List of Tor onion services

Last updated

This is a categorized list of notable onion services (formerly, hidden services) [1] accessible through the Tor anonymity network. Defunct services are marked.

Contents

Commerce

Communications

Messaging

Email providers

File storage

Financial

Government

Hidden services directories, portals, and information

News and document archives

Operating systems

Whistleblowing / Drop sites

Nonprofit organizations

Pornography

Search engines

Social media and forums

Software

See also

Related Research Articles

Crypto-anarchism is a political ideology focusing on protection of privacy, political freedom and economic freedom, the adherents of which use cryptographic software for confidentiality and security while sending and receiving information over computer networks.

A dark net or darknet is an overlay network within the Internet that can only be accessed with specific software, configurations, or authorization, and often uses a unique customized communication protocol. Two typical darknet types are social networks, and anonymity proxy networks such as Tor via an anonymized series of connections.

.onion Pseudo–top-level internet domain

.onion is a special-use top level domain name designating an anonymous onion service, which was formerly known as a "hidden service", reachable via the Tor network. Such addresses are not actual DNS names, and the .onion TLD is not in the Internet DNS root, but with the appropriate proxy software installed, Internet programs such as web browsers can access sites with .onion addresses by sending the request through the Tor network.

Tor (anonymity network) Free and open-source anonymity network based on onion routing

Tor is free and open-source software for enabling anonymous communication by directing Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays in order to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace the Internet activity to the user: this includes "visits to Web sites, online posts, instant messages, and other communication forms". Tor's intended use is to protect the personal privacy of its users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities unmonitored.

Tails (operating system) Linux distribution for anonymity and privacy

Tails, or The Amnesic Incognito Live System, is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity. All its incoming and outgoing connections are forced to go through Tor, and any non-anonymous connections are blocked. The system is designed to be booted as a live DVD or live USB, and will leave no digital footprint on the machine unless explicitly told to do so. The Tor Project provided financial support for its development in the beginnings of the project. Tails comes with UEFI Secure Boot.

GlobaLeaks is an open-source, free software intended to enable secure and anonymous whistleblowing initiatives.

The Hidden Wiki

The Hidden Wiki was a dark web MediaWiki wiki operating as Tor hidden services that could be anonymously edited after registering on the site. The main page served as a directory of links to other .onion sites.

The Associated Whistleblowing Press (AWP) is a not-for-profit information agency based in Brussels, Belgium, dedicated to the defense of human rights by promoting transparency, freedom of information and speech, whistleblowing and investigative journalism, conceived as a global network made up of cooperative local platforms and actors. According to its website, the initiative aims to work in a decentralized network structure, with local platforms that deal with local information, contexts and actors in a "from the roots upward model". The stories produced will then be published on the project's multilanguage newsroom under a Creative Commons license. The team consists of collaborators spread all around the world, led by two editors, Pedro Noel and Santiago Carrion.

SecureDrop

SecureDrop is a free software platform for secure communication between journalists and sources (whistleblowers). It was originally designed and developed by Aaron Swartz and Kevin Poulsen under the name DeadDrop. James Dolan also co-created the software.

Lolita City

Lolita City was a website that used hidden services available through the Tor network. The site hosted child pornography images and videos of underage males and females ranging up to 17 years of age.

Freedom Hosting is a defunct Tor specialist web hosting service that was established in 2008. At its height in August 2013, it was the largest Tor webhost.

The dark web is the World Wide Web content that exists on darknets: overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user's location. The dark web forms a small part of the deep web, the part of the Web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web.

Tor2web HTTP proxy for Tor hidden services

Tor2web is a software project to allow Tor hidden services to be accessed from a standard browser without being connected to the Tor network. It was created by Aaron Swartz and Virgil Griffith.

Mirror sites or mirrors are replicas of other websites or any network node. The concept of mirroring applies to network services accessible through any protocol, such as HTTP or FTP. Such sites have different URLs than the original site, but host identical or near-identical content. Mirror sites are often located in a different geographic region than the original, or upstream site. The purpose of mirrors is to reduce network traffic, improve access speed, ensure availability of the original site for technical or political reasons, or provide a real-time backup of the original site. Mirror sites are particularly important in developing countries, where internet access may be slower or less reliable. The maintainers of some mirrors choose not to replicate the entire contents of the upstream server they are mirroring because of technical constraints, or selecting only a subset relevant to their purpose, such as software written in a particular programming language, runnable on a single computer platform, or written by one author. These sites are called partial mirrors or secondary mirrors.

