#1722: The Dark Web Is Smaller Than You Think

Forget the iceberg myth—the dark web is more like a tiny shed behind a skyscraper, with only 3 million users and 100k sites.

0:000:00
Episode Details
Episode ID
MWP-1875
Published
Duration
22:32
Audio
Direct link
Pipeline
V5
TTS Engine
chatterbox-regular
Script Writing Agent
Gemini 3 Flash

AI-Generated Content: This podcast is created using AI personas. Please verify any important information independently.

The "dark web iceberg" is one of the most enduring myths in tech. You've seen the graphic: a tiny tip labeled "Surface Web," a middle section called "Deep Web," and a massive submerged base labeled "Dark Web." It implies a vast, hidden world of crime and mystery. But the reality is almost shockingly small.

According to Tor Project metrics from late 2024 and early 2025, the dark web sees roughly two to three million daily users. That's comparable to the population of Houston or the daily traffic of a mid-sized social media niche. In terms of active sites—known as onion services—there are maybe 100,000 to 150,000 at any given time. Compare that to Google's index of roughly 60 trillion pages on the clear web. The dark web isn't an iceberg; it's a shed in the backyard of a skyscraper.

Why is it so small? The answer lies in the technical architecture of Tor itself. Unlike the regular web where data travels a straight line from point A to point B, Tor traffic bounces through three distinct layers: a guard relay, a middle relay, and an exit relay. Each layer only knows the step immediately before and after it, like a game of telephone where no one knows the original caller or final recipient. This multi-hop routing creates massive latency overhead because every packet is re-encrypted multiple times and routed through different countries. High-definition streaming or real-time data processing becomes nearly impossible—imagine watching a 4K video where each frame is bounced and decrypted three times.

The lack of a central directory is another key factor. The regular web uses DNS, a giant phone book that translates human-readable domain names into IP addresses. The dark web has no such system. Onion addresses are cryptographic hashes—48-character strings of gibberish ending in ".onion." There's no map, no street signs, and no way to crawl from link to link. The number of possible combinations is so vast that even if every computer on Earth tried to enumerate them, the sun would burn out before mapping a fraction. This makes sites effectively invisible unless you know the exact address, and even then, they can be ephemeral, existing for days before changing addresses and vanishing.

Despite these limitations, the dark web serves crucial legitimate purposes. Traditional media outlets like The New York Times, ProPublica, and The Guardian maintain onion services. For journalists and whistleblowers in censored regions, accessing these sites through Tor means their ISP or government sees only that they're using Tor—not that they're reading specific news. It's not about the content being dark; it's about the connection being dark. In 2022, Twitter launched an onion service to help users in Russia bypass blocks. Academic researchers also use Tor to analyze malware command-and-control servers without revealing their institutional IP addresses, allowing them to observe threats without alerting attackers.

Cybersecurity monitoring companies like Flashpoint or Recorded Future don't index the entire dark web—that's impossible. Instead, they infiltrate specific underground forums through social engineering and language expertise. When a hacker dumps a database, they post a teaser on forums like XSS or Breach Forums. Monitoring companies see these listings and trigger alerts. But this process is often slow; by the time data appears on public forums, it's usually been sold privately multiple times. And there's a significant shift happening: criminal activity is migrating to Telegram, a clear web app that's faster, more mobile-friendly, and harder for law enforcement to dismantle than a server in Eastern Europe. The dark web is becoming a hosting layer for "initial access" to compromised networks, while transactions and communications move to more convenient encrypted apps.

The future of the dark web may be less about crime and more about privacy. Post-quantum encryption research is underway to protect Tor from future quantum computers that could crack current encryption. As the clear web becomes more surveilled and fragmented, the utility of anonymous networks increases, even if their size remains niche. The dark web isn't a sprawling digital continent—it's a specialized tool for privacy, security, and bypassing censorship, with a user base smaller than many expect but a role that's evolving in unexpected ways.

