Search TorNews

Find cybersecurity news, guides, and research articles

Popular searches:

Home » Dark Web Glossary (Definitions and Terms)

Dark Web Glossary (Definitions and Terms)

Human Written

The darknet is full of people who speak their own language. A mix of gaming terms, hacker slang, law enforcement lingo, and software jargon. To help you make sense of it all, we built our Glossary of the Darknet Terms.

We update it constantly, adding new slang, words, popular brand names, and acronyms that our team discovers in underground forums and messaging apps like Telegram, and cybersecurity research focused on the dark web.

Unless we note otherwise, every definition you see here reflects how these terms are actually used inside darknet and deep web communities.

A

Altcoin

The term means alternative coin, which is any cryptocurrency that is not Bitcoin. This includes Ethereum, Solana, Monero, Ripple, etc. They exist to add features Bitcoin doesn’t have, support smart contracts, and serve niche uses like gaming and DeFi.

Awazon Market

An online marketplace on the dark web where users can buy and sell goods and services, often emphasizing anonymity and cryptocurrency transactions.

Anonymity

The state of hiding your real identity online. To achieve true anonymity on the dark web, you should hide your IP address, use encrypted connections, and avoid sharing personal information.

Ahamia 

A unique search engine that specifically indexes Tor .onion sites, which makes it easy to find dark web sites. Luckily, it filters out some abusive and scam content.

Actors 

Individuals or groups involved in online activity. On the dark web, this includes vendors, buyers, scammers, researchers, and law enforcement.

AES (Advanced Encryption Standard) 

A popular encryption method for securing data. It protects messages, files, and communication on and off the dark web.

Affiliate Model 

A business model where operators recruit partners to execute attacks or sales in exchange for a cut of the proceeds. It is common in malware and fraud schemes.


B

Bitcoin (BTC)

A decentralized digital currency for online payments. It’s the most widely used cryptocurrency on the dark web for pseudonymous transactions. While Bitcoin is not completely anonymous, you can reduce traceability through mixing tools and proper wallet practices.

Bridge Relay

A Tor relay is not listed publicly. It helps users bypass censorship and blocks on the Tor network.

Bitcoin Mixer (Tumbler)

A service that mixes Bitcoins from many users to hide the transaction trail. While this improves privacy by severing the link between sender and receiver addresses, it increases risk and often draws scams or law enforcement attention.

Blockchain

A public ledger that records cryptocurrency transactions. Although it is transparent and permanent, it can be used to trace Bitcoin movements. That is why privacy-focused coins like Monero are gaining popularity on the dark web.

Bait and Switching

A tactic used by darknet vendors to attract customers by advertising a cheap product and then coaxing them to buy a more expensive one.

Botnet

A network of compromised devices that are controlled remotely for a malicious purpose. It is used for spam, DDoS attacks, and malware delivery.

Bridges

In Tor, bridge relays work like regular relays, are volunteer-run, but stay off public listing. They enable users to access Tor in restricted networks.

Brute Force

An attack that repeatedly tries all possible password combinations (trial and error) until the correct one is found to gain entry.

Burner

A disposable and untraceable device used to adopt another identity or access sensitive information without exposure.


C

C2 (Command and Control)

Infrastructure that attackers use to remotely manage compromised systems. They send commands and receive data through it.

CDN (Credit Profile Number)

A nine-digit number used to conceal the real identity in credit applications. It is often sold by fraudulent credit repair services.

Chan

A darknet discussion forum with anonymous users. It features image-based posts and is known for fast, politically charged debates.

Cheese

A slang term for easy money or profit. It is often used when an exploit or scam seems low effort.

Cipher

An algorithm that encrypts or decrypts data and defines how information is protected.

Ciphertext

Encrypted or encoded data that is unreadable without the correct cipher.

Circuit

The path Tor builds to route your traffic. Each circuit routes your traffic through three random relays to limit tracking.

Clearnet

The regular internet you can access with standard browsers like Chrome, Firefox, or Safari. It includes indexed websites that search engines can crawl.

