|Original author(s)||Aaron Swartz, Virgil Griffith|
|Developer(s)||Hermes Center for Transparency and Digital Human Rights|
|Initial release||24 October 2008|
|Stable release||3.1.20 / July 29, 2014|
|Operating system||Linux, Tails OS|
|License||Affero General Public License|
Designed in 2008 by Aaron Swartz and Virgil Griffith, tor2web provides access to Tor hidden services to anyone with an Internet connection and a Web browser. Hidden services are normally only accessible to users running a Tor client.
The software, part of GlobaLeaks Project, is now maintained by the Hermes Center for Transparency and Digital Human Rights.
Tor2web acts like a proxy server between a user and a hidden service. The user simply replaces
.onion in the hidden service URL with
.tor2web.org. Tor2web will fetch the hidden service website and relay it to the user via HTTPS.
The reader's anonymity is not protected by using tor2web, only the publisher's is. A header is added to each web page fetched through tor2web warning the user of this fact and strongly encouraging the Tor Browser Bundle to obtain anonymity.
Like Tor relays, community volunteers can set up tor2web proxies and become part of the tor2web round-robin to help connect the public to Tor hidden services.
- Aaron, Swartz. "In Defense of Anonymity". Retrieved 4 February 2014.
- "New Service Makes Tor Anonymized Content Available to All". wired.com. Retrieved 22 February 2014.
- "tor2web brings anonymous Tor sites to the "regular" web". arstechnica.com. Retrieved 22 February 2014.