Onion Search Engine: How to Browse The Deep Web Without Tor

by Janeth Kent Date: 25-05-2020 security deepweb darkweb onion tor


The general recommendation does not change: Anyone interested in entering the Deep Web will get a more complete and secure experience by downloading a copy of the Tor Browser, and modifying various browsing habits. However, the desire to "take a look" is always present, and for those cases there is the Onion Search Engine, which presents multiple results derived from .onion portals, accessible with the help of its own Tor2Web service.

A few months ago, we shared an article dedicated to the best sites on the Deep Web, and in the process discovered the natural difficulties of obtaining reliable results. In other words, the Deep Web is full of digital garbage, with abandoned portals, error messages and broken links, and the user must make his way through all that material. But before that, some want to explore, to access "a demo", if you will.

This is where Tor2Web comes in, a project that allows users to visit "Onion services" without using the Tor Browser. Tor veterans have repeated ad nauseam that no one should use it for security reasons, but it all depends on how good it is implemented. The Onion Search Engine offers its own Tor2Web access, so all .onion portals are one click away... in theory.

Why am I saying "in theory"? Because the search engine itself doesn't fail, but the loading of the sites is a different story. Service descriptions are limited, and errors are the order of the day. Onion Search Engine does its best to determine if a service is online or not (with small green and red indicators, next to the last update date), but we can't rely too much on that.

Onion Search Engine also offers an extension to integrate its features into Google Chrome, and an Android-compatible application.

 

Access from Google Chrome

 

Onion search engine is an extension available for Google Chrome that will allow the user of this browser to search for content that is in the Tor network, in the Deep Web or also search for content that is in the so-called superficial Internet. This Chrome extension makes use of a service called TOR2WEB that makes this kind of information accessible to users of traditional browsers.

We will have two options, one to search for information on the 'Onion Network' and another to search on the 'Standard Netword'. Onion search engine ensures that the service is anonymous and that the user's privacy will be protected and respected. There are no cookies, no javascript and no external or third party codes, they say. However, to navigate these links on the Deep Web that use the .onion domain, it is necessary to install Tor Browser, as we have explained previously.

To install Onion search engine we won't have to do anything special, it's just another extension of Google Chrome, so we'll have to go to the list of browser extensions, look for it and install it. When we perform a search and find the link we want to access, it will be as simple as copying it, going to Tor Browser and pasting it into the address bar. With these tools you can start surfing the Deep Web and discover with your own eyes everything that is there, always keeping within the legal margins if you don't want to have problems.

 
by Janeth Kent Date: 25-05-2020 security deepweb darkweb onion tor hits : 20964  
 
Janeth Kent

Janeth Kent

Licenciada en Bellas Artes y programadora por pasión. Cuando tengo un rato retoco fotos, edito vídeos y diseño cosas. El resto del tiempo escribo en MA-NO WEB DESIGN END DEVELOPMENT.

 
 
 

Related Posts

Security of Internet providers: can we trust it?

This year has been a time of many changes. Now, more people are connected to the Internet through their home routers for teleworking, shopping, or leisure. This is where the…

Brief History of Biometric Authentication

These days, biometric authentication seems to be part of every little gadget or device we use. You’ve no doubt used it when logging onto your laptop, your tablet, or your…

A beginner’s guide to software vulnerabilities

What are software vulnerabilities The number of devices connected to the Internet is growing every day. And among those devices we find not only computers and smartphones, but also an ever-rising…

The BleedingTooth vulnerability and other Bluetooth security risks

Have you ever heard of BleedingTooth? And we do not mean the really disturbing looking mushroom which goes by this name and is totally real (we double checked) but one of…

Network and port scanning with Zenmap

This article goes out to all the computer nerds who are, when it comes to networking, more on the noob-side of the crowd. It does not have to be complicated…

Google Dorks: How to find interesting data and search like hacker

Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine…

How to block any website with a password from your browser

We are going to explain how to block any website with a password from your browser, and for this purpose we are going to use an extension called Block Site.…

Double VPN: what it is and how it works

Privacy on the web is a very important factor for users and there are more and more tools to help us maintain it. Without a doubt VPN services have had…

How to securely access the Dark Web in 15 steps. Second part

Let's continue with the 2nd part of our article in which we try to give you some advice on how to safely and securely explore the dark web. Let's restart from…

How to securely access the Dark Web in 15 steps. First part

The dark web can be a pretty dangerous place if you don't take the right precautions. You can stay relatively safe with a good antivirus and a decent VPN. However,…

How to Browse the Internet Anonymously: 6 tips

Most of the actions you take online are not as private as you might imagine. Nowadays, countless people and groups try to follow our online behaviour as closely as possible. Our…

Mobile cryptophones on the market (legals)

As we have said, it is a market often at the borders of legality, also because these devices are particularly used by criminals. Some models, however, are also available through…

We use our own and third-party cookies to improve our services, compile statistical information and analyze your browsing habits. This allows us to personalize the content we offer and to show you advertisements related to your preferences. By clicking "Accept all" you agree to the storage of cookies on your device to improve website navigation, analyse traffic and assist our marketing activities. You can also select "System Cookies Only" to accept only the cookies required for the website to function, or you can select the cookies you wish to activate by clicking on "settings".

Accept All Only sistem cookies Configuration