Cloud

Remote servers and data stores for storage or computing outside the local networks or devices. Criminals misuse cloud services to host data or malicious tools.

CoinJoin

A privacy technique for Bitcoin transactions that mixes multiple users’ payments into one, making it difficult to trace individual transactions.

Comment Spamming

Posting in the comments section to negatively impact the site and execute a malicious agenda. It is usually used for malware spread and scams.

Consensus (Crypto)

A process where all participants (nodes) in a blockchain agree on the validity of transactions to ensure security and data integrity.

A small text that a website stores in your browser. It contains data like login details, preferences, and tracking info. Malicious actors can use cookies to bypass logins.

Corporate Risk

Potential reputational or financial harm to a company from data readily available from the darknet and open sources.

Crawler

An automated program or script that scans and collects data from websites.

Credential Stuffing

A common tactic cybercriminals use to test if stolen email addresses or usernames and their corresponding passwords are valid logins to gain unauthorized access to accounts.

Cryptanalysis

The study of breaking encryption or finding weaknesses in cryptographic systems without knowing the key. It is used in attacks and surveillance.

Cryptocurrency

A digital currency that runs on decentralized systems and is secured by cryptography. They are commonly used on the dark web because of their anonymous nature. Common examples include Bitcoin, Ethereum, and Monero.

CSAM (Child Sexual Abuse Material)

Illegal material that depicts sexual abuse or exploitation of minors. Law enforcement actively targets this kind of material on the darknet.

CTA (Cyber Threat Actor)

Any individual, group, or organization that deliberately exploits digital systems for malicious reasons like espionage, profit, or disruption.

Cyber Insurance

An insurance policy that protects businesses from losses caused by cyber incidents like ransomware, DDoS attacks, and data breaches.

Cyclic Redundancy Check

An error-detection method used to find accidental changes in raw data during transmission. It is not an encryption technique.


D

DAO (Decentralized Autonomous Organization)

A blockchain-based group governed by smart contracts and community voting instead of a central authority. Common examples include Decebtraland or Unswap.

Daemon

A background program or process that runs continuously on a system without direct user interaction. It usually starts at boot-up and performs system tasks, provides service, or manages resources. Sometimes malware disguises itself as a daemon.

Dark Web

A part of the internet that is not indexed by regular search engines and can only be accessed using special tools like Tor. It hosts anonymous marketplaces, forums, and services.

DB (Database)

A collection of organized and structured data stored and managed electronically. Breached databases are leaked or sold on the dark web.

Dead Drop

A method of delivering goods without direct face-to-face contact between the involved parties. It is common in dark web markets to enhance anonymity.

Deanonymization

The act of revealing the identity of an anonymous user through various techniques like social engineering, traffic analysis, or operational security mistakes.

Decryption

The process of converting encrypted, unreadable data (ciphertext) back into a readable format (plaintext). It requires the correct key.

Denial of Service (DoS)

A cyberattack that overwhelms a network, system, or servers with excessive requests or traffic to make it unavailable to legitimate users.

DES (Data Encryption Standard)

An older encryption algorithm that encrypts data in 64-bit blocks. It is now vulnerable to modern brute-force attacks due to its short key length and has been replaced by stronger algorithms like AES.

Dictionary Attack

A cyberattack that uses common dictionary words and phrases to guess passwords. It succeeds against weak passwords. That is why it’s always advisable to use long, complex, and unique passwords.

Diffie-Hellman (DH)

A key exchange algorithm that allows two parties to establish a shared key over a public channel, like the internet.

DNM (Darknet Market)

A dark web marketplace that facilitates the anonymous trade of legal and illegal goods and services. Participants usually use cryptocurrency and escrow for transactions.

Domain

A unique string of text that corresponds to an IP address and makes it easy to find a website on the internet. For example, the domain name for PrivacySavvy is privacysavvy.com.

Dreadit

A dark web discussion forum similar to Reddit in structure and layout. It was created by HugBunter after Reddit banned discussions about darknet marketplaces.


