List of Tor hidden services

This is an alphabetized list of notable .onion hidden services accessible through the Tor anonymity network. Most are considered dark web services. Defunct services are marked.

Hidden services by category

Art

Commerce

See also: Darknet market

Communications

Free software projects

Culture

File storage

Financial

Hidden services directories, portals, and information

News, whistleblowing and archives of document archives

Nonprofit organizations

Pornography

Search engines

Social media and forums

See also

References

  1. The New York Times (24 June 2016). "Illuminating the 'Dark' Web and Content Monitoring". Retrieved 15 September 2016.
  2. DeepDotWeb (2 August 2015). "Italian police Bust "Babylon" Dark Web Market". Retrieved 8 August 2015.
  3. Peters, Sara (23 June 2015). "Child Exploitation & Assassins For Hire On The Deep Web". Retrieved 4 August 2015.
  4. Daily Mail Reporter (11 October 2013). "The disturbing world of the Deep Web, where contract killers and drug dealers ply their trade on the internet". Retrieved 25 May 2015.
  5. Lake, Eli (17 October 2013). "Hitman Network Says It Accepts Bitcoins to Murder for Hire". Retrieved 9 August 2015.
  6. https://mobile.twitter.com/cryptocatapp/status/402885544247840769
  7. Hacker10 (1 October 2013). "Lelantos, a secure, anonymous email provider through Tor". Retrieved 7 August 2015.
  8. Stone, Jeff (2 July 2015). "Dark Net Browser Operator Discovers 255 Faked Sites, Leaving Countless Passwords Vulnerable". Retrieved 7 August 2015.
  9. https://www.mailpile.is/
  10. "Riseup's Tor Hidden Services". https://riseup.net/en/tor: Riseup Networks. Retrieved 2 November 2016.
  11. The Debian Project (30 July 2016). "DSA announces Debian static websites are now available as Onion services.". twitter.com. Software in the Public Interest. Retrieved 31 July 2016. DSA announces Debian static websites are now available as Onion services. The list of services may be found on https://onion.debian.org .
  12. "onion.debian.org". Debian Project, Software in the Public Interest. 30 July 2016. Retrieved 31 July 2016.
  13. Richard Hartmann (25 August 2015). "Tor-enabled Debian mirror". richardhartmann.de. Archived from the original on 16 April 2016.
  14. "Verification Assets §Whonix Sites". whonix.org. Archived from the original on 12 June 2016. Retrieved 12 June 2016.
  15. "Datenschutz §Technical Information". whonix.org. Archived from the original on 12 June 2016. Retrieved 12 June 2016.
  16. Ciancaglini, V.; Balduzzi, M.; McArdle, R.; M., Rösler (2015). "Below the Surface: Exploring the Deep Web" (PDF). TrendLabs Research Paper: 8.
  17. Dingledine, R.; Mathewson, N.; Syverson, P. (2007). "Deploying Low-Latency Anonymity: Design Challenges and Social Factors" (PDF). IEEE Security & Privacy. 5 (5): 83–87. doi:10.1109/MSP.2007.108.
  18. Jordan, Tim (2008). "The Politics of Technology: Three Types of 'Hacktivism'". In Häyhtiö, Tapio; Rinne, Jarmo. Net Working/Networking: Citizen Initiated Internet Politics. University of Tampere. p. 267. ISBN 9789514474644.
  19. Oram, Andy (2001). Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O'Reilly Media.
  20. Howell O'Neill, Patrick (4 August 2013). "An in-depth guide to Freedom Hosting, the engine of the Dark Net". Retrieved 30 May 2015.
  21. Gallagher, Sean (4 August 2013). "Alleged Tor hidden service operator busted for child porn distribution". Retrieved 30 May 2015.
  22. Ernesto (7 June 2016). "KickassTorrents Enters The Dark Web, Adds Official Tor Address". Retrieved 5 July 2016.
  23. Ernesto (7 January 2016). "The Pirate Bay Switches on New .MS Domain". Retrieved 5 July 2016.
  24. White, Mike. "Deep Web Bitcoin Mixer's Recent Hack Restarted The Debate Of Darkcoin Vs Trusted Mixers and Trusted Mixers Won". Retrieved 8 August 2015.
  25. Greenberg, Andy (11 July 2014). "Waiting for Dark: Inside Two Anarchists' Quest for Untraceable Money". Retrieved 8 August 2015.
  26. Cox, Joseph (26 February 2015). "Is the Islamic State Using Bitcoin? That's the Last Thing We Should Worry About". Retrieved 11 August 2015.
