Many experts havecriticized the existence of Tor in the present scenario. The situation won’tchange for at least a decade. There has to be a monitoring mechanism to track down illicit websites. Several renowned security researchers have found out that when hackers access data, the same password can cause harm. In addition to brute force tactics, hackers of the new generation install remote scripts to try to log key data. As per their results, in some cases, a successful password could not be the best. The use of the same password for banking websites and online games is also very significant. The way data is distributed is one of the helpful characteristics of the dark web sites dark web. Despite the architecture and connectionstability of the 19th century raising many eyebrows, many lovingly enjoy TOR networks.