Sign Up

How to access Darknet via Tor, I2P and Freenet? Guide on OnlineSim

  • Sep 14, 2023, 2:28 PM
  • 11 minutes

The dark side of the internet, part 5: How to access Darknet via Tor, I2P and Freenet

In this last article in the "dark side of the internet" series, we describe how to configure Freenet, I2P and Tor to gain access to the Dark Web.

Previous articles:

  • The Dark Web, part 1: What is the Dark Web and what is it used for

  • The Dark Web, part 2: How do onion sites work 

  • The Dark Web, part 3: What is Freenet

  • The Dark Web, part 4: What is I2P and how it works

  • The Dark Web, part 5: How to access Darknet via Tor, I2P and Freenet ← you are here

How to access Freenet

To use Freenet, you need to download the application from the official Freenet website. It runs under Windows, macOS and GNU/Linux.

Besides, you will need to have Java updated to the latest version. The Freenet installer will do that for you.

If you can't open the official Freenet site, download the application from the mirrors for regular browsers or from Tor. Note that the latter can only be accessed using Tor Browser.

When the Freenet software is installed, it will automatically launch the browser with the installation wizard. It will prompt you to:

  1. Choose your Tor security level. At low security, you can connect to any Freenet user, and at high security you can only connect to your friends or specified users.

Choose your Freenet security level: connect via friends or random users​

  1. Choose your datastore size in the range from 0.5 to 500 GiB for downloading and sharing files. The larger the datastore, the faster sites will open in Freenet.

​Set your Freenet datastore size ​

  1. Set your monthly data limit. You can select a value from the list or specify your value.

Set your monthly data limit

You can also configure Freenet at a later time. To do so, you will have to start the Freenet client again or enter “” in the address bar.

To access Freenet, you will need a Tor-capable browser. Any browser will do, except Internet Explorer — with the latter, the network may be unstable. For greater security, set your browser to incognito mode.

Once you start Freenet, you will see the home page with a list of sites on the network. You can access any site and enjoy your secure Tor internet.

Websites available via Freenet

You can find out more about the Freenet configuration procedure on the official website

What is out there in Freenet

Freenet has various sites with the usual functionalities: messengers, bulletin boards, email and other utilities.


Freenet Message System (FMS). In this system, users publish “trusted” lists, and each user accesses messages either from the nodes he/she trusts or from those trusted by the nodes he/she trusts.

If you have created a site in , you need to tell others about its existence. The most common way to do this is to send a message containing the access key and a brief description of the site. Typically, users advertise their Freenet sites on FMS or a similar forum, Freetalk. They have special boards for advertising sites.

Frost helps share files anonymously. Frost can be downloaded from the home page or from its free website in Freenet. 

Sone is similar to Facebook and supports anonymous discussions, photo sharing and messaging.


jSite is a tool for searching websites in Freenet.

Infocalypse helps to receive new data with less requests and download them without having the owners’ private keys.


FCPLib is a set of C++-based functions that help store data in and retrieve data from Freenet. FCPLib supports Windows NT/2K/XP, Debian, BSD, Solaris and macOS.

FLIC is a library for instant messaging over Tor and Freenet. It can serve as the server part for low latency messaging systems.

Libraries are an optional component of Freenet — the network will run just fine without them. Libraries are tools that programmers can use to create applications in Freenet.

You can also configure an anonymous mailbox in Freenet. For setup instructions, follow this link. Anonymous mailboxes are used to send website access keys to certain users.

How to access I2P

To gain access to I2P, you need to download the client from the official site or from GitHub. The application runs under macOS, Windows, Linux, Debian, Ubuntu and Android. You will also need to install the latest version of Java. At this moment, that’s Java SE 17.

For those of you who prefer C++ over Java or would like a faster network operation, we provide a link through which to access the C++ client at the end of this section.

It’s better to install I2P on a VPS, and that’s for three reasons: 

  1. You won’t have your anonymity compromised. Because of the IP change, the ISP won’t know you’re running I2P.

  2. VPS is always online → its network map is always large, so I2P will run faster and generate fewer errors.

  3. Hackers will have a harder time finding out that you are using I2P because the client is running on a server rather than on your computer.

I2P installation for Windows

I2P client installation 

When the installation is complete, run the client and go to in your browser. The client will set the default settings, and you can enjoy your secure internet.

Sometimes, I2P sites can't be accessed, and there may be several reasons for that. For example, an I2P site can be offline, removed or located at a different address. In the latter case, a Jump Service will come in handy. Jump Services search available websites and convert I2P addresses into an easy-to-read form easily accessed by the user. Access the FAQ page to learn more.When a Jump Service finds a desired site, it prompts the user to save it. If the user refuses, the client will forget the address at the end of the session. If the user agrees, the address can be easily accessed next time via search. There are different address books in which website addresses can be saved: from the local address book, they can be made publicly available; from the local address book, addresses will never be published.
Prompts displayed when a Jump Service finds a website 

The user can configure the network on his/her own.

Network setup for Chromium-based browsers

Access Start → Settings → Network & Internet. In the opening menu, select Proxy → Use a proxy.

When you pull the “Use a proxy server” slider bar, the port configuration screen will open. Enter “” in the Address field and “4444” in the Port field for HTTP or “4445” for HTTPS.

Настройки прокси-сервера IE
Setting port details

Network setup for Mozilla

Start the browser and go to Settings → Network Settings.

Configuring Mozilla for I2P

Select Manual proxy configuration, type “” in the HTTP Proxy and SSL Proxy fields and “4444” in the Port fields.

Setting proxy details

If you are configuring Mozilla Firefox for I2P, type “about:config” in the search box, then find “” in the new search box and set the value at True.

