Understanding dark web terminology is essential for safe and informed browsing. This comprehensive glossary covers technical terms, security concepts, and common slang used across Tor and darknet communities.

A B C D E F G H I J K L M N O P Q R S T U V W X Z

A

Altcoin

Any cryptocurrency that isn't Bitcoin. Common altcoins on the dark web include Monero (XMR), Ethereum (ETH), and Litecoin (LTC). Many prefer Monero for its enhanced privacy features.

Anonymity

The state of being unidentifiable online. True anonymity requires hiding your IP address, using encrypted connections, and avoiding personal information disclosure.

Ahmia

A search engine specifically designed for finding .onion sites. Unlike traditional search engines, Ahmia indexes and makes darknet content discoverable while filtering illegal content.

B

Bitcoin (BTC)

The most widely used cryptocurrency on the dark web. While not completely anonymous, Bitcoin transactions can be made more private through mixing services and proper wallet management.

Bridge Relay

A Tor relay that isn't publicly listed. Bridges help users connect to Tor in countries where it's blocked. They're harder for governments to detect and censor.

Bitcoin Mixer (Tumbler)

A service that mixes your Bitcoin with others to obscure the transaction trail. Helps enhance privacy by breaking the connection between sender and receiver addresses.

Blockchain

A distributed ledger that records all cryptocurrency transactions. While transparent, it can be analyzed to trace Bitcoin movements, which is why privacy-focused users prefer Monero.

C

Clearnet

The regular internet that most people use daily. Everything accessible through standard browsers like Chrome, Firefox, or Safari without special software.

Cryptocurrency

Digital currency secured by cryptography. Bitcoin, Monero, and Ethereum are commonly used on dark web markets for their pseudonymous or anonymous transaction capabilities.

Circuit

The path your connection takes through the Tor network. Each circuit uses three random relays to route your traffic, providing anonymity through multiple layers of encryption.

Cryptography

The science of encoding information so only authorized parties can read it. Essential for secure communication on the dark web through encryption protocols.

Coin Join

A Bitcoin privacy technique where multiple users combine their transactions into one, making it difficult to determine who paid whom.

D

Dark Web

Websites that exist on encrypted networks like Tor and require specific software to access. Not indexed by standard search engines and provides anonymity for users and site operators.

Darknet

An overlay network that can only be accessed with specific software, configurations, or authorization. Tor, I2P, and Freenet are examples of darknet networks.

Dead Drop

A physical location where items can be left for pickup without direct contact between parties. Used in markets to enhance operational security.

Deep Web

All web content not indexed by standard search engines, including password-protected sites, private databases, and paywalled content. Much larger than the dark web and mostly mundane.

Deanonymization

The process of revealing the true identity of an anonymous user. Can happen through traffic analysis, social engineering, or operational security mistakes.

DNM (Darknet Market)

An online marketplace operating on the dark web, typically using cryptocurrency for transactions. These markets facilitate anonymous buying and selling of various goods and services.

E

Encryption

Converting data into a coded format that can only be read by someone with the decryption key. Essential for protecting communications and data on the dark web.

End-to-End Encryption (E2EE)

Encryption where only the sender and recipient can read messages. Even the service provider can't access the content. Used in secure messaging apps like Signal.

Entry Node (Guard Node)

The first relay in your Tor circuit. It knows your real IP address but not what you're accessing. Tor uses stable entry nodes to prevent certain attacks.

Escrow

A third-party service that holds cryptocurrency during a transaction until both parties fulfill their obligations. Common on darknet markets to reduce scams.

Exit Node

The last relay in your Tor circuit. It decrypts the final layer and sends your request to the destination. The exit node can see unencrypted traffic but not your IP address.

F

Fingerprinting

Techniques used to identify users based on unique characteristics of their browser, system, or behavior. Tor Browser is designed to make all users look identical to prevent this.

Finalize Early (FE)

Releasing payment from escrow before receiving goods. Generally discouraged as it removes buyer protection. Only used with highly trusted vendors.

Forum

Discussion boards on the dark web where users share information, trade, and communicate. Popular topics include security, privacy, technology, and various underground activities.

G

GPG/PGP

GNU Privacy Guard / Pretty Good Privacy. Encryption programs used to secure messages and verify identities. Essential for safe communication on the dark web.

Guard Node

See Entry Node. The first relay in a Tor circuit, chosen from a small pool of stable relays to enhance security against certain attacks.

H

Hidden Service

A website or service that operates entirely within the Tor network. Both the server and user remain anonymous. Identified by .onion addresses.

Hidden Wiki

A directory of .onion sites, acting as a starting point for dark web navigation. Multiple versions exist, some more reliable than others.

HTTPS

Hypertext Transfer Protocol Secure. Encrypted version of HTTP. Always use HTTPS sites even on Tor for an additional layer of encryption.

Honeypot

A trap set by law enforcement or malicious actors disguised as a legitimate service. Designed to identify and gather information about users.

I

I2P (Invisible Internet Project)

An alternative anonymity network to Tor. Uses encrypted tunnels and is designed for hidden services rather than accessing the regular internet.

IP Address

Internet Protocol address. A unique identifier assigned to your device when connecting to the internet. Tor hides your IP address to maintain anonymity.

ISP (Internet Service Provider)

The company that provides your internet connection. Your ISP can see that you're using Tor but not what you're accessing through it.

J

JavaScript

A programming language used to make websites interactive. Often disabled on Tor Browser's safest setting because it can potentially leak information about users.

K

Key

A string of characters used in encryption and decryption. Public keys encrypt messages, private keys decrypt them. Guard your private keys carefully.

Keylogger

Malware that records every keystroke you make. Can capture passwords, messages, and other sensitive information. Always use reputable security software.