E

Encryption

A method of scrambling data to prevent unauthorized access. Common examples include AES (Advanced Encryption Standard), RSA (Rivest-Shamir-Adelman), and ECC (Elliptic Curve Cryptography).

End-to-End Encryption (E2EE)

An encryption system that ensures only the sender and receiver can read messages. Intermediaries, even the service provider, cannot access the content.

Escrow

A third-party holding system that holds funds during a transaction until both parties fulfil their commitments. It is common on dark web marketplaces to reduce fraud.

Exfil

It’s a slang term for Exfiltration. This is the process of extracting data from a victim network or system, often through FTP or SSH.

Exit Relay

The last Tor relay that routes traffic to the destination. It can see unencrypted traffic, but not your IP address.

Exit Scam

A type of scam where a vendor or marketplace suddenly disappears after taking payment from buyers or stealing funds held in escrow.

Exploit

A code or procedure that takes advantage of a flaw or vulnerability in software, firmware, or an operating system to gain access or control. Exploits are sold and traded on dark web forums.


F

Fingerprinting

A tracking technique that identifies users by collecting unique characteristics of their device, browser, and settings. It can reveal identities even when cookies are blocked. Tor browser prevents this by making all users look the same.

Finalize Early (FE)

A marketplace option where the buyer releases payment from escrow before receiving goods. However, it is usually discouraged because it raises buyer risk. This method favors highly trusted vendors.

Forum

An online discussion board. Dark web forums are used to share information, trade, and communicate. Some of the popular topics on these forums include privacy, technology, security, hacking, breaches, and more.

Firewall

A system that continuously monitors incoming and outgoing traffic to block untrusted sources. It can restrict access to Tor or flag unusual connections.

Freenet

A peer-to-peer decentralized network for anonymous file sharing and communication. It hosts data across multiple peers to resist censorship.

Flake

A common slang term on the dark web for more potent, purer, and more expensive cocaine.

Fullz

A slang term for full information.  It consists of complete personally identifiable information (PII) that cybercriminals use to commit fraud or identity theft. Some dark web sites sell this data.


G

Guard Node

The first Tor relay your device uses when connecting to the Tor network. It remains unchanged for long periods to reduce the risk of traffic analysis.

GPG/PGP

GNU Privacy Guard is an encryption tool used to secure emails, messages, and files. On the dark web, it is used to verify identities and protect private communication.

GG (Gamma Goblin)

A former dark web marketplace that focused on psychedelics, mainly LSD blotters. However, it disappeared without a clear exit.

Ghosting

Cutting off communication without notice. Vendors may ghost buyers before an exit scam.


H

H4X0R

A slang term for a hacker, often ironic or mocking.

Hacking

An act of infiltrating into systems or networks, typically to steal data for malicious purposes. The dark web enables cybercriminals to trade the stolen data.

Hacktivists

Hackers who are motivated by ideology instead of profit. They usually target organizations that conflict with their religious, social, or political beliefs.

Hashing

Turning data into a fixed-length code (hash value) using a mathematical function. It is used for passwords, verification, and blockchain integrity.

Hidden Service

A website or service that runs entirely on anonymity networks like the Tor network and uses special addresses ending in .onion. Both the location and operators remain anonymous.

Hidden Wiki

A listing of .onion sites that serves as a starting point to navigate the dark web. Many copies exist, and some contain unsafe links or scams.

High-Risk Surface Web

Surface web sites that host illegal or borderline content and heavily overlap with the deep web and darknet communities.

Honeypot

A trap set by malicious actors or law enforcement for monitoring or investigation. Some forums and markets act as honeypots. 

Hot Wallet

A virtual cryptocurrency wallet that is constantly connected to the internet and the cryptocurrency network. Although it’s convenient, it is vulnerable to online hacks, malware, and phishing.

HTTPS (Hypertext Transfer Protocol Secure)

A secure version of HTTP that encrypts data between the browser and the site. It protects content but doesn’t hide the IP address. Nonetheless, always use HTTPS sites even on Tor for an additional layer of security.