  27. Cubrilovic, Nik (17 November 2014). "FBI seizes fake Tor hosted Jihad funding website as part of Operation Onymous, leaves up real site.". Retrieved 11 August 2015.
  28. Stokes, Natasha (19 November 2014). "The Deep Web: Surfing the Dark Side". Retrieved 6 August 2015.
  29. S. Zavia, Matías (12 February 2015). "Kit de supervivencia en la "deep web"". Retrieved 6 August 2015.
  30. Chacos, Brad (12 August 2013). "Meet Darknet, the hidden, anonymous underbelly of the searchable Web". Retrieved 6 August 2015.
  31. Poladian, Charles (26 November 2014). "Tour The Deep Web: Illegal Marketplaces, Book Clubs And Everything In Between". Retrieved 6 August 2015.
  32. "Telnet gateway". meta.wikimedia.org. Wikimedia Foundation. 1 April 2016. Archived from the original on 1 April 2016. Retrieved 12 June 2016. lgcjxm7fttkqi2zl.onion
  33. Tor Project (20 Jan 2016). "Our friends La Quadrature Du Net now provide a #Tor onion service! lqdnwwwmaouokzmg.onion". twitter.com. Retrieved 21 January 2016.
  34. http://telecomix.org/
  35. Cox, Joseph (11 November 2014). "As the FBI Cleans the Dark Net, Sites Far More Evil Than Silk Road Live On". Retrieved 3 August 2015.
  36. Markowitz, Eric (10 July 2014). "The Dark Net: A Safe Haven for Revenge Porn?". Retrieved 3 August 2015.
  37. Gilbert, David (10 November 2014). "Pink Meth Revenge Porn Darknet Website Shut Down by FBI in Operation Onymous". Retrieved 4 August 2015.
  38. Cox, Joseph (29 June 2015). "Revenge Porn Returns to the Dark Web". Retrieved 3 August 2015.
  39. Cox, Joseph (14 October 2015). "Someone Is Trying to Bring Back the Most Infamous Dark Web Revenge Porn Site". Retrieved 14 October 2015.
  40. https://btdigg.org/
  41. Paganini, Pierluigi (23 February 2015). "Onion.City: Access the Deep Web From A Browser". Retrieved 15 October 2015.
  42. Stockley, Mark (18 February 2015). "Onion.city – a search engine bringing the Dark Web into the light". Retrieved 15 October 2015.
  43. Van der Sar, Ernesto (21 November 2015). "Sci-Hub, BookFi and LibGen Resurface After Being Shut Down". TorrentFreak. Archived from the original on 22 November 2015. Retrieved 16 January 2016.
  44. Andy (31 December 2015). "Pirate Bay is Back to Square One After Months of Domain Hopping". TorrentFreak. Retrieved 16 January 2016. The TOR/Onion address uj3wazyk5u4hnvtk.onion should also be fine longer term but it’s hardly the most memorable set of digits for anyone to recall.
  45. Alex (7 August 2015). "Mass 'Dark Web' Scanning With PunkSPIDER". Retrieved 8 August 2015.
  46. Koetsier, John (10 October 2013). "TorSearch launches to be the Google of the hidden Internet". Retrieved 8 August 2015.
  47. Couts, Andrew (11 October 2013). "TorSearch makes finding the next Silk Road a lot easier". Digital Trends. Retrieved 8 August 2015.
  48. Cox, Joseph (25 February 2015). "What Firewall? China's Fledgling Deep Web Community". Retrieved 3 August 2015.
  49. Cox, Joseph (18 May 2015). "The Chinese Deep Web Takes a Darker Turn". Retrieved 3 August 2015.
  50. Facebook (2014, October 31). Facebook Protect the Graph blog. Retrieved 31 October 2014
  51. Kamath, Maya (22 July 2015). "HELL hacking forum on Dark Web just went to hell". Retrieved 6 August 2015.
  52. Stone, Jeff (6 August 2015). "Dark Net Hacking Forum 'Hell' Returns Months After Adult Friend Finder Breach". Retrieved 6 August 2015.
  53. Franceschi-Bicchierai, Lorenzo (4 January 2016). "The Dark Web Hacking Forum 'Hell' Is Back Online". Retrieved 10 January 2016.
  54. Sharma, Rakesh (14 April 2015). "What is the Deep Web and How Does It Work?". Retrieved 29 August 2015.
  55. Strongbox. The New Yorker. Retrieved 15 November 2013.
  56. Biryukov, Alex; Pustogarov, Ivan; & Weinmann, Ralf-Philipp. (2013). Content and popularity analysis of Tor hidden services. ArXiv.org (Cornell University Library). Retrieved 15 November 2013.
  57. Davidson, Amy. (2013, May 15). Introducing Strongbox. The New Yorker. Retrieved 26 December 2013.
This article is issued from Wikipedia - version of the 12/3/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.