Downloads

Episode Audio

Download the full episode as an MP3 file

Download MP3
Transcript (TXT)

Plain text transcript file

Transcript (PDF)

Formatted PDF with styling

#1722: The Dark Web Is Smaller Than You Think

Corn
You know, most people describe the dark web as this massive digital iceberg where ninety percent of the internet is hidden underwater, but I was looking into the actual numbers this morning and that metaphor is just fundamentally broken. It’s more like a small, highly fortified, and very confusing village that’s actually much smaller than the city it’s tucked behind.
Herman
Herman Poppleberry here, and you are spot on, Corn. That iceberg graphic has been the bane of network researchers for a decade. It’s usually labeled with "Surface Web" at the tip, "Deep Web" in the middle, and "Dark Web" at the bottom. But that middle layer—the Deep Web—is just the unindexed stuff. It’s your private Gmail inbox, your Netflix queue, or a corporate payroll database. It’s massive, sure, but it’s not "hidden" in a mysterious way; it’s just behind a login. The Dark Web is a very specific, tiny subset of that which requires special software to access. Today’s prompt from Daniel is about exactly this: the actual scale, the technical architecture that resists indexing, and whether there is any legitimate reason for a normal person to ever touch it.
Corn
It’s a great one from Daniel because it cuts through the "hacker in a hoodie" tropes. By the way, fun fact for everyone listening—Google Gemini 3 Flash is actually writing our script today, so if we start sounding too logical, you know why. But back to the iceberg—if we aren't looking at this massive hidden mass, what are the actual numbers? Because the media makes it sound like a sprawling continent of crime. If I’m a regular user, am I one in a billion, or one in a hundred?
Herman
The reality is almost shockingly small. If you look at the Tor Project’s own metrics from late 2024 and heading into now, we are looking at roughly two to three million daily users. To put that in perspective, that’s about the daily foot traffic of a medium-sized social media niche, or roughly the population of Houston, Texas. It's not a global superpower. And in terms of actual sites—what we call onion services—we’re talking maybe one hundred thousand to one hundred and fifty thousand active addresses at any given time. Compare that to the "clear web" where Google is indexing roughly sixty trillion pages. The dark web isn't an iceberg; it's a shed in the backyard of a skyscraper.
Corn
A shed where everyone is wearing a mask and speaking in code. But why is it so small? If it’s this ultimate frontier of privacy, you’d think it would be exploding, especially with how much people complain about surveillance on the mainstream web. Is it just too hard to use, or is there a technical ceiling to how big an anonymous network can actually get? I mean, why hasn't there been a "Dark Web Facebook" that everyone actually uses?
Herman
It’s a bit of both, but the technical ceiling is the real story. To understand why it doesn’t scale like the regular web, you have to look at how onion routing actually works. Normally, when you go to a website, your computer says, "Hey, I’m at this IP address, give me the data for this domain." It’s a straight line—point A to point B. In Tor, your traffic goes through three distinct layers—the guard relay, the middle relay, and the exit relay. Each layer only knows the step immediately before and after it. It’s like a game of telephone where no one knows the original caller or the final recipient. Each of those bounces adds a massive amount of "overhead" because of the encryption involved.
Corn
Right, so it’s bouncing around the world like a pinball. I’d imagine that creates a massive latency penalty. I’ve tried using a Tor browser before and it felt like I was back on a fifty-six-k dial-up modem in nineteen ninety-eight. You click a link, you go make a sandwich, and maybe the page has loaded by the time you're back.
Herman
That latency is a feature, not a bug, but it’s a massive barrier to entry. Every packet is being re-encrypted multiple times. You can't run a high-definition streaming service or a massive real-time data processing hub on Tor efficiently. Imagine trying to watch a 4K YouTube video where every single frame has to be bounced through three different countries and decrypted three times. It would be a slideshow. But the real reason it stays small and "unindexed" is the lack of a Central Directory. On the regular web, we have DNS—the Domain Name System. It’s a giant phone book that translates human-readable names like myweirdprompts dot com into IP addresses. The dark web doesn't have that. An onion address is just a cryptographic hash of a public key. It looks like a forty-eight-character string of gibberish ending in dot-onion.
Corn
So there’s no "index" because there’s no list. It’s like trying to find a house in a city where there are no street signs, no map, and every house looks like a blank gray box until you knock on the door with a secret password. But wait, if someone wanted to, couldn't they just write a script to try every possible combination of those forty-eight characters?
Herman