I

I2P (Invisible Internet Project)

An anonymous network designed for private communication and hosting internal websites, similar to Tor. It routes traffic through multiple layers to hide users and servers.

IAB (Initial Access Broker)

Individuals or groups with access to networks, either legitimately or through known vulnerabilities, that sell access to criminals.

IDS (Intrusion Detection System)

A device or software that monitors networks for suspicious activity and alerts administrators.

Image Board

An internet forum for posting images and comments where identity is kept anonymous. Some dark web boards support anonymous chats and file sharing. 

IP (Internet Protocol) address

A unique identifier assigned to every internet-enabled device. It can be IPv4 or IPv6. You should keep it secure, as revealing it can compromise anonymity on the dark web. Thankfully, Tor masks your IP address to keep you anonymous.

IP Address

An Internet Protocol address (IP address) is a numerical label assigned to your device when connecting to the internet. Revealing it can expose your identity and location. Tor masks it to maintain your identity.

IR (Incident Response)

Comprises the actions an organization takes after a security incident. This involves containment and recovery.

ISP (Internet Service Provider)

A company that gives you access to the internet. While your ISP can see you’re using Tor, it cannot see the sites you’re visiting through it.


J

JavaScript

A scripting language for making websites interactive. On anonymity networks like Tor, it can potentially leak identifying data and is often disabled for privacy.

Jabber

An instant messaging system based on XMPP. Some dark web vendors use it for direct communication, often with encryption.

Jitter

These are small, random delays added to network traffic to avoid timing analysis and make deanonymization harder.


K

Key

A piece of cryptographic data for encrypting and decrypting data. Keys control who can read messages and verify identities.

Keylogger

Malware that records keystrokes. It can steal messages, passwords, and other sensitive information. So, always use a reputable security solution.

Kali Linux

A Linux distribution designed for security testing. It has hundreds of pre-installed tools used by researchers and attackers.

Kill Switch

A security tool that instantly cuts internet or Tor connection if it detects a security breach, preventing leaks.

Key Escrow

A system that holds encryption keys for a third party. It weakens privacy if compromised or misused.


L

Law Enforcement

Government agencies that investigate and prosecute crime. They monitor parts of the dark web and use sophisticated techniques like traffic analysis, undercover operations, and market takeovers.

Leak

The release of private or restricted data stolen from companies, government, or individuals and shared on Tor forums or dark web marketplaces without permission.

Ledger

A distributed financial record system that hides user identity, cryptocurrency balances, and transaction details.

A collection of websites that hyperlink to a target page to boost SEO ranking or spread malware.

Listing

A product or service offered on a dark web marketplace, including price, terms, and delivery method.

Litecoin

An altcoin with faster transaction times. It is sometimes used as an alternative payment option on dark web marketplaces.

Logs

The data that is generated by a computer that records usage, activity patterns, and operating system events. Logs can expose our identity.

Love Letter

A scam message pretending to be from a romantic interest. It is common on the dark web and tries to manipulate victims into sending personal information or cryptocurrency.


M

Malware

Malicious software designed to steal data, spy on users, or damage systems. It is common on the dark web and spreads through infected files, links, or fake services. So, always be careful and use antivirus protection.

Masking

Modifying real data with fake or altered values to reduce traceability.

Mariana’s Web

A myth describing a deeper, hidden layer beneath the dark web with forbidden, illegal information and services.

Marketplace

An online market on the dark web. They involve buying and selling a wide range of products and mostly use cryptocurrencies for transactions.

MD5 Hash

An older hashing function that converts data into a 128-bit code. While it is weak by today’s standards, it’s still used in basic verification or legacy systems.

Metadata

Hidden data that provides structure, content, and more information about data or documents. It can leak identity details.

Mirror Site

An exact copy of a website with a different URL or domain and hosted on a different server.

Misinformation

Spreading incorrect or misleading information unintentionally due to a misunderstanding, a lack of knowledge, or an error.

MITM (Man-in-the-Middle)

An attack where the cyber attacker relays messages (after secretly intercepting) between two parties, posing to be both, to spy, steal data, or alter the communication.

