Zero Trace Hub logo
Menu

dark web

Who Uses the Dark Web — And Why It Matters

Beyond headline criminals: journalists, activists, researchers, censored-country users, and others — who is actually on Tor-backed services, in proportion.

Zero Trace Hub Editorial7 min readUpdated

Headline coverage implies the user base is mostly criminals. That slice exists. So do journalists, censored users, researchers, and ordinary people with narrow privacy needs — and the mix matters for how you judge risk and legitimacy.

The Tor network processed approximately 2 million daily connections as of early 2024 according to Tor Project metrics. The majority of those users are not conducting illegal activity. Here's a realistic picture.

Journalists and Their Sources — SecureDrop as Infrastructure

The most documented legitimate use is source protection in journalism. Organizations including The New York Times, The Washington Post, The Guardian, and ProPublica operate SecureDrop instances. SecureDrop is a whistleblower submission system developed by the Freedom of the Press Foundation that runs as a .onion service.

A source who uses SecureDrop to submit documents can't be traced by the publication — the system is designed so that even the journalists don't know who their source is, unless the source chooses to identify themselves. The metadata that usually betrays people — IP addresses, email headers, file metadata — is stripped or never collected.

This matters because journalism about powerful institutions depends on sources being willing to come forward. That willingness requires realistic confidence that they won't get caught. SecureDrop running as a dark web service isn't a gimmick — it's load-bearing infrastructure for the free press.

For the OPSEC details of how to use SecureDrop safely, the Freedom of the Press Foundation's own documentation is the right place to start, not our site.

Whistleblowers — The Stakes Are High

Whistleblowers are distinct from journalistic sources in one key way: they're acting unilaterally against an institution they're currently part of. The risks are existential — job loss, criminal prosecution, personal harassment.

The dark web is one piece of the whistleblower toolkit. Combined with physical tradecraft (using a public computer on a network not connected to their identity, preparing documents without metadata), it raises the floor on what an adversary would need to identify them.

Notable historical cases — Edward Snowden, Chelsea Manning — predate or didn't fully use Tor-based submission systems. Modern whistleblower guidance from the EFF recommends SecureDrop as the primary channel when available. The dark web is necessary infrastructure for this to work.

The threat model for a whistleblower is intense: a determined, well-resourced adversary (government or large corporation) with access to network logs, personnel records, and legal tools. Threat modeling for this situation requires more than Tor — it requires operational discipline across every channel.

Researchers and Security Teams

Information security researchers have legitimate reasons to access dark web markets, forums, and services:

  • Threat intelligence: Understanding what stolen credentials, exploits, and malware are being sold gives defenders a picture of the current threat landscape.
  • Malware analysis: Dark web forums distribute new malware strains. Researchers download and analyze them in isolated environments.
  • Academic research: Computer science and criminology researchers study dark web markets as a phenomenon — their structure, economics, user behavior.

Major cybersecurity firms — CrowdStrike, Recorded Future, Mandiant — maintain dark web monitoring as part of their threat intelligence products. This is corporate, professional use of the same networks. It's not glamorous, but it's legitimate and often directly beneficial to defenders.

People Living Under Censorship Regimes

This is likely the largest category of non-criminal dark web users by volume, though it's hard to measure precisely. Tor Project metrics show consistent user spikes from Iran, Russia, China, and Belarus coinciding with censorship events — election periods, protests, government crackdowns.

For a resident of Russia or China, the dark web isn't about drama — it's about access to the normal internet. Facebook, Twitter, and independent news sites are blocked. Tor provides access without requiring trust in a VPN provider who may comply with local government demands.

The dark web vs deep web distinction matters here: these users often use Tor to access the clearnet through Tor's exit nodes, not .onion sites specifically. They're using the anonymity network primarily to bypass geographic censorship, not to access hidden services.

This use case is why the Tor Project maintains bridges — relay addresses that aren't published publicly and therefore can't be blocked easily. They exist specifically to serve users in countries with active blocking of the Tor network.

The Criminal Minority — And Why It Dominates Headlines

Darknet markets, fraud forums, and criminal infrastructure do exist on the dark web. We'd be misleading you to claim otherwise. Contraband markets selling drugs, firearms, stolen payment cards, and access credentials are real and documented.

But a few points of context:

They're a minority of usage. Researchers who have analyzed Tor traffic and dark web activity consistently find that criminal activity is a subset, not the majority, of dark web use. A 2019 study by the Rand Corporation found that around 57% of dark web sites contained legal content.

Most criminal activity happens on the clearnet. Financial fraud, malware distribution, phishing — the majority of cybercrime uses ordinary infrastructure. The dark web is not a prerequisite for crime.

Markets are frequently scams, seized, or both. Darknet market history is a cycle of launch, growth, exit scam or law enforcement seizure, repeat. We track vetted markets carefully — see how we vet markets for our methodology. Most markets that pop up are not worth the risk.

The criminal minority gets outsized coverage because it's sensational. That coverage distorts the public understanding of who uses the dark web and why — which in turn distorts policy debates about encryption, anonymity, and law enforcement access.

Frequently Asked Questions

Do normal people use the dark web?

Yes, by any reasonable definition of "normal." Journalists, researchers, people in censored countries, privacy-conscious individuals who simply don't want their browsing tracked — all of them use the dark web. The technology is not exclusively a criminal tool.

Is using the dark web suspicious?

In most jurisdictions, no. Law enforcement resources target specific illegal activities, not Tor usage as a standalone behavior. That said, in high-surveillance environments (certain employers, certain countries), Tor usage may attract scrutiny. This is a threat model question, not a legal one.

Can employers see if I use the dark web?

On a corporate network or device: yes, almost certainly. Tor is fingerprinted at the network level — your IT team can see that you connected to the Tor network even if they can't see what you did inside it. Don't use the dark web on work devices or networks.

Are there legitimate websites on the dark web?

Yes. The BBC, The New York Times, Facebook, and the Tor Project itself all operate .onion mirrors of their services. Academic resources, privacy-focused email providers, and human rights organizations have dark web presences. See what is the dark web for more context.

Related Guides