Darknet Glossary

Essential terms and definitions for the deep web

A B C D E F M O P T V

A

Anonymity

The state of being anonymous or unidentifiable. In the context of darknet markets, anonymity refers to the ability to conduct transactions and communications without revealing one's real identity. Achieved through tools like Tor, VPNs, and cryptocurrency.

Auto-Finalize (AF)

A feature where funds held in escrow are automatically released to the vendor after a predetermined time period (typically 14-21 days) if the buyer doesn't manually finalize or open a dispute. Protects vendors from buyers who receive products but don't confirm receipt.

B

Bitcoin (BTC)

The first and most widely used cryptocurrency. While not inherently anonymous, Bitcoin can be used with mixing services or privacy-enhancing techniques for darknet transactions. Transactions are recorded on a public blockchain.

Blockchain

A distributed ledger technology that records all cryptocurrency transactions in a chain of blocks. Each block contains transaction data and is cryptographically linked to the previous block, creating an immutable record.

C

Cryptocurrency

Digital or virtual currency secured by cryptography. Used as the primary payment method on darknet markets due to its decentralized nature and potential for anonymity. Common examples include Bitcoin, Monero, and Litecoin.

Clearnet

The regular, publicly accessible internet that can be accessed through standard web browsers. Opposite of the darknet. Clearnet sites use standard domain names (.com, .org, etc.) rather than .onion addresses.

D

Darknet

A network that requires specific software, configurations, or authorization to access. The most common darknet is accessed through Tor Browser. Darknet sites use .onion domains and provide anonymity for both users and site operators.

Deep Web

The portion of the internet not indexed by standard search engines. Includes password-protected sites, databases, private networks, and the darknet. Much larger than the surface web, containing legitimate content like academic databases and private corporate networks.

DDoS Attack

Distributed Denial of Service attack. A malicious attempt to disrupt normal traffic to a website by overwhelming it with a flood of internet traffic from multiple sources. Darknet markets are frequent targets of DDoS attacks.

E

Escrow

A security mechanism where a trusted third party (the marketplace) holds funds during a transaction. The buyer sends payment to escrow, the vendor ships the product, and funds are released to the vendor only after the buyer confirms receipt. Protects both parties from fraud.

Exit Scam

When a darknet market suddenly shuts down and disappears with all funds held in escrow and vendor bonds. One of the major risks of using centralized marketplaces. Multi-signature escrow helps protect against exit scams.

Encryption

The process of converting information into a code to prevent unauthorized access. Essential for protecting communications and data on darknet markets. PGP encryption is the standard for securing messages and sensitive information.

F

Finalize Early (FE)

Releasing funds from escrow to the vendor before receiving the product. Generally discouraged as it removes buyer protection. Some vendors require FE from new buyers or for certain products. High risk of scams.

Fingerprinting

Techniques used to identify and track users based on unique characteristics of their browser, device, or behavior. Tor Browser includes protections against fingerprinting to maintain anonymity.

M

Mirror

An alternative onion link to the same darknet market. Markets maintain multiple mirrors to ensure accessibility if one link goes down or is blocked. Always verify mirrors through trusted sources to avoid phishing sites.

Mixing (Tumbling)

A service that mixes cryptocurrency from multiple users to obscure the transaction trail. Helps enhance privacy by breaking the link between sender and receiver addresses. Also called tumbling or coin mixing.

Monero (XMR)

A privacy-focused cryptocurrency with built-in anonymity features including ring signatures, stealth addresses, and transaction amount obfuscation. Considered more private than Bitcoin and increasingly popular on darknet markets.

Multi-Signature (Multi-Sig)

An escrow system requiring multiple parties (typically buyer, vendor, and marketplace) to authorize a transaction. Provides enhanced security against exit scams as no single party controls the funds. More secure than traditional escrow.

O

Onion Link

A special URL ending in .onion that can only be accessed through the Tor network. Onion links provide anonymous access to hidden services on the darknet. The name comes from Tor's onion routing technology, which encrypts data in multiple layers.

OPSEC (Operational Security)

Practices and procedures for protecting sensitive information and maintaining anonymity. Good OPSEC includes using VPNs, Tor, PGP encryption, avoiding personal information, and maintaining consistent security practices.

P

PGP (Pretty Good Privacy)

An encryption program that provides cryptographic privacy and authentication. Used on darknet markets to encrypt messages, addresses, and sensitive information. PGP uses public-key cryptography where each user has a public key (for encryption) and private key (for decryption).

Phishing

Fraudulent attempts to obtain sensitive information by impersonating legitimate sites or services. Common on darknet where fake market sites steal login credentials and funds. Always verify onion links through multiple trusted sources.

Privacy

The ability to control what information about yourself is shared and with whom. In darknet context, privacy involves protecting identity, location, communications, and transaction history through various tools and practices.

T

Tor Browser

A web browser that routes internet traffic through the Tor network to provide anonymity. Required to access .onion sites on the darknet. Tor Browser includes built-in privacy protections like fingerprinting resistance and automatic HTTPS.

Two-Factor Authentication (2FA)

A security method requiring two forms of verification to access an account: typically a password plus a time-based code from an authenticator app. Significantly reduces risk of account compromise even if password is stolen.

V

VPN (Virtual Private Network)

A service that encrypts your internet connection and routes it through a server in another location, hiding your IP address. Often used in combination with Tor for additional privacy layers. Choose VPN providers with no-logs policies.

Vendor Bond

A deposit required from vendors to create an account on a darknet market. Typically ranges from $100-$500. Helps ensure vendor commitment and provides funds for dispute resolution. Lost if vendor scams or violates rules.