Mod (Moderator)

An individual (s) who monitors chats or forums.

Molly

A slang term for methylenedioxymethamphetamine (MDMA). Also referred to as ecstasy, this is a psychoactive drug commonly sold on the dark web.

Multi-Signature

A crypto feature that requires more than one private key to approve a transaction. It is used in escrow and shared wallets to reduce single-point theft.


N

Nation-State Actors

Government-backed groups that gather information of interest on the dark web. They target criminals, activists, and rival states. 

Newfag

A slang term for a newcomer with little experience in dark web communities who is considered a nuisance. It is often used dismissively on forums.

NFT (Non-Fungible Token)

A digital asset that represents a unique physical or digital item on the blockchain, giving the buyer ownership of the original.

Node

A volunteer server in the Tor network that helps to relay and validate data. Normally, your connection routes through three entry, middle, and exit nodes to reach its destination anonymously.

NoScript

A browser extension that blocks JavaScript and other active content. It is built into the Tor browser to reduce tracking and data leaks.


O

OnionFind

Ahmia is a search engine for Tor’s onion services launched in 2025. OnionFind is accessible through both its clearweb website and its onion service version.

Onion

A reference to Tor’s layered encryption model or .onion sites, with each layer hiding routing details.

Onion Address

A special URL ending with .onion that is used on the Tor network. It redirects to a hidden service and isn’t accessible on the regular internet.

Onion Routing

A technique of routing traffic through multiple encrypted layers (like an onion). Each layer removes one layer, hiding both the sender and destination. 

OP (Original Poster)

The first person who starts a thread in a forum. Some cyber operations are also called OPs. Replies often refer back to the OP’s message.

Open Source

Any application, software, or program with publicly available code.

Opsec (Operation Security)

Practices to protect sensitive information and privacy. It is critical for accessing the dark web, as it covers behavior, tools, payment, and communication habits.

OTR (Off-the-Record Messaging)

The malware that a perpetrator intends to deploy to the victim, such as a virus, keylogger, or rootkit. It may steal data, open backdoors, or run remote commands.

OnionWiki

A dark web directory and knowledge base that provides information, links, and resources about onion sites and hidden services.


P

P2P (Peer-to-Peer)

A network architecture where users connect directly without a central server. It is used for file sharing, anonymous communication, and some cryptocurrency transactions. You should not replace regular P2P with Tor.

Pastebin

A service for sharing plain text dumps anonymously. They usually feature leaked data, code, and credentials.

Payload

The functional part of the malware that performs the actual attack, like stealing data, creating backdoors, or encrypting files (ransomware).

PCP

A slang term for phenyl cyclohexyl piperidine or phencyclidine. It’s a dissociative hallucinogenic drug that appears in some drug trade discussions on the dark web.

PERSEC (Personal Security)

Measures to protect and control personal identity and information. It complements operational security (OpSec).

PGP (Pretty Good Privacy)

An encryption standard for securing messages and files through public-key cryptography. It is used for private communications.

Phishing

A social attack technique that tricks users into revealing passwords, keys, or wallet details. It is common on the dark web, so always verify the onion sites you visit.

Phishing-as-a-service (PhaaS)

A ready-made kit with guides, templates, and tutorials for an actor to execute a phishing scam. It lowers the skill needed to run phishing scams.

PND (Pump-and-Dump)

A fraud involving artificial manipulation and inflation of a cryptocurrency price through hype and misleading statements. This leaves other investors with losses when the price crashes.

POS (Proof-of-Stake)

A consensus method of verifying cryptocurrency transactions. Validators protect the network by staking coins.

Private Key

A secret cryptographic key that controls access to cryptocurrency or encrypted data. Losing it means losing access.

Protocol

A standard set of rules that dictates how web content is retrieved and presented on a browser. Examples include SMTP and HTTP.

Proxy

An intermediate server that relays your traffic and hides your IP address. Tor works as an advanced proxy system with better privacy. Using extra proxies with Tor can cause problems if you lack experience.


