Reference — 160+ Definitions
Darknet Glossary A-Z
Comprehensive terminology reference covering security acronyms, market jargon, cryptocurrency concepts, privacy tools, and Tor network fundamentals.
A
AES (Advanced Encryption Standard)
A popular encryption method for securing data. It protects messages, files, and communication on and off the dark web.
Altcoin
Any cryptocurrency that is not Bitcoin — including Ethereum, Solana, Monero, Ripple. They exist to add features Bitcoin doesn't have, support smart contracts, and serve niche uses.
Anonymity
The state of hiding your real identity online. To achieve true anonymity on the dark web, you should hide your IP address, use encrypted connections, and avoid sharing personal information.
B
Bitcoin (BTC)
A decentralized digital currency and the most widely used cryptocurrency on the dark web for pseudonymous transactions. While not completely anonymous, traceability can be reduced through mixing tools.
Bitcoin Mixer (Tumbler)
A service that mixes Bitcoins from many users to hide the transaction trail, improving privacy by severing the link between sender and receiver addresses.
Blockchain
A public ledger recording cryptocurrency transactions. Transparent and permanent, it can be used to trace Bitcoin movements — which is why privacy-focused coins like Monero are gaining popularity.
Botnet
A network of compromised devices controlled remotely for malicious purposes including spam, DDoS attacks, and malware delivery.
Bridge Relay
A Tor relay not listed publicly. It helps users bypass censorship and blocks on the Tor network in restricted regions.
Brute Force
An attack that repeatedly tries all possible password combinations until the correct one is found to gain entry.
Burner
A disposable and untraceable device used to adopt another identity or access sensitive information without exposure.
C
Circuit
The path Tor builds to route your traffic. Each circuit routes through three random relays to limit tracking.
Clearnet
The regular internet accessible with standard browsers. It includes indexed websites that search engines can crawl.
CoinJoin
A privacy technique for Bitcoin transactions that mixes multiple users' payments into one, making it difficult to trace individual transactions.
Credential Stuffing
Testing stolen email/password combinations against multiple services to gain unauthorized access to accounts.
Cryptocurrency
Digital currency secured by cryptography, running on decentralized systems. Commonly used on the dark web for their pseudonymous nature.
D
Dark Web
A part of the internet not indexed by search engines, accessible only using special tools like Tor. Hosts anonymous marketplaces, forums, and services.
Dead Drop
A method of delivering goods without direct contact between parties. Common in dark web markets to enhance anonymity.
Deanonymization
Revealing the identity of an anonymous user through techniques like social engineering, traffic analysis, or operational security mistakes.
DNM (Darknet Market)
A dark web marketplace facilitating anonymous trade of goods and services using cryptocurrency and escrow systems.
Dreadit
A dark web discussion forum similar to Reddit. Created by HugBunter after Reddit banned darknet marketplace discussions.
E
Encryption
A method of scrambling data to prevent unauthorized access. Common types include AES, RSA, and ECC.
Escrow
A third-party holding system for funds during a transaction until both parties fulfil commitments. Standard on dark web marketplaces to reduce fraud.
Exit Relay
The last Tor relay routing traffic to the destination. Can see unencrypted traffic but not your IP address.
Exit Scam
When a vendor or marketplace suddenly disappears after taking payment or stealing funds held in escrow.
Exploit
Code or procedure exploiting a flaw in software to gain unauthorized access. Exploits are traded on dark web forums.
F
Finalize Early (FE)
Releasing payment from escrow before receiving goods. Discouraged because it increases buyer risk — favors highly trusted vendors only.
Fingerprinting
A tracking technique identifying users by collecting unique device and browser characteristics. Tor Browser prevents this by making all users appear identical.
Fullz
Complete personally identifiable information (PII) used for fraud or identity theft. Sold as packages on dark web markets.
G
GPG/PGP
GNU Privacy Guard — an encryption tool for securing emails, messages, and files. Used on the dark web to verify identities and protect communications.
Guard Node
The first Tor relay your device connects to. Remains unchanged for extended periods to reduce traffic analysis risk.
H
Hidden Service
A website running entirely on the Tor network using .onion addresses. Both location and operators remain anonymous.
Hidden Wiki
A listing of .onion sites serving as a navigation starting point for the dark web. Many copies exist — some contain unsafe links.
Honeypot
A trap set by malicious actors or law enforcement for monitoring or investigation. Some forums and markets operate as honeypots.
I
I2P (Invisible Internet Project)
An anonymous network for private communication and hosting, similar to Tor. Routes traffic through multiple layers to hide users and servers.
