer-to-peer method of storing and sharing hypermedia in a distributed file system. It aims to improve the efficiency and permanence of content distribution.
The largest and most famous of all is the Tor hidden services. It is available for everyone for protecting privacy and maintaining anonymity. The Tor Project develops the Tor browser and it is downloadable by everyone. It is the key, the portal to a different world. The Tor browser is a specialized version of the Firefox browser that can connect to the Onion network and traverse the Onion Routing protocol.
The Onion Routing protocol is designed to provide anonymous communication over the internet by encrypting and routing data through a series of volunteer-operated servers called nodes or relays. The name “Onion” comes from the multiple layers of encryption that are applied to the data.
Here’s a simplified explanation of how the Onion Routing protocol works:
- Encryption Layers: When a user initiates a connection to a destination on the Tor network, the data is encrypted in multiple layers, like the layers of an onion. Each relay in the network removes one layer of encryption to reveal the instructions for routing the data to the next relay.
- Randomized Path: The encrypted data is then sent through a randomly selected path of Tor relays. Each relay only knows the identity of the relay it received the data from and the one it is sending it to, adding an extra layer of anonymity.
- Node Decryption: As the data passes through each relay, one layer of encryption is peeled away, revealing the instructions for the next hop in the circuit. This process is repeated until the data reaches its final destination.
- Exit Node: The final relay in the circuit, known as the exit node, decrypts the last layer of encryption and sends the data to its intended destination on the regular internet.
- Anonymity: Because each relay in the circuit only knows the previous and next relays, and not the source or final destination, the identity and location of the user are hidden. Additionally, the use of encryption ensures that the content of the communication remains confidential.
By employing this multi-layered approach to encryption and routing, the Onion Routing protocol helps to provide a high degree of privacy and anonymity for users accessing the Tor network. It’s important to note that while Tor enhances privacy, it is not completely foolproof, and users should be aware of potential vulnerabilities and take appropriate precautions.
The Tor network designed to provide anonymity and privacy for both service providers and users. These services allow websites and other online resources to be hosted on the hidden web, a part of the internet that is intentionally hidden and accessible only through the Tor network. The primary purposes of Tor hidden services include:
- Enhanced Privacy: Tor hidden services offer a higher level of privacy and anonymity compared to traditional websites. Both the service provider and the user can remain relatively anonymous, as the Tor network encrypts and anonymizes the communication between them.
- Censorship Resistance: Since Tor hidden services are accessed through the Tor network, they can help users bypass internet censorship and access information without revealing their identity or location. This is particularly valuable in regions where online content is heavily restricted or monitored.
- Whistleblowing and Activism: Tor hidden services are often utilized by activists, journalists, and whistleblowers to communicate and share sensitive information securely. This can protect individuals who need to disclose information about corruption, human rights abuses, or other sensitive topics. Do you remember Snowden?
- Security and Anonymity for Service Providers: For those hosting services, such as websites or forums, on the dark web, Tor hidden services provide a layer of security and anonymity. This can be especially important for individuals or organizations that may face risks or legal repercussions for their online activities.
So… how to download and set up the Tor browser for surfing the Tor hidden services? What can we find in this hidden and separated part of the internet? I hope I whet your appetite for the next article when we figure it out!
If you want to discuss the topic with other technology-minded people, join my Discord: https://discord.gg/YbSYGsQYES
Now we have an IRC channel as well: irc.libera.chat / #tomsitcafe
2 thoughts on “Tor Hidden Services: Privacy On The Internet And Dark Things”