Dark web glossary: darknet market terms explained
Short definitions of dark web and darknet market terms for beginners — verify with primary sources for formal research.
How to use this page
Terms shift in common speech. When writing essays, prefer definitions from standards bodies, RFCs, or peer-reviewed publications. This glossary orients newcomers quickly and links conceptually to guides on anonymity limits, escrow trade-offs, and encryption tools.
Clearnet
The publicly routed Internet accessed with standard browsers and DNS, contrasted with overlay networks like Tor (though clearnet sites can be visited through Tor exits).
Darknet market
A Tor hidden service operating as a peer-to-peer marketplace, using cryptocurrency payments, held-funds escrow, PGP-encrypted communications, and vendor reputation systems to facilitate anonymous transactions.
Deep web
Content not broadly indexed by search engines, often due to authentication, paywalls, or policy — most of it mundane (bank portals, corporate intranets). Not synonymous with the dark web.
Dark web (colloquial)
Hidden services reachable via Tor .onion addresses; not synonymous with all unindexed content. Darknet markets are a subset of the dark web.
Escrow / Held funds
A third party or smart contract holds payment until agreed conditions — typically delivery confirmation — are satisfied. Reduces vendor fraud risk but centralizes trust in the platform operator. Exit scams occur when operators abscond with escrowed funds.
Exit relay
The final Tor relay before traffic exits to the clearnet; can see unencrypted application data if TLS is absent.
Hidden service
A Tor onion service publishing a cryptographic identity instead of a traditional DNS name to reduce IP exposure.
Onion address
A long .onion identifier encoding public-key material; phishing-resistant comparison requires care.
PGP
Pretty Good Privacy—often OpenPGP in practice—for encrypting or signing messages; key management is the hard part.
Reputation system
Aggregated feedback meant to signal reliability; vulnerable to Sybil accounts, bribery, and retaliation gaps.
Sybil attack
Creating many fake identities to distort votes, reviews, or network measurements.
TLS
Transport Layer Security—encrypts many web sessions between browser and server; distinct from Tor’s layered routing.
Vendor
A seller in a marketplace context; reputation scores may or may not reflect real-world reliability.
Further reading on this site
Pair vocabulary with narrative explanations in the deep web overview and the how-it-works article. Understanding escrow and reputation systems requires both definitions and case studies—read court filings with a critical eye toward what evidence actually supported convictions.
Encryption tools multiply quickly; focus on threat models before collecting software. A small set of well-maintained tools beats a noisy toolbox you cannot verify.