Doxbin Document sharing website

Doxbin was a document sharing and publishing website which invited users to contribute personally identifiable information, or "dox", of any person of interest. It was previously operated on the darknet as a Tor hidden service, by a person known on the internet as nachash. Since its takedown in 2014, nachash has stepped down and relinquished his ownership to a predecessor that used the username "King Oren" when interviewed. He said in an interview that he is hosting Doxbin on the World Wide Web, as well as on Darknet and Tor hidden service websites. He declined to release the link to either of them, saying, "The people that use the service know how to find it, that's what keeps it secure and out of the reach of incompetent people using it for malice things".

Parrot OS is a Linux distribution based on Debian with a focus on security, privacy, and development. Parrot OS is also used by many penetration testers.

A darknet market is a commercial website on the dark web that operates via darknets such as Tor or I2P. They function primarily as black markets, selling or brokering transactions involving drugs, cyber-arms, weapons, counterfeit currency, stolen credit card details, forged documents, unlicensed pharmaceuticals, steroids, and other illicit goods as well as the sale of legal products. In December 2014, a study by Gareth Owen from the University of Portsmouth suggested the second most popular sites on Tor were darknet markets.

Grams is a discontinued search engine for Tor based darknet markets launched in April 2014, and closed in December 2017. The service allowed users to search multiple darknet markets for products like drugs and guns from a simple search interface, and also provided the capability for its users to hide their transactions through its bitcoin tumbler Helix.

facebookcorewwwi.onion is a site that allows access to Facebook through the Tor protocol, using its .onion top-level domain. In April 2016, it had been used by over 1 million people monthly, up from 525,000 in 2015. Neither Twitter nor Google operate sites through Tor, and Facebook has been applauded for allowing such access, which makes it available in countries that actively try to block Facebook.

torservers.net is an independent network of non-profit organisations that provide nodes to the Tor anonymity network. The network started in June 2010.