Mathematically, no. The number of possible combinations in a V3 onion address is so vast that even if you had every computer on Earth working on it, the sun would burn out before you mapped a fraction of them. That’s why it’s "dark." It’s not that the light can’t reach it; it’s that there’s no way to know where to point the flashlight. Because those addresses are cryptographic, they can be ephemeral. A site can exist for two days, change its address, and vanish. For a search engine like Google to work, it uses "spiders" that crawl from link to link. But on the dark web, there are very few "inter-links." Sites don't want to be found unless they want to be found. Even the best dark web search engines, like Ahmia, only see a fraction of what’s out there because they rely on manual submissions or very limited crawling. If you don't have the exact string of gibberish, the site effectively doesn't exist to the rest of the world.
Corn
It sounds like a librarian's nightmare. But Daniel asked about the "white hat" or normal uses. Because if it's that slow and that difficult to navigate, why would anyone who isn't selling stolen credit cards or something worse bother with it? There has to be a utility that outweighs the headache. What’s the "killer app" for a law-abiding citizen on the dark web?
Herman
This is where the conversation gets a lot more interesting and frankly, more noble. One of the biggest "normal" users of the dark web is actually the traditional press. The New York Times, ProPublica, and The Guardian all maintain onion services. Why? Because if you’re a whistleblower inside a corporation or a high-level government office, or if you’re a journalist in a country with heavy internet censorship like Iran or certain parts of Southeast Asia, you can’t just go to nytimes dot com. Your ISP or the government will see that request and you might get a knock on the door. By using the onion version, the government only sees that you are using Tor, but they have no idea you are talking to the Times.
Corn
So it’s a bypass. It’s not about the content being "dark," it’s about the connection being "dark." You’re reading the same news, you’re just doing it through a tunnel that the local authorities can’t see into. It’s more about the "how" than the "what."
Herman
Precisely. In twenty-twenty-two, even Twitter—back when it was still Twitter—launched an onion service to help users in Russia bypass blocks. We also see academic researchers using it. If you’re a cybersecurity researcher and you want to analyze how a new piece of malware communicates with its "command and control" server, you don't want to do that from your university’s IP address. You do it over Tor so the hackers don't see who is poking at their code. It’s a laboratory environment where you can observe the "bad guys" without leaving a trail back to your own front door. If the malware authors saw a hit from a Department of Defense IP address, they’d shut the whole operation down instantly. Tor provides the "camo" for the researchers.
Corn
I love the idea of the New York Times having a secret entrance. It’s very "All the President’s Men" but for the digital age. But let’s talk about the dark side for a second, because Daniel mentioned dark web monitoring. We see these companies like Flashpoint or Recorded Future promising to "alert you if your data is on the dark web." If the network is so hard to index, how are these companies doing it? Are they just better at "knocking on doors" than Google is? Or is it all just marketing smoke and mirrors?
Herman
They aren't indexing the whole dark web—that’s impossible. What they’re doing is social engineering and targeted scraping. These companies hire analysts who speak multiple languages and have "street cred" in these underground forums. They gain access to the private rooms where the data brokers hang out. They aren't "searching" the dark web; they are infiltrating specific communities. When a hacker dumps a database of ten million passwords from a healthcare provider, they don't just put it on a public website. They post a "teaser" on a forum like XSS or Breach Forums. The monitoring companies see that post, and that’s what triggers the alert. Think of it like an undercover cop in a warehouse—they aren't searching every warehouse in the city, they're just in the one where the stolen goods are being auctioned.
Corn
So when I get an email saying "Your password was found on the dark web," it’s not because a robot found it while crawling. it’s because a human or a very specialized script saw a listing for a stolen database that likely contains my info. It feels a bit like those companies are just hanging out in the shady parts of town and reporting back on what they hear in the bars. But if that's the case, isn't there a huge delay? If a human has to find it, isn't the data already long gone?
Herman
Often, yes. By the time it hits a public-facing dark web forum, it’s usually been sold privately multiple times. And one of the huge trends we’re seeing in twenty-twenty-five and twenty-twenty-six is that a lot of this activity is moving off the dark web entirely and onto Telegram. Telegram isn't part of the "dark web" by technical definition—it’s a clear web app—but it’s where the distribution happens now. It’s faster, it has better mobile support, and it’s much harder for law enforcement to take down a single chat group than it is to seize a server in a basement in Eastern Europe.
Corn
That’s a fascinating shift. So the "dark web" as a technology—the onion routing—might actually be getting less "criminal" because the criminals are moving to more convenient encrypted apps? Is Tor becoming... respectable?
Herman
There’s definitely a migration happening. The dark web is becoming a place for "hosting" and "initial access," while the "trade" happens on Telegram. For example, on a forum like XSS, you might see someone selling "initial access" to a corporate network. They’ve found a vulnerability, but they don't want to do the ransom themselves. They sell the "key" to the house on the dark web, and the transaction might be finalized over an encrypted chat. It’s a layered ecosystem. The dark web provides the "bulletproof" hosting for the data, but the communication happens where it’s most efficient.