Q

Quarantine (Malware)

Isolating infected files or systems to prevent malware from spreading within a network or device.

Qubes OS

A security-focused operating system that isolates tasks into separate virtual machines. It limits damage if one part is compromised, and it is one of the safest options to access the dark web.

Queue Time

The delay before a Tor circuit is built or traffic is forwarded. Long queue time can indicate relay issues or network congestion. 

qTox

A desktop client for the Tox messaging network that supports encrypted, peer-to-peer communication.

Quorum Signature

A transaction approval that requires multiple participants. It is mainly used in escrow systems and shared wallets.


R

RaaS (Ransomware-as-a-service)

An illegal business model where developers lease or sell ransomware tools to criminals who then execute the attacks. This model lowers the technical barrier for entry into cybercrime, enabling low-skill actors to execute advanced ransomware campaigns.

Ransomware

A type of malware that encrypts files and applications, and the hacker demands payment for decryption. It is very common on the dark web.

RAT (Remote Access Trojan)

A malware type that bypasses the system’s security and gives an attacker remote control of a device. It is used for spying, data theft, or further attacks.

Reddit

A public discussion platform on the Clearnet. Some dark web communities like r/tor and r/onions use it for surface-level talk, not transactions.

Relay

A server that redirects encrypted traffic through the Tor network. It doesn’t know the full path of the connection. The Tor network relies on thousands of volunteer-run relays.

Ripper

A common slang term on dark web marketplaces for a scammer who takes payments without delivering anything or runs escrow exit scams.

Rootkit

A stealthy malware that embeds deep in a system and provides unauthorized, persistent, and privileged access to a target device. It enables attackers to install other malware, monitor activity, steal data, or launch attacks. 

Router

A networking device that directs network traffic, acting as a gateway to connect your device to the internet. A misconfigured router can leak data.

RSA (Rivest-Shamir-Adleman)

A public-key ecosystem for secure online communication and digital signatures.


S

Satoshi

The smallest unit of a Bitcoin. 1 Bitcoin is equal to 100 million satoshis.

Satoshi Nakamoto

The pseudonymous creator of Bitcoin, whose real identity remains unknown.

Scam

A fraudulent activity intended to steal money or data. It is widespread on the dark web, with examples like fake vendors, exit scams, and impersonation sites. So, always use escrow and research vendors thoroughly.

SCADA (Supervisory Control and Data Acquisition)

A computer-based control system that manages and controls complex industrial processes and equipment, often tied to critical infrastructure. They are high-value targets by nation-state actors and other criminals.

SecureDrop

An open-source system that allows whistleblowers to send anonymous tips to journalists. It relies on Tor and strong encryption.

Seizure

The forceful takeover of domains, servers, funds, or operations. It is common for law enforcement to seize specific services and darknet markets.

SOCKS (Secure Over Credential-Based Kerberos Services)

A network protocol that routes traffic through a proxy server. While it hides the IP address, it doesn’t offer any encryption on its own.

Stablecoin

A cryptocurrency that fixes its value to a fiat currency. Although it minimizes price swings, it depends on the issuer’s trust.

Stealer

Malicious software that extracts credentials, cookies, and other sensitive data to exploit the victim financially, engage in fraud, or commit identity theft.


T

Tails

It is an acronym for The Amnestic Incognito Live System (TAILS). Essentially, it is a privacy-focused operating system that operates from a USB drive. Tails routes traffic through Tor and doesn’t leave any data on the computer by default.

Telegram

A cloud-based messaging application and social communication platform that provides end-to-end encryption. It is often referred to as ‘dark web lite’ because criminals use its features for activities typically associated with the traditional dark web.

Thread

A chain of contributions and comments under a single topic on a forum. It is common on darknet forums.

Tor (The Onion Router)

Free software that facilitates anonymous browsing by routing traffic through multiple relays. It is the most common method to access the dark web as it hides IP addresses and access patterns. 

Tor Browser

A modified browser that routes traffic through the Tor network with better security features and privacy protection than conventional browsers. It is the best way to access .onion sites as it reduces tracking and fingerprinting.

