A February 2016 study from researchers at King's College London gives the following breakdown of content by an alternative category set, highlighting the illicit use of .onion services. As of December 2020, the number of active Tor sites in .onion was estimated at 76,300 (containing a lot of copies). Thus, communication between darknet users is highly encrypted allowing users to talk, blog, and share files confidentially. Identities and locations of darknet users stay anonymous and cannot be tracked due to the layered encryption system.
This makes Bitcoin an attractive currency for those looking to carry out illegal activities on the dark web. The association between bitcoin and cybercrime should not overshadow the potential benefits and advancements brought by blockchain technology. However, it is important to note that bitcoin itself is not inherently illegal, and it has legitimate uses. In conclusion, dark web bitcoin mining represents a hidden form of exploitation that takes advantage of the digital currency’s decentralized and anonymous nature. Employing strong security measures, keeping software up to date, and educating users about the risks can help mitigate the threat of exploitation.

To observe the behavior of the ecosystem on specific calendar periods, such as weekly or quarterly, we select a time period and aggregate the daily time series through step 3 accordingly. We perform the same procedure to compute the daily time series of multibuyers but using the daily time series of buyers obtained from step 2. Therefore, we use a sliding window of \(\Delta t\) days to classify sellers, i.e., every day that an entity is classified as a seller, it remains as a seller for \(\Delta t\) days, including the first day. The method used in step 1 captures the activity of entities in a continuous-time framework, i.e., the features are computed for each transaction taken by each entity.
Fine Time Filtering

Even without the code, you can visit the security section to get tips on improving your daily life privacy. In addition, it ensures that no record of communication is stored. It was created in 1999 as a secure communication platform for people and groups working on liberatory social change. Using the ProtonMail .onion site offers security and privacy advantages. However, note that the site only uses non-sensitive and public data for the metrics. In some countries, such as China and North Korea, the government uses heavy online censorship and blocks many dark web websites.
The US Naval Research Laboratory developed The Onion Routing (Tor) project in the late 90s. For example, you can find information unavailable to the public and share data privately while protecting your online identity. However, you can find legitimate content and activities here, too. Many people see hacked information and stolen card data being sold on the dark web.
Bitcoin’s Resurgence In Darknet Marketplaces Following Monero Delisting
While Bitcoins themselves are not inherently illicit, their association with dark web activities has shaped perceptions and usage. Whistleblowers, for instance, can find the anonymity available through the dark web valuable when working with the FBI or another law enforcement organization. Note that just because a site or service is running on an encrypted, hidden network does not necessarily mean that it is illegal or dubious.

After the association, anyone with enough time and determination could examine the ledger. An individual’s identity may not necessarily be linked to a Bitcoin address, but some people may publicly share their wallet address, connecting them to that address. For instance, paying with a credit card is not anonymous, as all card transactions are linked to your identity. Bitcoin is anonymous because the wallet address is not tied to one individual’s identity. In this sense, buying Bitcoin anonymously is the great equalizer of the financial sector.

Onion Links: How To Access Them
Dark web marketplaces operate on hidden services, utilizing the Tor network to conceal their location and protect the identities of their users. However, the blockchain only records the transaction details, such as the wallet addresses and the amount transferred, without revealing the identities of the parties involved. Bitcoin transactions are recorded on the blockchain, a digital ledger that is publicly accessible. This level of privacy has made it difficult for authorities to track and regulate illicit activities on the dark web, leading to the proliferation of marketplaces. Unlike traditional financial transactions, Bitcoin operates on a decentralized network, allowing users to make and receive payments without revealing their true identity.
Dark Web Bitcoin Investigations And Law Enforcement Efforts
- The dark web has become a hotspot for illicit activities, and cryptocurrency crimes are no exception.
- The gaming industry is one of the most dynamic and innovative sectors in the world, generating…
- Each marketplace is a star-graph where the central node is the marketplace, and the leaf nodes, i.e., the first-neighbors, are the marketplace users.
- Despite the attempts to secure the Silk Road’s activities, the platform caught the attention of law enforcement.
In many cases, cybercriminals are often more technologically savvy than the investigators pursuing them, giving cybercriminals an advantage in evading detection. These services make potentially identifiable cryptocurrency funds with others, making it harder to trace a specific path of funds. International cooperation between law enforcement agencies is required, but is often slow and hampered by differing legal frameworks, privacy laws, and levels of technological expertise in different countries.
Bitcoin Services
Eric Jardine, a cybercrime research lead at Chainalysis, noted a substantial increase in Bitcoin inflows into these marketplaces since Monero’s delisting. Binance, one of the largest global crypto exchanges, announced Monero’s delisting in February 2024, citing regulatory concerns and the need for compliance with financial monitoring standards. According to a recent report by Chainalysis, a blockchain analytics firm, cybercriminals have increasingly turned back to Bitcoin due to the declining availability of privacy coins.

