Jump to content

List of Tor onion services

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by MultWiki (talk | contribs) at 04:18, 3 May 2016 (Nonprofit organizations: Fixed typo). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

This is an alphabetized list of notable .onion hidden services accessible through the Tor anonymity network. Most are considered dark web services. Defunct services are marked.

Web-based onion services in January 2015[1]
Category Percentage
Gambling
0.4
Gun
1.4
Chat
2.2
New
(not yet indexed)
2.2
Abuse
2.2
Books
2.5
Directory
2.5
Blog
2.75
Porn
2.75
Hosting
3.5
Hacking
4.25
Search
4.25
Anonymity
4.5
Forum
4.75
Counterfeit
5.2
Whistleblower
5.2
Wiki
5.2
Mail
5.7
Bitcoin
6.2
Fraud
9
Market
9
Drugs
15.4
Web-based onion services in February 2016[2][3]
Category % of total % of active
Violence
0.3
0.6
Arms
0.8
1.5
Illicit Social
1.2
2.4
Hacking
1.8
3.5
Illicit links
2.3
4.3
Illicit pornography
2.3
4.5
Extremism
2.7
5.1
Illicit Other
3.8
7.3
Illicit Finance
6.3
12
Illicit Drugs
8.1
15.5
Non-illicit+Unknown
22.6
43.2
Illicit total
29.7
56.8
Inactive
47.7
Active
52.3

Content

Hidden services by category

Commerce

Communications

Culture

  • Deep Web Radio - Worldwide music radio station.[13]

File storage

  • Free Haven - A distributed anonymous file storage system that places focus on persistent availability of data. The MIT students' work on the project led to collaboration with DARPA to develop Tor.[14][15][16]
  • Freedom Hosting (defunct) - Formerly the largest Tor-specific web host, until the arrest of its owner in August 2013.[17][18]

Financial

Hidden services directories, portals, and information

  • All You're Wiki - a wiki similar to The Hidden Wiki additionally featuring static content[23][24]
  • The Hidden Wiki
  • Tor Links - a static index of .onion links still around from the earlier days of Tor[25][26]

