// A (Brief) History of Everything_ — Guide 006
WARNING: THIS PAGE CONTAINS DISTURBING CONTENT
SECURE CONNECTION ESTABLISHED  |  TOR NETWORK  |  NODE: 0x4F2A
A (Brief) History of

// ENTER AT YOUR OWN RISK ——————————————— THE DARK WEB_

Beneath the indexed surface of the internet lies a hidden layer — unreachable by Google, invisible to surveillance, and accessible only through specialized software. A space born from military research, claimed by libertarians, exploited by criminals, and still used by journalists, dissidents, and privacy advocates around the world.

96% of the web is hidden
2M+ daily Tor users
1969 ARPANET origins
7,000 Tor relay nodes
Scroll to begin
LAT: 38.8977° N LNG: 77.0365° W US NAVAL RESEARCH LAB ORIGIN POINT
// ORIENTATION

What Actually Is the Dark Web?

The internet has layers. The surface web — Google, social media, news — is what most people know. The deep web is simply the unindexed part: email inboxes, banking portals, private databases. None of it is inherently hidden.

The dark web is deliberately hidden. It requires special software — almost always Tor — to access. Websites on it use .onion addresses that aren't recognized by standard DNS. Traffic is encrypted and routed through multiple nodes so that neither the sender nor receiver can easily be identified.

This anonymity infrastructure was not invented by criminals. It was built by the US Navy.

// INTERNET LAYERS — RELATIVE SCALE
01
Surface Web
Indexed, crawlable, publicly accessible pages. What search engines see.
~4%
of internet
02
Deep Web
Paywalled content, private email, corporate databases, login-required pages.
~90%
of internet
03
Dark Web
Deliberately hidden. Requires Tor or I2P. .onion domains. Encrypted routing.
~0.01%
of internet
🧅 3 Encryption Layers
Each Tor circuit passes through three relay nodes, encrypting data at each hop.
$1B Silk Road Seizure
Bitcoin seized when the FBI shut down the dark web's most famous marketplace in 2013.
🔬 1995 Tor Origins
Onion routing first developed by mathematicians Paul Syverson, Michael Reed, and David Goldschlag.
👤 2M+ Daily Tor Users
The majority use Tor for privacy and circumventing censorship — not illegal activity.
// ERA 01 — ORIGINS

MILITARY ROOTS

1969 — 1999
1969

ARPANET Goes Live

The US Department of Defense's network first connects UCLA to Stanford. The packet-switching architecture it pioneered would eventually become the internet.

DOD ARPANET
1983

TCP/IP Becomes Standard

ARPANET transitions to TCP/IP protocol. This open, decentralized architecture — never designed with tracking in mind — lays the structural foundation for anonymous communication.

TCP/IP PROTOCOL
1995

Onion Routing Invented

US Naval Research Lab mathematicians Paul Syverson, Michael Reed, and David Goldschlag develop "onion routing" — layered encryption designed to protect government communications.

NRL ENCRYPTION
1997

DARPA Funds the Work

DARPA begins funding further development of onion routing. The intent: give US intelligence officers a way to communicate online without revealing their government affiliation.

DARPA INTELLIGENCE

The United States government cannot simply run an anonymity system for everybody and then use it themselves only. It's like buying a fish tank and only putting your fish in it.

Roger Dingledine, co-founder of The Tor Project
// ERA 02 — INFRASTRUCTURE

TOR GOES PUBLIC

2000 — 2009
2002

Tor Released to the Public

Roger Dingledine and Nick Mathewson release Tor to the world. Crucially: a government-only anonymity network would be easy to identify by exclusion. The more civilian users, the better the cover.

TOR OPEN SOURCE
2004

The Tor Project Founded

The Electronic Frontier Foundation funds development. The Tor Project becomes a 501(c)(3) nonprofit. Its mission: enabling free expression and privacy online for journalists, activists, and ordinary people.

NONPROFIT EFF
2006

Hidden Services — .onion

Tor enables "hidden services" — websites that route all traffic through the Tor network, making the server location as anonymous as the visitor. The .onion namespace is born.

.ONION HIDDEN SERVICES
2008

Tor Browser Ships

Tor Browser makes the network accessible to non-technical users for the first time. A single download replaces the need for complex configuration. Dark web access becomes democratized.

TOR BROWSER UX
// ERA 03 — COMMERCE

THE MARKETPLACE ERA

2010 — 2014
2009

Bitcoin Launches

Satoshi Nakamoto's Bitcoin provides the missing piece: a pseudonymous digital currency that doesn't require a bank. The dark web's economic infrastructure suddenly exists.

BITCOIN SATOSHI
2011

Silk Road Opens

Ross Ulbricht launches Silk Road under the alias "Dread Pirate Roberts." A drug marketplace modeled on eBay's reputation system. At its peak: $1.2B in transactions, 150+ product categories.

SILK ROAD DPR
2013

FBI Shuts Down Silk Road

After a 2-year investigation, the FBI arrests Ross Ulbricht in a San Francisco library. They seize 144,000 Bitcoin. Ulbricht is sentenced to two life terms. Silk Road 2.0 launches within a month.

FBI ULBRICHT
2013

Snowden Uses Tor

Edward Snowden reveals NSA mass surveillance programs using Tor to safely communicate with journalists. The dark web's legitimate use case — whistleblowing — is suddenly front-page news.

SNOWDEN NSA

Tor is for normal people who don't want their private browsing data sold to advertisers. It's for journalists in authoritarian countries, domestic violence survivors, and people trying to organize labor unions. The drug markets are a small and visible subset.