Final configuration of Mozilla for I2P

Now you are ready to start using your secure internet. You can start by accessing the project’s official site mirror or any other site for that matter. For useful links, access Router Console.

Useful links in Router Console

I2P installation for macOS

Download the installation file from the official site, run it and accept the license agreement. Then drag the I2P icon on top of the Applications icon and start I2P from Finder.

Once you start I2P, the program’s icon will appear on the Dock panel, and the I2P console page will soon open in the browser. It will prompt you to finish the configuration in automatic mode.

To view hidden sites, you will need the Mozilla browser. Its configuration is the same as under Windows. 

I2P installation for Linux

First download the installation file from the official site. Then, there are two options for installation.

Option 1: installation from the terminal: java -jar i2pinstall_1.9.0.jar. This will start the GUI installer.  You can start the installer by clicking twice on the file “i2pinstall_1.9.0.jar” or by clicking the right button of the mouse and selecting “Open with Java”.

Option 2: installation from the command line. This option is suitable for servers, containers or certain virtual machines. To install I2P from the command line, type “java -jar i2pinstall_1.9.0.jar -console”.

For those who prefer C++ over Java, there is an I2P implementation based on C++. That’s a full-fledged opensource project that implements the I2P network. You can download the installer from the developer’s official page on Github. The installation procedure is the same as for the Java client, however the C++ version is substantially faster and has a lower footprint on your PC.

Alternatively, you can download the out-of-the-box browser with preconfigured I2Pd at the very start, it will display the homepage with links to sites.

What is out there in I2P

I2P can be used in a variety of ways and is not limited to websites only. You can host any web resources in I2P — forums, message boards, git repositories, blogs or personal one-page websites. It is very feasible to implement turn-based network games that do not require low-latency packet transmission, such as chess or cards.

The only limitation is the data transmission speed within the network.

Proprietary search engines. In I2P, there are proprietary search engines, such as Legwork.i2p or Ransack.i2p. They work basically the same way as the regular search engines like Google. The only difference is that Legwork searches for i2p sites only, while Ransack aggregates information from such search engines as Google, DuckDuckGo, Qwant etc.

Blogs and forums. In I2P you can create your own blog(s) and share your thoughts with readers. One notable blog is Exotic Security — its author talks about network security and discusses useful features for programmers. And an example of a forum is Hidden Answers — there, you can talk to people on different topics.

Book websites. In I2P, there is a mirror of Flibusta, the largest pirated literature website. There are also narrower themed book sites, such as Fantasy worlds.

File sharing sites. There are several file sharing sites in I2P, which are mirrors of the regular internet websites. For example, there are mirrors of RuTor and Public Torrent Tracker; the file sharing site Serien is also gaining traction.

Online stores. I2P also has its own marketplaces where all sorts of things are traded. But we will not provide links to such sites.

How to access the Dark Web via Tor

To access the Dark Web, you will need Tor Browser, a VPN connection and the links to your desired sites in Tor. Instructions are provided below.

  1. Download the anonymous Tor Browser from the official site and install it.

Installation of Tor Browser

Enable VPN for added security with Tor browser. To find out more about what VPN is and how it works, check out our article on VPN.

  1. Enter your desired link in Tor browser’s search box and access the website. If you don’t know the address, search for it on The Hidden Wiki — this Darknet Wiki project provides links to other websites. Note that this link will only open in Tor Browser.

The main page of the Hidden Wiki in Tor browser. The websites list is on the right 

Instead of Tor Browser, you can use the Windows Expert Bundle, which wraps all outgoing traffic in onion encryption. Its downside is that it greatly reduces the speed of the internet. So, Tor Browser is a better option for accessing the Dark Web.

What can you do in the Dark Web via Tor

Some people use Tor as they would use the regular internet, and others use it to do illegal things. We will not tell you about the latter, but will show you a couple of popular services and sites for secure web surfing in Tor browser.

Social media. There is not much sense in using regular social networks on darknet, because it is virtually impossible to register anonymously with them — anyone would be able to connect your account to the real person. So, here are several links to alternative sites and services:

  • Cyph messenger is the Tor alternative to Skype with support of video chats and file transfer.

  • Facebook is the Tor version of the regular Facebook.

  • Hidden Answers is a Tor analog of the Stack Overflow website. There, you can anonymously ask questions about hacking, security, online privacy etc.

Email services. Regular emails are not secure, as they can be tracked or hacked. On the Dark Web, there are alternative email services that use Tor encryption and hide your emails from third parties. For your anonymous and secure Tor-based email, use Mail2Tor, ProtonMail or CTemplir.

Hosting services. In Tor, there are hundreds of sites where you can store personal files under protection. It's secure because the Tor network creates multiple layers of encryption for your files and internet connection.

Here are some Tor hosting services:

  • Daniel Uploads is a Tor service for uploading files up to 10GB in size. The Tor uploads are visible to all Dark Web users.

  • Image Hosting is a free Tor-based image hosting service supporting PHP, MySQL and PHPMyAdmin. It offers encrypted storage for personal files. The maximum storage size is 2GB.

  • More hosting services: МЕГАТор, SecureDrop, BlackCloud.

Other useful resources. For reading news, there is a Tor analog of The New York Times. Use ExpressVPN for your Tor-based VPN connections. Books with and without copyright are available in Tor Browser at Comic Books, Imperial and Z-Library.

Last but not least, here are some Tor aggregator sites with links to other resources:

  • Daniel's onions — a database of 7000 addresses.

  • Fresh Onions — a catalog of 5000 unique addresses.

  • Onionsoup — a list of dozens of online services.

  • Not Evil — a search engine listing over 32 million links to .onion addresses.

  • Torch — a Tor search engine listing 450,000 links

  • Tor Onionland — a search engine containing some 5 million pages and 57 thousand sites.