News, whistleblowing and archives of document archives

Nonprofit organizations

Pornography

Search engines

Social media and forums

Other

See also

References

  1. ^ Owen, Gareth. "Dr Gareth Owen: Tor: Hidden Services and Deanonymisation". Retrieved 20 June 2015.
  2. ^ Moore, Daniel. "Cryptopolitik and the Darknet". Survival: Global Politics and Strategy. Retrieved 2016-03-20.
  3. ^ Cox, Joseph (2016-02-01). "Study Claims Dark Web Sites Are Most Commonly Used for Crimes". Retrieved 2016-03-20.
  4. ^ DeepDotWeb (2 August 2015). "Italian police Bust "Babylon" Dark Web Market". Retrieved 8 August 2015.
  5. ^ Peters, Sara (23 June 2015). "Child Exploitation & Assassins For Hire On The Deep Web". Retrieved 4 August 2015.
  6. ^ Daily Mail Reporter (11 October 2013). "The disturbing world of the Deep Web, where contract killers and drug dealers ply their trade on the internet". Retrieved 25 May 2015.
  7. ^ Lake, Eli (17 October 2013). "Hitman Network Says It Accepts Bitcoins to Murder for Hire". Retrieved 9 August 2015.
  8. ^ https://mobile.twitter.com/cryptocatapp/status/402885544247840769
  9. ^ Hacker10 (1 October 2013). "Lelantos, a secure, anonymous email provider through Tor". Retrieved 7 August 2015.{{cite news}}: CS1 maint: numeric names: authors list (link)
  10. ^ Stone, Jeff (2 July 2015). "Dark Net Browser Operator Discovers 255 Faked Sites, Leaving Countless Passwords Vulnerable". Retrieved 7 August 2015.
  11. ^ https://www.mailpile.is/
  12. ^ "GnuPG News for September and October 2015: Tor Support". GnuPG. The GnuPG Project. November 3, 2015. Retrieved January 13, 2016.
  13. ^ Ciancaglini, V.; Balduzzi, M.; McArdle, R.; M., Rösler (2015). "Below the Surface: Exploring the Deep Web" (PDF). TrendLabs Research Paper: 8.
  14. ^ Dingledine, R.; Mathewson, N.; Syverson, P. (2007). "Deploying Low-Latency Anonymity: Design Challenges and Social Factors" (PDF). IEEE Security & Privacy. 5 (5): 83–87. doi:10.1109/MSP.2007.108.
  15. ^ Jordan, Tim (2008). "The Politics of Technology: Three Types of 'Hacktivism'". In Häyhtiö, Tapio; Rinne, Jarmo (eds.). Net Working/Networking: Citizen Initiated Internet Politics. University of Tampere. p. 267. ISBN 9789514474644.
  16. ^ Oram, Andy (2001). Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O'Reilly Media.
  17. ^ Howell O'Neill, Patrick (4 August 2013). "An in-depth guide to Freedom Hosting, the engine of the Dark Net". Retrieved 30 May 2015.
  18. ^ Gallagher, Sean (4 August 2013). "Alleged Tor hidden service operator busted for child porn distribution". Retrieved 30 May 2015.
  19. ^ White, Mike. "Deep Web Bitcoin Mixer's Recent Hack Restarted The Debate Of Darkcoin Vs Trusted Mixers and Trusted Mixers Won". Retrieved 8 August 2015.
  20. ^ Greenberg, Andy (11 July 2014). "Waiting for Dark: Inside Two Anarchists' Quest for Untraceable Money". Retrieved 8 August 2015.
  21. ^ Cox, Joseph (26 February 2015). "Is the Islamic State Using Bitcoin? That's the Last Thing We Should Worry About". Retrieved 11 August 2015.
  22. ^ Cubrilovic, Nik (17 November 2014). "FBI seizes fake Tor hosted Jihad funding website as part of Operation Onymous, leaves up real site". Retrieved 11 August 2015.
  23. ^ Stokes, Natasha (19 November 2014). "The Deep Web: Surfing the Dark Side". Retrieved 6 August 2015.
  24. ^ S. Zavia, Matías (12 February 2015). "Kit de supervivencia en la "deep web"". Retrieved 6 August 2015.
  25. ^ Chacos, Brad (12 August 2013). "Meet Darknet, the hidden, anonymous underbelly of the searchable Web". Retrieved 6 August 2015.
  26. ^ Poladian, Charles (26 November 2014). "Tour The Deep Web: Illegal Marketplaces, Book Clubs And Everything In Between". Retrieved 6 August 2015.
  27. ^ http://richardhartmann.de/blog/posts/2015/08/24-Tor-enabled_Debian_mirror/
  28. ^ Tor Project (20 Jan 2016). "Our friends La Quadrature Du Net now provide a #Tor onion service! lqdnwwwmaouokzmg.onion". twitter.com. Retrieved 21 January 2016.
  29. ^ https://qubes-os.org/
  30. ^ http://telecomix.org/
  31. ^ https://www.whonix.org/wiki/Verification_Assets#Whonix_Sites
  32. ^ https://www.whonix.org/wiki/Datenschutz#Technical_Information
  33. ^ Cox, Joseph (11 November 2014). "As the FBI Cleans the Dark Net, Sites Far More Evil Than Silk Road Live On". Retrieved 3 August 2015.
  34. ^ Markowitz, Eric (10 July 2014). "The Dark Net: A Safe Haven for Revenge Porn?". Retrieved 3 August 2015.
  35. ^ Gilbert, David (10 November 2014). "Pink Meth Revenge Porn Darknet Website Shut Down by FBI in Operation Onymous". Retrieved 4 August 2015.
  36. ^ Cox, Joseph (29 June 2015). "Revenge Porn Returns to the Dark Web". Retrieved 3 August 2015.
  37. ^ Cox, Joseph (14 October 2015). "Someone Is Trying to Bring Back the Most Infamous Dark Web Revenge Porn Site". Retrieved 14 October 2015.
  38. ^ https://btdigg.org/
  39. ^ Paganini, Pierluigi (23 February 2015). "Onion.City: Access the Deep Web From A Browser". Retrieved 15 October 2015.
  40. ^ Stockley, Mark (18 February 2015). "Onion.city - a search engine bringing the Dark Web into the light". Retrieved 15 October 2015.
  41. ^ Van der Sar, Ernesto (21 November 2015). "Sci-Hub, BookFi and LibGen Resurface After Being Shut Down". TorrentFreak. Archived from the original on 22 November 2015. Retrieved 16 January 2016. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  42. ^ Andy (31 December 2015). "Pirate Bay is Back to Square One After Months of Domain Hopping". TorrentFreak. Retrieved 16 January 2016. The TOR/Onion address uj3wazyk5u4hnvtk.onion should also be fine longer term but it's hardly the most memorable set of digits for anyone to recall. {{cite web}}: Italic or bold markup not allowed in: |publisher= (help)
  43. ^ Alex (7 August 2015). "Mass 'Dark Web' Scanning With PunkSPIDER". Retrieved 8 August 2015.
  44. ^ Koetsier, John (10 October 2013). "TorSearch launches to be the Google of the hidden Internet". Retrieved 8 August 2015.
  45. ^ Couts, Andrew (11 October 2013). "TorSearch makes finding the next Silk Road a lot easier". Digital Trends. Retrieved 8 August 2015.
  46. ^ Cox, Joseph (25 February 2015). "What Firewall? China's Fledgling Deep Web Community". Retrieved 3 August 2015.
  47. ^ Cox, Joseph (18 May 2015). "The Chinese Deep Web Takes a Darker Turn". Retrieved 3 August 2015.
  48. ^ Facebook (2014, October 31). Facebook Protect the Graph blog. Retrieved 31 October 2014
  49. ^ Kamath, Maya (22 July 2015). "HELL hacking forum on Dark Web just went to hell". Retrieved 6 August 2015.
  50. ^ Stone, Jeff (6 August 2015). "Dark Net Hacking Forum 'Hell' Returns Months After Adult Friend Finder Breach". Retrieved 6 August 2015.
  51. ^ Franceschi-Bicchierai, Lorenzo (4 January 2016). "The Dark Web Hacking Forum 'Hell' Is Back Online". Retrieved 10 January 2016.
  52. ^ Sharma, Rakesh (14 April 2015). "What is the Deep Web and How Does It Work?". Retrieved 29 August 2015.
  53. ^ Strongbox. The New Yorker. Retrieved 15 November 2013.
  54. ^ Biryukov, Alex; Pustogarov, Ivan; & Weinmann, Ralf-Philipp. (2013). Content and popularity analysis of Tor hidden services. ArXiv.org (Cornell University Library). Retrieved 15 November 2013.
  55. ^ Davidson, Amy. (2013, May 15). Introducing Strongbox. The New Yorker. Retrieved 26 December 2013.