Alec Muffett, security researcher and former Facebook engineer
// ERA 04 — LAW ENFORCEMENT

OPERATION ONYMOUS

2014 — 2019
2014

Operation Onymous

Europol and FBI coordinate the largest dark web crackdown to date. Over 17 black markets seized, 400+ .onion sites taken down. Silk Road 2.0 falls. AlphaBay and Hansa emerge in the vacuum.

EUROPOL FBI
2015

Playpen — FBI Takes Over

The FBI secretly operates Playpen, a child exploitation forum, for 13 days after seizing it — deploying malware to identify 1,500 visitors. It remains one of the most controversial law enforcement actions in dark web history.

PLAYPEN CONTROVERSIAL
2017

AlphaBay & Hansa Fall

In a coordinated global sting, AlphaBay (the largest dark web market at the time) and Dutch market Hansa are both taken down. Dutch police secretly ran Hansa for a month, collecting buyer data before shutdown.

ALPHABAY HANSA
2019

Wall Street Market Exits

Wall Street Market administrators perform an "exit scam," stealing $11M in cryptocurrency from vendors and buyers before disappearing — illustrating a uniquely dark web form of fraud. Administrators arrested weeks later.

EXIT SCAM CRYPTO
// ERA 05 — PRESENT STATE

THE DARK WEB TODAY

2020 — PRESENT
2020

Ransomware Goes Dark

Criminal ransomware groups shift operations to .onion leak sites — publishing stolen data to extort victims. Groups like REvil, Conti, and DarkSide operate sophisticated dark web presences with PR teams.

RANSOMWARE REVIL
2021

SecureDrop Expands

The Guardian, NYT, Washington Post, and 80+ news organizations operate SecureDrop — a Tor-based whistleblower submission system. The dark web's legitimate infrastructure matures alongside its criminal layer.

SECUREDROP JOURNALISM
2022

Hydra Taken Down

German authorities seize Hydra, the largest Russian-language dark web marketplace with $1.37B in annual revenue. Over 17 million customers, 19,000 registered vendors. German and US coordination.

HYDRA RUSSIA
2024

I2P and Alternatives Grow

As Tor faces increasing scrutiny, alternative anonymity networks like I2P gain users. Decentralized markets experiment with new architectures. The cat-and-mouse dynamic between anonymity tools and law enforcement accelerates.

I2P DECENTRALIZED

ARCHITECTS & ADVERSARIES

PS
Paul Syverson Invented Onion Routing

US Naval Research Lab mathematician who co-invented the onion routing protocol in 1995. The intellectual grandfather of the entire dark web.

RD
Roger Dingledine Co-founder, Tor Project

Released Tor to the public in 2002, founded the nonprofit Tor Project in 2006. Has spent two decades defending the network from critics and governments.

RU
Ross Ulbricht Founder, Silk Road

Created Silk Road under alias "Dread Pirate Roberts." Arrested 2013, serving two life sentences. Became a libertarian martyr and cautionary tale simultaneously.

ES
Edward Snowden NSA Whistleblower

Used Tor to leak classified NSA surveillance programs to journalists in 2013. Legitimized Tor's use case for whistleblowers and transformed public debate about surveillance.

SN
Satoshi Nakamoto Created Bitcoin

The pseudonymous inventor of Bitcoin whose identity remains unknown. Without pseudonymous digital currency, dark web commerce would have been nearly impossible.

NM
Nick Mathewson Co-founder, Tor Project

Worked alongside Dingledine to build and maintain the Tor codebase. A key technical architect whose low profile belies his enormous influence on the network's survival.

AB
Alexandre Cazes Founder, AlphaBay

Canadian admin of AlphaBay, the dark web's largest market at its height. Arrested in 2017 in Thailand during a joint FBI/DEA/Europol operation. Died in custody.

JA
Jacob Appelbaum Tor Core Developer

Security researcher, Tor developer, and WikiLeaks associate. Trained journalists in digital security worldwide and helped connect Tor to human rights work in authoritarian states.

KT
Katherine Tassi DOJ Dark Web Prosecutor

Led major dark web prosecutions at the US Department of Justice. Instrumental in building legal frameworks and international cooperation for prosecuting dark web crimes.

SC
Shaun Clarke SecureDrop Architect

Led engineering on SecureDrop at Freedom of the Press Foundation — transforming Tor's infrastructure into a professional, audited tool used by the world's leading newsrooms.

FUTURES

01
AI-Powered Anonymization

Machine learning models trained on traffic patterns may de-anonymize Tor users through timing correlation. Counter-research into AI-resistant routing architectures is already underway.

02
Decentralized Markets

Next-generation dark web markets use smart contracts and atomic swaps to eliminate the trusted administrator entirely — making exit scams and law enforcement seizures structurally impossible.

03
The Surveillance Race

Nation-states including Russia and China are deploying deep packet inspection at scale. The dark web's geography shifts toward networks designed to resist state-level adversaries, not just commercial surveillance.

04
Mainstream Privacy Infrastructure

As surveillance capitalism intensifies, tools built for the dark web move mainstream. Tor, I2P, and Signal-derived protocols become the baseline expectation for private communication — not the exception.

THE ECOSYSTEM

DARK WEB / HISTORY

From classified U.S. Navy research in the 1990s to Silk Road's billion-dollar black market to the modern surveillance battleground — the full arc of the internet's hidden layer.

PART OF
A (Brief) History of Everything_
abriefhistoryofeverything.com ↗