Corn
Okay, so if the dark web is this niche, slow, but highly secure tunnel, what’s the growth look like? Daniel asked if it’s growing in size and utility. You mentioned the user base has plateaued around two or three million. Is that a sign that it’s reached its limit, or is the "utility" changing even if the "size" isn't?
Herman
The utility is definitely increasing as the "clear web" becomes more surveilled and more fragmented. We’re seeing a lot of work on "Post-Quantum" encryption for Tor. There’s a fear that if quantum computers become viable, they could crack the current encryption that keeps onion routing private. The developers are already working on ways to make Tor "quantum-resistant." That tells me that for the people who really need it—the activists, the high-level whistleblowers—it’s more important than ever. Even if the raw number of users doesn't go up, the importance of those users might.
Corn
It’s the classic arms race. But let's get practical. How does one even get there? I know there's the Tor Browser, but are there other ways? And if I do go in, am I immediately going to be targeted by hackers?
Herman
The Tor Browser is the gold standard because it’s a modified version of Firefox that’s hardened against "fingerprinting." On the regular web, sites can see your screen resolution, your fonts, your battery level—all that stuff creates a unique "fingerprint" for you. Tor Browser makes everyone look identical. As for being targeted, just being on the network doesn't make you a target. It’s like walking down a street—you’re only in trouble if you start walking into open garages or clicking on suspicious things. The danger isn't the network; it's the destinations.
Corn
So for the average person listening to this—someone who isn't a journalist in a war zone or a malware researcher—is there any reason to ever download the Tor browser? Or is it just a way to accidentally end up on a government watchlist? I mean, does the NSA just flag everyone who uses Tor?
Herman
That "watchlist" thing is largely a myth in Western democracies, but the practical advice is: understand your threat model. If you’re just worried about Google tracking your searches, a good VPN and a privacy-focused browser like Brave or Firefox is plenty. You don't need the "nuclear option" of Tor for everyday browsing. It’s like wearing a full hazmat suit to go grocery shopping because you’re worried about germs. It works, but it’s a massive hassle and everyone’s going to look at you funny. Plus, many "clear web" sites will block you if they see you're coming from a Tor exit node. They assume you're a bot or a hacker.
Corn
I like that. "The Nuclear Option of Browsing." I can see you, Herman, in your digital hazmat suit, meticulously clicking through three relays just to check the weather. But what about the "Deep Web" part of Daniel's question? If we've established the Dark Web is small, how big is the Deep Web actually?
Herman
Oh, the Deep Web is essentially the entire internet. Think about every password-protected page on Earth. Every internal company wiki, every private medical record, every "Drafts" folder in every email account. That is the Deep Web. It’s estimated to be four hundred to five hundred times larger than the surface web that Google can see. But it’s not "mysterious." It’s just private. When Daniel asks about the scale, the Deep Web is the ocean, the Surface Web is the waves we see, and the Dark Web is a single, very specific submarine hiding in a trench.
Corn
That's a much better mental model. So, when people say "90% of the internet is the Dark Web," they are just confusing privacy with secrecy. Checking my bank balance is a Deep Web activity, but it’s not a Dark Web activity.
Herman
And the real takeaway for professionals is that dark web monitoring is limited. If you’re a business owner, don't rely on a service telling you your data is "out there." By the time it’s on the dark web, the damage is done. You should be focusing on "clear web" breach detection—things like unauthorized logins or unusual data egress. The dark web is the "aftermarket" for stolen goods. You want to stop the theft while it’s happening in the store.
Corn
That makes total sense. It’s the difference between a smoke detector and a call from the insurance adjuster after the house has burned down. So, let’s look at some of the "white hat" examples again. You mentioned SecureDrop. I think that’s a really cool piece of tech that people don't realize is powered by the dark web. How does that actually work for a source?
Herman
SecureDrop is brilliant. It’s an open-source whistleblower submission system that almost every major news organization uses. When you go to a "Contact Us" page on a site like the Washington Post, they’ll often give you an onion address for SecureDrop. It ensures that when you upload those leaked documents, there is no metadata connecting your IP address to the upload. Even the newspaper doesn't know exactly who you are unless you tell them. They just get a notification that a new file is in the "dead drop." That is a massive service to democracy that only something like the dark web can provide. It removes the "paper trail" of the digital world.
Corn
It’s basically a digital version of meeting a source in a dark parking garage at three a.m., but without the risk of getting followed home. It’s the "Deep Throat" of the twenty-first century.
Herman
