7 Dark Web Myths That Won't Die
From 'it's enormous' to 'only criminals use it,' dark web myths are persistent and wrong. Here are seven of the most common, corrected with sources.
Every year, news coverage of the dark web recycles the same set of myths — that it's enormous, that everyone on it is a criminal, that accessing it is a federal offense. This piece tackles seven of them, one by one, with sources. Most of these ideas persist not because they're accurate but because they're useful for headlines.
Myth 1: The Dark Web Is Enormous
Reality: It's quite small.
The Tor network — which hosts the majority of dark web content — had approximately 50,000 to 70,000 active .onion services as of recent Tor Project metrics measurements. The visible surface web contains billions of indexed pages. Even the unindexed deep web dwarfs Tor's hidden service count by orders of magnitude.
The myth of enormousness probably persists because "vast criminal underground" makes better copy than "smaller than a mid-size city's public website count." The dark web is a niche infrastructure layer, not a parallel internet.
Myth 2: Only Criminals Use the Dark Web
Reality: The majority of Tor users are ordinary privacy seekers.
The Oxford Internet Institute published research in 2019 examining Tor usage patterns. Their analysis found that censorship circumvention and general privacy concerns were the primary motivators — not criminal activity. SecureDrop, which journalists use to receive tips from sources, is dark web infrastructure. The BBC runs a .onion mirror. The New York Times does too.
Who actually uses the dark web includes journalists, activists, security researchers, and people who simply want to browse the internet without their ISP logging every page they visit.
Myth 3: Accessing the Dark Web Is Illegal
Reality: In most democracies, downloading Tor and using it is legal.
In the United States, there is no federal law that prohibits using Tor or visiting .onion sites. The same is true in the United Kingdom and across most EU member states. The Electronic Frontier Foundation (EFF) has documented this explicitly.
What can be illegal: what you do once you're there. Purchasing drugs, accessing certain categories of illegal content, participating in fraud — those are illegal regardless of the network. But the act of using Tor itself is not a crime in most Western jurisdictions. For the full picture, see is accessing the dark web illegal.
Myth 4: The Dark Web Is Impossible to Track
Reality: Multiple large-scale law enforcement operations have proven otherwise.
Operation Onymous (November 2014) was a joint FBI-Europol operation that seized 17 dark web services in a single coordinated action. Operation Bayonet (July 2017) dismantled AlphaBay, at the time the largest dark web market. Hydra Market was seized in April 2022 by German federal police (BKA) and the U.S. DOJ.
In most successful takedowns, poor operational security was a contributing factor — not a break in Tor's cryptography. Market operators used reused usernames, linked payment addresses, or accessed sites from personal IP addresses. The network's anonymity is not a guarantee against human error.
For more on law enforcement operations and how they work, see our dedicated guide.
Myth 5: The Dark Web Is Full of Hitmen and Live Torture Streams
Reality: These are documented scams.
"Red rooms" — purported live-streamed torture feeds — and hitman-for-hire services are staples of dark web mythology. The FBI has documented repeatedly that sites advertising these services are invariably scams designed to extract payment (usually in Bitcoin) before disappearing.
No verified case of a red room has been documented by law enforcement. Multiple dark web hitman sites have been exposed as scams — most famously by users who paid, received threats demanding more money, and eventually traced the operator to an ordinary email address. Child sexual abuse material does exist on the dark web and is actively pursued by international law enforcement; it is not the "primary use" of the network by any reasonable measure of traffic volume.
Myth 6: You Need Technical Skills to Access the Dark Web
Reality: It takes about three clicks.
Tor Browser is available for free at torproject.org. Download, install, open. The browser looks and functions like a standard browser. No command line, no configuration, no technical background required.
The barrier to accessing the dark web is not technical — it's awareness. Most people who think they cannot access it simply have not tried. Whether they should access it is a different question. Understanding what risks on the dark web exist is more useful than assuming access requires expertise.
Myth 7: Dark Web Markets Are Untraceable Because They Use Crypto
Reality: Blockchain analytics firms trace cryptocurrency transactions routinely.
Chainalysis, Elliptic, and CipherTrace are commercial firms that specialize in tracing cryptocurrency flows. They have provided analysis in numerous dark web criminal prosecutions. Bitcoin's blockchain is public — every transaction is permanently recorded. Mixing services and privacy coins complicate analysis but do not eliminate it.
The Hydra Market seizure in 2022 involved the tracing of $25 million in Bitcoin. The original Silk Road prosecution involved extensive blockchain analysis to link Bitcoin addresses to Ross Ulbricht's known accounts. The idea that cryptocurrency provides perfect anonymity is incorrect, and it has cost a significant number of dark web market operators their freedom.
Frequently Asked Questions
Is the dark web dangerous to browse?
Browsing the dark web carries real risks — malware-laden sites, phishing pages, and scams are common. However, the level of risk depends heavily on what you access. Visiting .onion news sites or using Tor for privacy on clearnet carries different risks than downloading files from unknown sources or entering payment information on unverified markets.
Are dark web red rooms real?
No verified case of a dark web red room has been documented by law enforcement or credible investigators. Sites advertising live-streamed violence are consistently documented as scams. The FBI has issued guidance noting that these services take payment and do not deliver.
Can the FBI see who uses Tor?
Not in real time, and not without additional investigative work. Tor's layered encryption prevents passive surveillance of traffic content. However, the FBI has successfully de-anonymized Tor users through traffic correlation attacks, compromised hidden service infrastructure, and — most commonly — mistakes made by suspects outside of Tor itself. The network provides meaningful anonymity; it is not surveillance-proof.