Traffic Analysis

Studying network traffic patterns to link users to specific activities. Although Tor blocks basic traffic analysis, advanced adversaries can still correlate traffic.

Two-Factor Authentication

A login method that requires two forms of verification to access an account. It is common on dark web marketplaces, usually pairing passwords with PGP verification. It minimizes account takeovers.

Tenebris

Tenebris is a popular, Reddit-style dark net forum on the Tor network that serves as a primary hub for discussing dark web markets, illicit activities, and scams.


U

UDP (User Datagram Protocol)

A fast network protocol without delivery checks. However, it isn’t recommended because it leaks metadata.

Uptime

The length of time a hidden service or relay stays online without interruption. High uptime often impacts trust and reputation.

Uptime guarantee

A promise by a marketplace or hosting service about how long it stays online. While it often signals reliability, it can be misleading.

URL

An acronym for Uniform Resource Locator (URL). This is the address used to access a website or online resource. On the dark web, URLs often appear long and random.


V

Valids

Verified stolen datasets such as credit cards, usernames, and password combinations. They cost more on dark web marketplaces than untested data.

Vendor

A seller on a dark web marketplace. Vendors build reputation through reviews and transaction history. So, always check feedback, seller history, and PGP keys before buying on the dark web.

Vendor Shop

A standalone darknet store focused on a single product or service, run by one or two vendors at most. However, it raises the risk of exit scams, law enforcement, hacking, shutdowns, and operational security failures.

Virtual Machine (VM)

A software-based computer that operates inside another computer. It isolates activity from the main operating system. It helps test potentially harmful software.

Virus

A type of malware that embeds itself in legitimate files or programs, replicates, and spreads to other systems to cause damage or steal data.

VPN (Virtual Private Network)

A service that routes internet traffic through a remote server. Some VPNs include Tor for added anonymity, though this remains debated. Nonetheless, avoid free VPNs.

W

Wallet

Software or hardware used to store and manage cryptocurrency. It holds private keys needed to send or receive funds.

Warez

Pirated software, media, or games that are distributed on both the Clearnet and the dark web.

Whistleblower

 A person who exposes wrongdoing in an organization. Anonymous networks like Tor and SecureDrop enable whistleblowers to share information safely with journalists.

Whonix

A Linux distribution that routes traffic through Tor. It splits networking and user activity into separate systems.

Wikis

Collaborative knowledge sites where users write and edit content for other users to access. On the dark web, they host guides, glossaries, and archived material.

Worm

Malicious self-spreading software that moves across devices on the same (or adjacent) network without user action. It can spread fast and cause large-scale damage.


X

X.509 Certificate

A digital certificate that is used to verify the identity of a website or service. In fact, some dark web sites use it to appear legitimate.

XKeyscore

A large-scale surveillance system that intelligence agencies use to monitor internet traffic, including Tor-related activity.

XMPP (Extensible Messaging and Presence Protocol)

An open messaging protocol used for real-time communication. On the dark web, it is often paired with encryption for private chats between users and vendors.

XMR (Monero)

A privacy-focused cryptocurrency that hides transaction details like sender, receiver, and amount. It is increasingly gaining popularity over Bitcoin on dark web marketplaces because of its privacy features.

XSS (Cross-site scripting)

A web attack that injects malicious code into sites and applications. It can steal sessions or redirect users to phishing sites.


Y

Yubikey

A physical security key used for authentication and encryption. It helps to protect accounts and cryptographic keys.


Z

Zero-Day

A software flaw unknown to the developer. Attackers exploit it before a fix becomes available. So, always update your software regularly.

Zero-Knowledge Proof

A cryptographic method that proves a statement is true without revealing the underlying data. It is used in some privacy-focused systems and cryptocurrencies.

ZeroNet

A decentralized network that uses peer-to-peer hosting and cryptographic addresses. Content stays online as long as peers share it.

Zite

A site that is hosted on ZeroNet and stays online through peer sharing instead of central servers.


Share this article