And there are also "onion mirrors" of legitimate sites. Facebook launched one years ago. Why? Because in some countries, Facebook is the only way people communicate with family, but the government blocks it. By having an onion address, Facebook allows those users to stay connected without the government being able to block the specific IP addresses of Facebook’s servers. It’s about maintaining the "freedom to connect." Even DuckDuckGo has an onion service, allowing you to search the clear web without the search engine even seeing your IP address.
Corn
It’s funny how we started with "it’s a place for criminals" and we’ve ended up at "it’s a vital tool for the New York Times and Facebook to reach people in oppressed regions." It really is just a tool. A hammer can build a house or break a window. But what about the future? Is there anything that could replace Tor?
Herman
That’s the most accurate summary you could give. And as we move further into twenty-twenty-six, I think we’re going to see the dark web become even more of a "utility" network. There’s a project called I-two-P—the Invisible Internet Project—which is a different kind of dark web that’s more focused on internal "leeching" and file sharing within the network rather than just being a tunnel to the outside world. It uses "garlic routing" instead of "onion routing."
Corn
"Garlic routing"? Okay, now we're just getting into a grocery store metaphor. What's the difference? Does it keep the vampires away?
Herman
Close! In onion routing, one message is wrapped in layers. In garlic routing, multiple messages are bundled together, so it’s even harder for an observer to tell which "clove" of data belongs to which user. It’s even more decentralized than Tor. But it has the same drawback—it's slow.
Corn
"The Invisible Internet Project." That sounds like the name of a synth-wave band you’d listen to, Herman. But does it solve the speed problem? Or are we always going to be stuck in the slow lane if we want to stay hidden?
Herman
Not really. Speed and anonymity are fundamentally at odds. If you want to be fast, you have to be direct. If you want to be anonymous, you have to be circuitous. You can’t have both. It’s a law of digital physics. Think of it like a getaway car. If you want to get away fast, you take the highway. If you want to not be followed, you take every side street, double back, and drive through three different parking garages. You’ll get to your destination, but you won't be setting any speed records.
Corn
Well, I think we’ve effectively popped the "iceberg" bubble. It’s not a massive hidden world; it’s a small, specialized, and very slow set of tunnels used by people who have a very specific reason to hide their tracks—some for good, some for bad. It's not the Wild West; it's more like a very high-security private club with a very confusing entrance.
Herman
And for Daniel's question about whether it's growing—the "visibility" is growing because we’re getting better at talking about it, but the actual network is staying relatively stable. It’s a mature technology now. Tor has been around for over twenty years—it actually started as a project for the U.S. Naval Research Laboratory. It’s not a fad; it’s part of the permanent infrastructure of the internet. It's the pressure valve for the modern web.
Corn
I feel much better about my "clear web" existence now. I’ll keep my "hazmat suit" in the closet unless I decide to start leaking state secrets, which, let’s be honest, would probably just be my secret recipe for slow-cooker chili. Although, maybe that is a state secret in some circles.
Herman
And trust me, the dark web is not ready for that level of heat, Corn. The encryption might hold, but the servers would melt.
Corn
Fair point. Well, this has been a great dive into the shadows. I think the biggest takeaway for me is just how small it actually is. It makes the whole thing feel much more manageable and much less like some looming digital monster. It's a tool for specific jobs, not a replacement for the internet we use every day.
Herman
Specificity always kills fear. When you realize it’s just a few million people and some clever encryption, the "boogeyman" aspect disappears and you can focus on the actual security implications. It's about data integrity and connection privacy, not just scary stories.
Corn
True that. Well, I think we’ve covered the "what," the "why," and the "who" of the dark web. It’s a fascinating corner of our world, but maybe one I’m happy to just observe from a distance. I'll stick to the "surface" where the cat videos are easy to load.
Herman
Nothing wrong with staying in the light, as long as you know where the tunnels lead. Knowledge is the best firewall you can have.
Corn
Well said, Herman. This has been "My Weird Prompts." Big thanks to our producer, Hilbert Flumingtop, for keeping us on track and making sure we didn't get lost in the relays.
Herman
And thanks to Modal for providing the GPU credits that power this show. It’s amazing what you can do with a little serverless compute and a lot of curiosity.
Corn
If you’re enjoying these deep dives, do us a favor and leave a review on your favorite podcast app—it really does help other people find the show, and it keeps us motivated to keep digging into these prompts.
Herman
You can also find us at myweirdprompts dot com for all the show notes, technical links about onion routing, and ways to subscribe to our newsletter.
Corn
Until next time, keep asking the weird questions. No prompt is too niche for us.
Herman
We'll be here to find the nerdy answers. Goodbye!
Corn
See ya.

This episode was generated with AI assistance. Hosts Herman and Corn are AI personalities.