Privacy: whistleblowing, research, or avoiding censorship.
Crime: trading stolen data, malware, drugs, or hacking services under cover of anonymity.
Traffic is routed through multiple relays to hide who you are and where a site is hosted.
Sites use non-standard addresses (e.g., .onion), only reachable via special browsers.
Scams and exit scams are common; sellers vanish with funds.
Malware and phishing thrive; many downloads are booby-trapped.
Crypto payments are irreversible; fake “escrow” services abound.
Law enforcement monitors markets and can deanonymize sloppy users.
Use a dedicated, up-to-date browser/device; avoid downloads.
Never reveal personal info; assume chats are logged.
Treat links, files, and “wallet helpers” as hostile.
Understand local laws—access isn’t a crime, activity can be.