ISP (Internet Service Provider)
Your internet company. Can see you're using Tor but cannot see the sites you visit through it.
J
JavaScript
Scripting language for interactive websites. On Tor, it can leak identifying data and is often disabled for privacy.
K
Keylogger
Malware recording keystrokes to steal passwords and sensitive information.
Kill Switch
A security tool that instantly cuts internet connection if it detects a breach, preventing data leaks.
L
Law Enforcement
Government agencies investigating dark web crime using traffic analysis, undercover operations, and market takeovers.
Listing
A product or service offered on a darknet marketplace, including price, terms, and delivery method.
M
Malware
Malicious software to steal data, spy, or damage systems. Spreads through infected files, links, or fake services on the dark web.
Metadata
Hidden data providing structure and information about documents. Can inadvertently leak identity details.
Mirror Site
An exact copy of a website at a different URL, hosted on a different server for redundancy.
Multi-Signature
Requiring more than one private key to approve a crypto transaction. Used in escrow and shared wallets to reduce theft.
N
Node
A volunteer server in the Tor network helping relay data. Connections typically route through three nodes (entry, middle, exit).
NoScript
Browser extension blocking JavaScript and active content. Built into Tor Browser to reduce tracking and leaks.
O
Onion Address
A special .onion URL used on the Tor network, directing to a hidden service not accessible on the regular internet.
Onion Routing
Routing traffic through multiple encrypted layers. Each relay removes one layer, hiding both sender and destination.
OPSEC (Operational Security)
Practices protecting sensitive information and privacy. Critical for the dark web — covers behavior, tools, payment, and communication habits.
P
PGP (Pretty Good Privacy)
Encryption standard for securing messages and files via public-key cryptography. Essential for private dark web communications.
Phishing
Social attack tricking users into revealing passwords, keys, or wallet details. Common on the dark web — always verify onion sites.
Private Key
A secret cryptographic key controlling access to cryptocurrency or encrypted data. Losing it means losing access permanently.
Q
Qubes OS
A security-focused OS isolating tasks into separate virtual machines. One of the safest options for dark web access.
R
RaaS (Ransomware-as-a-Service)
A business model where developers lease ransomware tools to criminals, lowering the technical barrier for cybercrime.
Relay
A volunteer server redirecting encrypted traffic through the Tor network. Doesn't know the full connection path.
Ripper
Slang for a scammer who takes payments without delivering goods or runs exit scams.
S
Scam
Fraudulent activity to steal money or data. Widespread on the dark web — includes fake vendors, exit scams, and impersonation sites.
SecureDrop
Open-source system for anonymous whistleblower tips to journalists, relying on Tor and strong encryption.
Seizure
Forceful takeover of domains, servers, or funds. Common in law enforcement operations against darknet markets.
T
Tails
The Amnesic Incognito Live System — a privacy-focused OS running from USB, routing traffic through Tor and leaving no data on the computer.
Tor (The Onion Router)
Free software enabling anonymous browsing by routing traffic through multiple relays. The most common method to access the dark web.
Tor Browser
Modified browser routing traffic through the Tor network with enhanced security and privacy. The standard tool for accessing .onion sites.
Two-Factor Authentication
Login method requiring two forms of verification, typically pairing passwords with PGP verification on dark web markets.
U
Uptime
Duration a hidden service stays online without interruption. High uptime signals reliability and trust.
V
Vendor
A seller on a darknet marketplace. Reputation is built through reviews and transaction history — always verify before transacting.
VPN (Virtual Private Network)
Service routing traffic through a remote server. Used alongside Tor for additional anonymity, though combining them remains debated.
W
Wallet
Software or hardware storing cryptocurrency private keys needed to send or receive funds.
Whonix
A Linux distribution routing all traffic through Tor, splitting networking and user activity into separate systems for isolation.
X
XMR (Monero)
Privacy-focused cryptocurrency hiding transaction details (sender, receiver, amount). Increasingly popular over Bitcoin on darknet markets.
XSS (Cross-Site Scripting)
Web attack injecting malicious code into sites. Can steal sessions or redirect users to phishing pages.
Y
Yubikey
Physical security key for authentication and encryption. Protects accounts and cryptographic keys with hardware-level security.
Z
Zero-Day
A software flaw unknown to the developer. Attackers exploit it before a fix is available — always keep software updated.
Zero-Knowledge Proof
A cryptographic method proving a statement is true without revealing underlying data. Used in privacy-focused systems.