So you go to the darkweb since you use TOR?
So, for those that don't know, "dark web" refers to certain web domains, which under TOR protocol end in .onion, or it the case of I2P, "eepsites", ending in .i2p, which are available only to those using said protocol, and unavailable to those using just their ISP provided access.
They are used for a lot of notorious things that are illegal: identity theft, child porn, etc. They are also used in countries that don't have free speech, i.e. China, for free expression that can't be censored by the government because they are totally anonymous.
I think, primarily for the latter reason, that their existence is good, but no, I don't have a specific use for these domains.
I do use TOR protocol to obfuscate my traffic, though. TOR uses "exit nodes" that allow you to use it to browse regular internet anonymously. I2P doesn't have this, it's just for anonymous hosting. I don't use I2P. So for most of my frivolous net activities, I'm passing net access through ISP - Firewall VM - VPN VM - Whonix VM - VM-in-use (Usually a disposable VM) combo. That's a lot of network hops and makes me feel pretty safe. (Edit: Whonix is just TOR via virtual machine, with some other differences)
When it comes to anything where bandwidth is important though, such as gaming, I just use my ISP - Firewall - VPN combo, because TOR is slooow.
The risk you take with VPNs, is that maybe they do actually log your traffic despite claiming not to. But, I know
my ISP logs my traffic, and they don't make any claims to the contrary. And so, I consider it better than default, but not impossible to be compromised. I actually think those using offshore VPN companies have better prospects for privacy than those of us using US-based ones. Unfortunately, I fall in the latter category. I'm evaluating it.
(Another edit: Apparently I2P does have an anonymous browsing component, after some reading... I'm not super-familiar with I2P at the moment.)