You do not need special permission to access the deep or Dark Web. However, accessing the deep or Dark Web requires the use of a “TOR” browser and should only be done using a VPN/ 10042017 encrypted tunnel. In general, we advise against attempting to access the Dark Web.
Are there any special credentials needed to investigate the dark web?
Have more questions?
Was this article helpful?
Provide feedback for the Documentation team!
Browse this section
- How do I subscribe or unsubscribe a Daily/Monthly Dark Web ID Compromise Report email notifications?
- Compromise Data Spike
- Dark Web ID Data Integrity
- CSS Compromise Type
- I see fake emails (false positives). Why is this important?
- How are the stolen or exposed credentials found on the Dark Web ID?
- What is the Dark Web?
- Some of this data is old and includes employees that are no longer working for us. Doesn’t this mean we are not at risk?
- Identified method used to capture/ steal data: how was the data stolen or compromised?
- Does the identification of my organization’s exposed credentials mean we are being targeted by hackers?
- See more