This is an alphabetized list of notable .onion hidden services accessible through the Tor anonymity network . Defunct services are marked.
Hidden services by category
Commerce
Agora (defunct)
Atlantis (defunct)
AlphaBay (defunct)
Black Market Reloaded (defunct)
Dream Market
Evolution (defunct)
The Farmer's Market (defunct)
Hansa (defunct)
Sheep Marketplace (defunct)
Silk Road (defunct)
TheRealDeal (defunct)
Utopia (defunct)
Communications
Messaging
Software
Email providers
File storage
Free Haven – A distributed anonymous file storage system that places focus on persistent availability of data. The MIT students' work on the project led to collaboration with DARPA to develop Tor.[ 5] [ 6] [ 7]
Freedom Hosting (defunct) – Formerly the largest Tor-specific web host, until the arrest of its owner in August 2013.[ 8] [ 9]
KickassTorrents , a BitTorrent tracker[ 10] (defunct)
The Pirate Bay , a BitTorrent tracker[ 11]
SporeStack - Allows for small, disposable servers to be purchased anonymously with Bitcoin.[ 12] [ 13]
Financial
Government
National Police and Public Prosecution Service of the Netherlands — official hidden service about darknet market takedown operations.[ 16]
News and document archives
Operating systems
Tails OS - Live, portable, amnesiac operating system (run off USB)
Debian (static Web content[ 19] and package repositories)[ 20] [ 21]
Qubes OS – security-focused desktop operating system[ 22]
Whonix – Debian-based security distribution[ 23] [ 24]
Whistleblowing / Drop sites
GlobaLeaks
Independent Media Center
The Intercept
Filtrala, a Spanish whistleblowing initiative operated by Associated Whistleblowing Press
Ljost, an Icelandic whistleblowing initiative operated by Associated Whistleblowing Press
NawaatLeaks, an Arabic whistleblowing initiative operated by Nawaat
ProPublica
WildLeaks, a wildlife-crime whistleblowing initiative operated by Elephant Action League
WikiLeaks
Nonprofit organizations
Child pornography
Lolita City (defunct)
Playpen (defunct)
Childs Play (defunct)
Search engines
See also
References
↑ "Twitter" . https://mobile.twitter.com/cryptocatapp/status/402885544247840769 .
↑ Novak, Brennan. "Mailpile: e-mail that protects your privacy" . https://www.mailpile.is/ .
↑ "Encrypted Email Over Tor Setup - ProtonMail Support" . https://protonmail.com/support/knowledge-base/tor-setup .
↑ "Riseup’s Tor Hidden Services" . https://riseup.net/en/tor : Riseup Networks. https://riseup.net/security/network-security/tor/hs-addresses-signed.txt . Retrieved 2 November 2016 .
↑ Dingledine, R.; Mathewson, N.; Syverson, P. (2007). "Deploying Low-Latency Anonymity: Design Challenges and Social Factors" (PDF). IEEE Security & Privacy 5 (5): 83–87. doi :10.1109/MSP.2007.108 . http://www.dtic.mil/dtic/tr/fulltext/u2/a527761.pdf .
↑ Jordan, Tim (2008). "The Politics of Technology: Three Types of 'Hacktivism'" . in Häyhtiö, Tapio; Rinne, Jarmo. Net Working/Networking: Citizen Initiated Internet Politics . University of Tampere. pp. 267. ISBN 9789514474644 . https://books.google.com/books?id=29Ucv7BU_DYC&pg=PA267 .
↑ Oram, Andy (2001). Peer-to-Peer: Harnessing the Power of Disruptive Technologies . O'Reilly Media. http://shop.oreilly.com/product/9780596001100.do .
↑ Howell O'Neill, Patrick (4 August 2013). "An in-depth guide to Freedom Hosting, the engine of the Dark Net" . http://www.dailydot.com/news/eric-marques-tor-freedom-hosting-child-porn-arrest/ . Retrieved 30 May 2015 .
↑ Gallagher, Sean (4 August 2013). "Alleged Tor hidden service operator busted for child porn distribution" . https://arstechnica.com/tech-policy/2013/08/alleged-tor-hidden-service-operator-busted-for-child-porn-distribution/ . Retrieved 30 May 2015 .
↑ Ernesto (7 June 2016). "KickassTorrents Enters The Dark Web, Adds Official Tor Address" . https://torrentfreak.com/kickasstorrents-enters-the-dark-web-adds-official-tor-address-160607/ . Retrieved 5 July 2016 .
↑ Ernesto (7 January 2016). "The Pirate Bay Switches on New .MS Domain" . https://torrentfreak.com/the-pirate-bay-switches-on-new-ms-domain-160107/ . Retrieved 5 July 2016 .
↑ Helms, Kevin (15 January 2017). "Deploy Servers Anonymously with Bitcoin from the Command Line" . https://news.bitcoin.com/deploy-servers-anonymously-with-bitcoin-from-the-command-line/ . Retrieved 21 August 2017 .
