Get your free and exclusive 80-page Banking Passkey Report
darkweb banner corbado

What’s the difference: Dark Web, Deep Web & Grey Web?

Explore the Dark Web: Learn differences between Dark Web, Deep Web & Grey Web, discover security tools & uncover legitimate uses beyond the headlines.

alexander petrovski

Alex

Created: July 27, 2025

Updated: August 1, 2025


Our mission is to make the Internet a safer place, and the new login standard passkeys provides a superior solution to achieve that. That's why we want to help you understand passkeys and its characteristics better.

1. Introduction: Dark Web, Deep Web & Grey Web#

Black markets for drugs, cybercrime and hacking, as well as terrorism and dangerous content are topics that first come to mind when talking about the Dark Web. The media often portrays the Dark Web as a purely dangerous underworld full of criminals, hackers, and illegal activities. Leaked data, stolen identities, and compromised credentials routinely end up on Dark Web marketplaces, often without the knowledge of victims. While some truth underlies these dramatic portrayals, this perspective is often incomplete and oversimplified even though some of the greatest threats to your personal information are lurking in this digital space called the Dark Web.

In this blog we are aim to move past sensational headlines about the Dark Web and explain what it is really all about, while also providing actionable insight for your cyber security. In the process, we will be answering a few leading questions about the topic:

  • What is the difference between Dark Web, Deep Web and Grey Web?

  • How to use tools associated with the Dark Web and how to stay safe?

  • What legitimate uses of the Dark Web are there and how can they benefit you?

2. What is the Dark Web?#

When people hear “Dark Web,” they often think of a mysterious and shadowy place hidden deep within the internet. In reality, the Dark Web is simply a part of the internet intentionally concealed from standard search engines (Google, Bing, Yahoo, Yandex etc.). It can’t be accessed with a regular browser like Chrome, Firefox, or Safari.

Instead, specialized browsers or software, like Tor (The Onion Router), are needed to access its hidden content. This structure ensures the anonymity of users and website operators, protecting their identities and locations from being tracked.

2.1 Historical Context of the Dark Web#

The concept behind the Dark Web has surprisingly legitimate origins, rooted in privacy and secure communication:

  • Mid-1990s: Researchers at the U.S. Naval Research Laboratory developed the foundational technology known as “onion routing”. The primary objective was ensuring secure, anonymous communication channels for intelligence and military operations.

  • 2002: Recognizing the broader potential for enhancing online privacy for everyone, the onion routing technology evolved into what we now know as the Tor network, becoming publicly available and free for widespread use.

  • 2002–present: Tor and consequently, the Dark Web, became accessible to any internet user seeking online anonymity, whether for ethical activities like journalism and activism, or for illicit and unethical purposes.

2.2 Technical Overview#

Understanding the Dark Web requires knowing a bit about how it operates behind the scenes. Its cornerstone is a technology known as “onion routing,” which layers encryption around a user’s communication like the layers of an onion. When someone accesses a website through the Dark Web, their connection is passed through multiple nodes, or servers, each stripping away one layer of encryption. No single node sees the entire picture. This process makes it exceptionally difficult to trace users, offering strong anonymity.

Substack Icon

Subscribe to our Passkeys Substack for the latest news.

Subscribe

2.3 What you might find on the Dark Web#

Contrary to popular imagination, the Dark Web is not solely a place of illicit activity. It hosts a wide range of content:

  • Whistleblower platforms and leak sites: Used by journalists, activists, and whistleblowers (e.g., SecureDrop, WikiLeaks mirror sites).

  • Censorship-resistant communication: Forums, messaging channels, and news platforms used by people living under oppressive regimes to safely discuss politics and share information.

  • Privacy-focused communities: Forums dedicated to privacy tools, digital rights advocacy, cryptography, or cybersecurity topics.

  • Libraries and repositories: Collections of free, uncensored information, educational resources, and documents (e.g., academic papers, technical guides, books).

  • Cryptocurrency-related forums and marketplaces: Discussions about digital currencies and trading platforms with enhanced privacy features.

2.3.2 Illegal Activities#

  • Black-market marketplaces: Sale of drugs, weapons, fake documents (e.g., passports, IDs), counterfeit products, and hacking services.