L

Law Enforcement

Government agencies that investigate illegal activities on the dark web. Use sophisticated techniques including undercover operations, traffic analysis, and market takeovers.

Litecoin (LTC)

A cryptocurrency similar to Bitcoin but with faster transaction times. Sometimes used on darknet markets as an alternative payment method.

M

Malware

Malicious software designed to harm your computer or steal information. Common on sketchy dark web sites. Always use antivirus protection and be cautious.

Market

See Darknet Market. An e-commerce platform on the dark web, typically using cryptocurrency and escrow systems for transactions.

Middle Relay

The second relay in a Tor circuit. It knows neither your IP address nor your destination, only passing encrypted data between the entry and exit nodes.

Monero (XMR)

A privacy-focused cryptocurrency with built-in anonymity features. Transactions are untraceable, making it increasingly popular on dark web markets.

Multi-Signature (Multisig)

A cryptocurrency wallet requiring multiple private keys to authorize a transaction. Provides extra security for large transactions and escrow services.

N

NoScript

A browser extension that blocks JavaScript, Java, and other potentially dangerous content. Built into Tor Browser to enhance security.

Node

A relay in the Tor network. Your connection passes through three nodes (entry, middle, exit) to reach its destination anonymously.

O

Onion Address

The .onion URL used to access hidden services on Tor. V3 onion addresses are 56 characters long, providing better security than older v2 addresses.

Onion Routing

The technique Tor uses to anonymize internet traffic by encrypting data in layers (like an onion) and routing it through multiple relays.

OPSEC (Operational Security)

Practices and procedures to protect sensitive information and maintain anonymity. Critical for anyone using the dark web, covering everything from passwords to behavior patterns.

P

P2P (Peer-to-Peer)

Direct connection between users without a central server. Used for file sharing and some cryptocurrency transactions. Avoid using regular P2P over Tor.

PGP

See GPG/PGP. Essential encryption tool for secure messaging and identity verification on the dark web.

Phishing

Fraudulent attempts to steal credentials by impersonating legitimate sites. Very common on the dark web. Always verify .onion addresses carefully.

Private Key

The secret half of an encryption key pair. Used to decrypt messages and sign transactions. Never share your private key with anyone.

Proxy

An intermediary server that forwards your requests. Tor is a sophisticated type of proxy system. Don't use additional proxies with Tor unless you know what you're doing.

Public Key

The shareable half of an encryption key pair. Others use your public key to encrypt messages that only you can decrypt with your private key.

Q

Qubes OS

A security-focused operating system that uses virtual machines for compartmentalization. Considered one of the most secure options for dark web use.

R

Relay

A server in the Tor network that forwards encrypted traffic. Thousands of volunteers run relays to make the Tor network function.

Reddit

Popular clearnet forum with communities discussing dark web topics. Communities like r/onions and r/tor provide information and links (use with caution).

S

Satoshi

The smallest unit of Bitcoin (0.00000001 BTC). Named after Bitcoin's pseudonymous creator, Satoshi Nakamoto.

Scam

Fraudulent activity designed to steal money or information. Extremely common on dark web markets. Research vendors thoroughly and use escrow.

SecureDrop

An open-source whistleblower submission system. Used by news organizations to receive anonymous tips from sources via Tor.

Silk Road

The first major darknet market, operating from 2011-2013. Its seizure by the FBI demonstrated both the possibilities and risks of dark web commerce.

Surface Web

Another term for the clearnet. The portion of the internet indexed by search engines and accessible without special software.

T

Tails

The Amnesic Incognito Live System. A security-focused operating system that runs from a USB stick and leaves no trace on the computer. Routes all connections through Tor.

Tor

The Onion Router. Free software that enables anonymous communication by routing traffic through a worldwide network of relays. The most popular way to access the dark web.

Tor Browser

Modified version of Firefox configured to route traffic through Tor. Includes privacy protections and security features. The recommended way to access .onion sites.

Traffic Analysis

Examining patterns in network traffic to identify users or activities. While Tor protects against basic traffic analysis, sophisticated attackers with enough resources can sometimes correlate traffic.

Tumbler

See Bitcoin Mixer. A service that obscures the origin of cryptocurrency by mixing it with other users' coins.

Two-Factor Authentication (2FA)

Security measure requiring two forms of verification to log in. Common on darknet markets, usually combining password with PGP-encrypted codes.

U

URL

Uniform Resource Locator. The web address of a site. On Tor, .onion URLs look random and are difficult to remember.

V

Vendor

A seller on a darknet market. Check reviews, history, and PGP keys before purchasing. Established vendors with good feedback are generally more trustworthy.

Virtual Machine (VM)

A software-based computer running inside your actual computer. Provides isolation and security. Useful for testing potentially dangerous software.

VPN (Virtual Private Network)

Encrypts your internet connection through a remote server. Some use VPN + Tor for additional anonymity, though this is debated. Never use free VPNs.

W

Wallet

Software that stores cryptocurrency private keys and allows you to send/receive payments. Hardware wallets are most secure for large amounts.

Whistleblower

Someone who exposes wrongdoing within an organization. Tor and SecureDrop provide anonymous channels for whistleblowers to contact journalists.

X

XMR

Ticker symbol for Monero cryptocurrency. Increasingly preferred over Bitcoin on dark web markets due to superior privacy features.

Z

Zero-Day

A previously unknown software vulnerability. Law enforcement and criminals seek zero-days for Tor Browser to deanonymize users. Keep your software updated.

Zero-Knowledge Proof

A cryptographic method where one party can prove they know something without revealing the information itself. Used in some privacy-focused cryptocurrencies.