↑ Claburn, Thomas (19 January 2017). "SporeStack: Disposable, anonymous servers, via Bitcoin and Python" . https://www.theregister.co.uk/2017/01/19/disposable_servers_available_anonymously_via_bitcoin/ . Retrieved 21 August 2017 .
↑ White, Mike. "Deep Web Bitcoin Mixer’s Recent Hack Restarted The Debate Of Darkcoin Vs Trusted Mixers and Trusted Mixers Won" . http://coinbrief.net/deep-web-bitcoin-mixers-vs-darkcoin/ . Retrieved 8 August 2015 .
↑ Greenberg, Andy (11 July 2014). "Waiting for Dark: Inside Two Anarchists’ Quest for Untraceable Money" . https://www.wired.com/2014/07/inside-dark-wallet/ . Retrieved 8 August 2015 .
↑ "Dutch National Prosecution Service and police launch Hidden Service in global Darknet enforcement operation - Deep Dot Web" . https://www.deepdotweb.com/2016/10/31/dutch-national-prosecution-service-police-launch-hidden-service-global-darknet-enforcement-operation/ .
↑ "Introducing DNS Resolver for Tor" . Cloudflare . Template:Fdate . https://blog.cloudflare.com/welcome-hidden-resolver/ . Retrieved Template:Fdate .
↑ "Telnet gateway" . Wikimedia Foundation . 1 April 2016. Archived from the original on 1 April 2016. https://meta.wikimedia.org/w/index.php?title=Telnet_gateway&oldid=15494293 . Retrieved 12 June 2016 . "lgcjxm7fttkqi2zl.onion"
↑ "DSA announces Debian static websites are now available as Onion services." . Software in the Public Interest. 30 July 2016. https://twitter.com/debian/status/759413449654996992 . Retrieved 31 July 2016 . "DSA announces Debian static websites are now available as Onion services. The list of services may be found on https://onion.debian.org ."
↑ "onion.debian.org" . Debian Project, Software in the Public Interest. 30 July 2016. https://onion.debian.org/ . Retrieved 31 July 2016 .
↑ "Tor-enabled Debian mirror" . 25 August 2015. Archived from the original on 16 April 2016. https://web.archive.org/web/20160416083047/http://richardhartmann.de/blog/posts/2015/08/24-Tor-enabled_Debian_mirror/ .
↑ "Qubes OS: A reasonably secure operating system" . http://qubes-os.org .
↑ "Verification Assets §Whonix Sites" . Archived from the original on 12 June 2016. https://web.archive.org/web/20160612012519/https://www.whonix.org/wiki/Verification_Assets#Whonix_Sites . Retrieved 12 June 2016 .
↑ "Datenschutz §Technical Information" . Archived from the original on 12 June 2016. https://web.archive.org/web/20160612012001/https://www.whonix.org/wiki/Datenschutz#Technical_Information . Retrieved 12 June 2016 .
↑ "Our friends La Quadrature Du Net now provide a #Tor onion service! lqdnwwwmaouokzmg.onion" . 20 Jan 2016. https://twitter.com/torproject/status/689958927044317185 . Retrieved 21 January 2016 .
↑ Un Garage (1 Jun 2017). "Reminder, LQDN sites are available on Tor: Searx: searchb5a7tmimez.onion Etherpad: lqdnpadpys4snom2.onion Website: lqdnwwwmaouokzmg.onion" . https://twitter.com/UnGarage/status/870214983027740672 . Retrieved 1 June 2017 .
↑ http://telecomix.org/
↑ "Archived copy" . Archived from the original on 2013-06-02. https://web.archive.org/web/20130602085826/http://btdigg.org/ . Retrieved 2013-06-24 .
↑ "Sci-Hub, BookFi and LibGen Resurface After Being Shut Down" . TorrentFreak . 21 November 2015. Archived from the original on 22 November 2015. https://web.archive.org/web/20151122165615/https://torrentfreak.com/sci-hub-and-libgen-resurface-after-being-shut-down-151121/ . Retrieved 16 January 2016 .
↑ "Pirate Bay is Back to Square One After Months of Domain Hopping" . TorrentFreak . 31 December 2015. https://torrentfreak.com/pirate-bay-is-back-to-square-one-after-months-of-domain-hopping-151231/ . Retrieved 16 January 2016 . "The TOR/Onion address uj3wazyk5u4hnvtk.onion should also be fine longer term but it’s hardly the most memorable set of digits for anyone to recall."
↑ Facebook (2014, October 31). Facebook Protect the Graph blog . Retrieved 31 October 2014
↑ Strongbox . The New Yorker . Retrieved 15 November 2013.
↑ Biryukov, Alex; Pustogarov, Ivan; & Weinmann, Ralf-Philipp. (2013). Content and popularity analysis of Tor hidden services . ArXiv.org (Cornell University Library). Retrieved 15 November 2013.
↑ Davidson, Amy. (2013, May 15). Introducing Strongbox . The New Yorker . Retrieved 26 December 2013.
External links
People Technologies Software Related topics