  • Stolen data exchanges: Marketplaces selling leaked databases, hacked accounts, credit cards, or personal identity information.

  • Malware and cybercrime tools: Distribution of ransomware, exploit kits, hacking guides, botnets, and other malicious software.

  • Illegal pornography and exploitative material: Hosting or trading of content prohibited by law (e.g., explicit illegal materials).

  • Fraud-related communities: Forums discussing identity theft methods, financial fraud techniques, and guides on illegal money-making schemes.

  • Darknet hacking forums: Communities sharing hacking techniques, zero-day exploits, and coordinating cyber-attacks.

2.4 Rules to stay safe on the Dark Web#

Going onto the Dark Web can carry significant risks if you’re unaware or unprepared. Given its anonymous nature, the Dark Web is home to scams, malicious content, and various other threats that can compromise your security or identity. If you choose to explore it, following these critical safety guidelines can significantly reduce your risks:

  1. Always use a secure and updated browser: Utilize trusted dark-web-specific browsers, like Tor, and ensure they’re always up-to-date to protect against known vulnerabilities.

  2. Avoid sharing personal information: Never disclose your real name, address, or any personal details, even in seemingly trustworthy forums or chat rooms.

  3. Never download or open files from untrusted sources: Files downloaded from the Dark Web can be malicious, infected with malware, ransomware, or spyware.

  4. Use a reputable VPN (Virtual Private Network): Even though the Tor network anonymizes your connection, using a VPN provides an additional layer of security by masking your original IP address and encrypting your data.

  5. Stay alert and skeptical: If an offer or deal seems too good to be true, it usually is. Trust no one easily because scams and phishing attacks are rampant on the Dark Web.

  6. Use disposable accounts and encrypted communication: When communicating or creating accounts on the Dark Web, choose disposable email services and encrypted messaging platforms. Never reuse usernames or passwords from your regular online accounts. To further safeguard your personal information, consider employing dark web monitoring services, which actively scan the Dark Web for your data and alert you to any potential breaches or misuse.

2.5 Dark Web Browsers and Tools you should know#

Accessing the Dark Web safely requires specialized browsers and specific tools designed to maintain privacy and anonymity. Here’s an overview of the most important browsers and tools to be aware of if you plan to explore this hidden part of the internet:

  • Tor Browser: The most widely used and recommended browser for accessing the Dark Web. Built upon Firefox, Tor uses onion routing technology to anonymize your connection, making tracking extremely difficult.

  • VPN (Virtual Private Network): While Tor anonymizes your identity, a reliable VPN encrypts your traffic and adds an extra layer of privacy and security.

  • PGP Encryption (Pretty Good Privacy): A powerful encryption standard that allows you to securely communicate or share files by encrypting emails or documents so only the intended recipient can access them.

  • Secure and Disposable Email Services: Services like ProtonMail or temporary disposable emails (Guerrilla Mail, Temp Mail) provide an extra layer of anonymity when interacting on Dark Web sites or forums.

  • Cryptocurrency Wallets: Cryptocurrencies such as Bitcoin are common payment methods on the Dark Web due to their anonymity-enhancing features. Familiarity with secure crypto wallets (such as hardware wallets or trusted online wallets) is essential if conducting transactions.

Slack Icon

Become part of our Passkeys Community for updates & support.

Join

3. What is the Dark Net?#

The Dark Net is a decentralized and private segment of the internet infrastructure designed for enhanced privacy and anonymity. Unlike the publicly accessible internet, which operates on centralized servers and openly accessible protocols, the dark net is built upon specialized networks that require specific software, configurations, or peer-to-peer protocols. This unique setup ensures user anonymity, strong encryption, and resistance to external monitoring or censorship.

3.1 How the Dark Net differs from the Dark Web#

Though often confused, the terms “Dark Web” and “Dark Net” refer to different concepts:

  • Dark Web: Refers specifically to websites and content accessed through specialized browsers (like Tor). It’s essentially the content itself.

  • Dark Net: Refers to the underlying private network infrastructure that hosts Dark Web websites, providing the technical foundation and anonymity features.

In short, the Dark Web is the content, while the Dark Net is the secure network infrastructure on which this content resides.