References

  1. Winter, Philipp. "How Do Tor Users Interact With Onion Services?" (PDF). nymity.ch. Retrieved 27 December 2018.
  2. "Twitter". mobile.twitter.com.
  3. "Command Line - Tor | Keybase Docs". keybase.io.
  4. "Encrypted Email Over Tor Setup - ProtonMail Support".
  5. "Riseup's Tor Hidden Services". https://riseup.net/en/tor: Riseup Networks. Retrieved 6 March 2019.
  6. Dingledine, R.; Mathewson, N.; Syverson, P. (2007). "Deploying Low-Latency Anonymity: Design Challenges and Social Factors" (PDF). IEEE Security & Privacy. 5 (5): 83–87. doi:10.1109/MSP.2007.108.
  7. Jordan, Tim (2008). "The Politics of Technology: Three Types of 'Hacktivism'". In Häyhtiö, Tapio; Rinne, Jarmo (eds.). Net Working/Networking: Citizen Initiated Internet Politics. University of Tampere. p. 267. ISBN   9789514474644.
  8. Oram, Andy (2001). Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O'Reilly Media. ISBN   9780596001100.
  9. Ernesto (7 January 2016). "The Pirate Bay Switches on New .MS Domain" . Retrieved 5 July 2016.
  10. Howell O'Neill, Patrick (4 August 2013). "An in-depth guide to Freedom Hosting, the engine of the Dark Net" . Retrieved 30 May 2015.
  11. Gallagher, Sean (4 August 2013). "Alleged Tor hidden service operator busted for child porn distribution" . Retrieved 30 May 2015.
  12. Ernesto (7 June 2016). "KickassTorrents Enters The Dark Web, Adds Official Tor Address" . Retrieved 5 July 2016.
  13. "Dutch National Prosecution Service and police launch Hidden Service in global Darknet enforcement operation - Deep Dot Web". deepdotweb.com. Archived from the original on 2017-08-31. Retrieved 2017-08-30.
  14. "CIA's Latest Layer: An Onion Site". Central Intelligence Agency. Retrieved May 11, 2019.
  15. "Introducing DNS Resolver for Tor". Cloudflare. 5 June 2018. Retrieved 1 October 2018.
  16. "BBC News launches 'dark web' mirror". BBC News. 2019-10-23. Retrieved 2020-07-13.
  17. "Deutsche Welle websites accessible via Tor-Protocol". Deutsche Welle. 2019-11-20. Retrieved 2020-07-13.
  18. "Radio Free Asia hosts secure mirror websites for Asian, Chinese audiences". USAGM. 2020-04-17. Retrieved 2020-07-13.
  19. Sandvik, Runa (2018-04-26). "The New York Times is Now Available as a Tor Onion Service". Medium. Retrieved 2020-07-13.
  20. "Telnet gateway". meta.wikimedia.org. Wikimedia Foundation. 1 April 2016. Archived from the original on 1 April 2016. Retrieved 12 June 2016. lgcjxm7fttkqi2zl.onion
  21. The Debian Project (Debian System Administrators) (30 July 2016). "DSA announces Debian static websites are now available as Onion services". twitter.com. Software in the Public Interest. Retrieved 31 July 2016. DSA announces Debian static websites are now available as Onion services. The list of services may be found on https://onion.debian.org .
  22. "onion.debian.org". Debian Project, Software in the Public Interest. 30 July 2016. Retrieved 31 July 2016.
  23. Richard Hartmann (25 August 2015). "Tor-enabled Debian mirror". richardhartmann.de. Archived from the original on 16 April 2016.
  24. "Qubes OS: A reasonably secure operating system".
  25. "Verification Assets §Whonix Sites". whonix.org. Archived from the original on 12 June 2016. Retrieved 12 June 2016.
  26. "Datenschutz §Technical Information". whonix.org. Archived from the original on 12 June 2016. Retrieved 12 June 2016.
  27. 1 2 3 4 "A Guide to the Dark Web's Lighter Side". Wired. ISSN   1059-1028 . Retrieved 2021-02-04.
  28. "The Intercept Welcomes Whistleblowers". The Intercept. Retrieved 2021-02-04.
  29. "Tips". The New York Times. 2016-12-14. ISSN   0362-4331 . Retrieved 2021-02-04.
  30. Tor Project (20 Jan 2016). "Our friends La Quadrature Du Net now provide a #Tor onion service! lqdnwwwmaouokzmg.onion". twitter.com. Retrieved 21 January 2016.
  31. Un Garage (1 Jun 2017). "Reminder, LQDN sites are available on Tor: Searx: searchb5a7tmimez.onion Etherpad: lqdnpadpys4snom2.onion Website: lqdnwwwmaouokzmg.onion". twitter.com. Retrieved 1 June 2017.
  32. http://telecomix.org/
  33. ARIA, Pornhub (January 23, 2020). "Today we are announcing that we have made a mirror of Pornhub available on Tor!! pornhubthbh7ap3u.onion".
  34. Kan, Michael (January 23, 2020). "Pornhub Is Now Available as a Tor Site to Protect Users' Privacy". PCMag UK.
  35. "Archived copy". Archived from the original on 2013-06-02. Retrieved 2013-06-24.CS1 maint: archived copy as title (link)
  36. "Cliqz Search as an Onion Service". Cliqz. December 5, 2019.
  37. Van der Sar, Ernesto (21 November 2015). "Sci-Hub, BookFi and LibGen Resurface After Being Shut Down". TorrentFreak. Archived from the original on 22 November 2015. Retrieved 16 January 2016.
  38. Andy (31 December 2015). "Pirate Bay is Back to Square One After Months of Domain Hopping". TorrentFreak. Retrieved 16 January 2016. The TOR/Onion address uj3wazyk5u4hnvtk.onion should also be fine longer term but it’s hardly the most memorable set of digits for anyone to recall.
  39. Facebook (2014, October 31). Facebook Protect the Graph blog. Retrieved 31 October 2014
  40. https://guardianproject.info/fdroid/
  41. Novak, Brennan. "Mailpile: e-mail that protects your privacy". mailpile.is.
  42. Strongbox Archived 2017-04-13 at the Wayback Machine . The New Yorker . Retrieved 15 November 2013.
  43. Biryukov, Alex; Pustogarov, Ivan; & Weinmann, Ralf-Philipp. (2013). Content and popularity analysis of Tor hidden services. ArXiv.org (Cornell University Library). Retrieved 15 November 2013.
  44. Davidson, Amy. (2013, May 15). Introducing Strongbox. The New Yorker. Retrieved 26 December 2013.