Blockchain Wallets Made Easy: A Comprehensive Guide With Real-World Examples
In particular, these studies are based on user reviews which carry many inaccuracies, for instance, with respect to the time and value of the transaction19, that further compound error in other measures. Surprisingly, although DWMs have gained significant attention from the scientific community and law enforcement agencies, little is known about the key players sustaining their unusual adaptability and responsive dynamics. Owing to their unregulated character, DWMs offer no formal protection to buyers and sellers. The dark web has been home to many unregulated online commercial platforms facilitating the trade of illicit goods1,2,3,4,5,6,7,8,9,10.
Is Using The Tor Network Illegal?
The increased use of Bitcoin in the dark web has raised concerns for regulatory bodies and governments around the world. It is important to be aware of these risks and take the necessary precautions to protect yourself when carrying out Bitcoin transactions. While Bitcoin has many advantages, there are risks involved with Bitcoin transactions, especially when it comes to the Dark Web. Transactions on the Dark Web are often conducted using Bitcoin, as it provides a level of anonymity that traditional currencies cannot match. One of the main concerns is the anonymity that Bitcoin offers.
The pre-processing relies on established state-of-the-art heuristics to cluster addresses into entities, such as cospending, intelligence-base, and behavioral clustering39,40,41,42. Although other coins are used, such as Monero recently, Bitcoin is still the mostly used in the ecosystem, being supported by more than 93% of markets7,9. They offer anonymity to their users by using and developing specialized tools. The S2S network is mostly populated by U2U-only sellers. Nodes are sellers that are active within the time period, and an edge is placed between two sellers if at least one transaction occurs between them during the period. To reduce the presence of noise in the S2S network, we consider only stable U2U pairs, i.e., pairs that have at least three transactions throughout the whole period of observation13.
Onion sites aren’t really dangerous, but they could be when accessed through unfamiliar or suspicious links. Taking the necessary precautions makes tracing your activities on the dark web difficult. For example, DuckDuckGo is the most popular but often shows repetitive results and is sometimes unrelated to the question.
For example, to obtain a monthly time series of sellers, we compute the union of the lists of sellers for each month. After using the sliding time window for sellers, all entities that are not classified as sellers are classified as buyers for each day. This step is performed separately for each market and the U2U network. Sixth, we consider the cumulative mean interevent time for each entity i at time t, defined as the mean of the sequence of time interval between consecutive transactions of an entity until time t, which we denote by \(\phi _i(t)\). We classify all entities either as sellers or buyers as a function of time. Therefore, the U2U network connects different market star-graphs.
Their pseudonymous nature enables criminals to exploit blockchain technology for financial crimes, challenging regulators and law enforcement. Looking at a robbery of 3,171 coins from an early bitcoin gambling site, she immediately found she could trace the stolen funds across no fewer than ten hops, from address to address, before different branches of the money were cashed out at exchanges. Meiklejohn found a thread on Bitcointalk that listed addresses of many of the biggest, most conspicuous crypto thefts in recent memory, and she began to follow the money. She saw that after conspicuously gathering at one address, the pile of money had been broken up in late 2012 and sent on forking paths around the blockchain. And based on just four deposits and seven withdrawals into wallets on the Silk Road, she was able to identify nearly 300,000 of the black market’s addresses. A chart from Meiklejohn’s paper showing her “clustering” of Bitcoin addresses for early cryptocurrency entities.
Then they scraped thousands of more widely visible bitcoin addresses from the public accounts of users on Twitter and the popular bitcoin forum Bitcoin Talk. The connection between bitcoins and the dark web exemplifies a complex interplay of anonymity and illicit activities. The synergy between bitcoins and the dark web is substantial, as bitcoins offer a cloak of anonymity conducive to illegal transactions. These markets have no protection for its users and can be closed down at any time by authorities.