3.2 Examples of Dark Net Networks#

Several notable dark net platforms and technologies exist today, each with unique features and goals:

  • I2P (Invisible Internet Project): Another decentralized and anonymous network that enables secure and private communication, including websites, messaging, file sharing, and more, operating entirely separate from the conventional internet.

  • Freenet: A decentralized, censorship-resistant peer-to-peer network designed to facilitate free speech and information sharing anonymously.

  • ZeroNet: A decentralized web platform built on blockchain and peer-to-peer technologies, where websites are hosted and shared directly among users without central servers

Demo Icon

Want to try passkeys yourself in a passkeys demo?

Try Passkeys

4. What is the Deep Web?#

The Deep Web is simply the portion of the internet that isn’t indexed by regular search engines like Google, Bing, or Yahoo. This means the pages and content in this part of the web aren’t easily discoverable through a typical web search.

Unlike the Surface Web, which is the publicly accessible internet you browse every day, the deep web contains content intentionally or naturally hidden from standard search engines. This hidden content makes up the vast majority of online information, dwarfing the publicly indexed pages available through typical searches. That is because of password protection and user authentication, content behind paywalls, dynamic or personalized content:

  • Email inboxes and private messages

  • Online banking and financial services

  • Social media profiles set to private

  • Subscription platforms and streaming services

  • Academic journals and scientific databases

The deep web is hidden but still immense. While exact measurements vary, estimates consistently suggest that it comprises approximately 90–95% of the entire internet. The publicly accessible surface web, by comparison, represents just a small fraction, roughly 5–10% of all available online content.

StateOfPasskeys Icon

Want to find out how many people use passkeys?

View Adoption Data

5. What is the Grey Web?#

While many internet users have heard of the Surface Web and the Dark Web, fewer people know about the Grey Web. This lesser-known segment of the internet sits in a middle ground, neither fully public nor fully hidden. Unlike the clearly defined boundaries of the Dark Web (which requires specialized browsers and is intentionally anonymous) and the open accessibility of the Surface Web, the Grey Web occupies an uncertain space characterized by ambiguity around the legality, ethics, or legitimacy of its content.

The Grey Web isn’t inherently illegal or malicious, but its content often operates on the fringes of accepted norms or regulations. Websites and platforms on the grey web might be accessible via standard browsers, yet they frequently drift in and out of legal and ethical acceptability based on varying regulations and jurisdictions.

Some typical examples of the grey web include:

  • Streaming sites

  • Unregulated marketplaces

  • Controversial forums and blogs

  • Online Gambling Websites

  • Torrent Websites

  • Cryptocurrency Mixers

  • Hacking or Security Forums

  • Data Brokers and People-Search Services

PasskeyAssessment Icon

Get a free passkey assessment in 15 minutes.

Book free consultation

6. Conclusion#

In conclusion, the Dark Web, despite its notorious reputation, encompasses far more than illicit activities. It is an important space for privacy-conscious individuals, journalists, and activists seeking secure and anonymous communication. Understanding its history, technology, and the range of its uses is crucial for navigating this hidden part of the internet safely. By following recommended safety practices and familiarizing yourself with essential tools and browsers, you can significantly mitigate risks associated with exploring the Dark Web.

In this blog, we also answered the following questions:

  • What is the difference between Dark Web, Deep Web and Grey Web? The Dark Web is intentionally hidden and requires special software to access, the Deep Web is unindexed but includes common protected internet content like emails and subscriptions, and the Grey Web is accessible but contains content of ambiguous legality.

  • How to use tools associated with the Dark Web and how to stay safe? Use specialized browsers like Tor, VPNs, encrypted communication, and follow security guidelines like avoiding personal disclosures and untrusted downloads.

  • What legitimate uses of the Dark Web are there and how can they benefit you? Legitimate uses include whistleblowing, evading censorship, accessing privacy-focused communities, and securely sharing sensitive information, benefiting privacy and free expression.

Learn more about our enterprise-grade passkey solution.

Learn more

Share this article


LinkedInTwitterFacebook

Enjoyed this read?

🤝 Join our Passkeys Community

Share passkeys implementation tips and get support to free the world from passwords.

🚀 Subscribe to Substack

Get the latest news, strategies, and insights about passkeys sent straight to your inbox.

Related Articles