قالب وردپرس درنا توس
Home / Tips and Tricks / The Top 80+ Sites Available on the Tor Network «Zero Bytes :: WonderHowTo

The Top 80+ Sites Available on the Tor Network «Zero Bytes :: WonderHowTo



There are nearly 100,000 unique Onion service addresses online with more than two million people using Tor every day. Join me as I explore a small fraction of what the Tor network has to offer.

It is puzzling to imagine over 100,000 existing onion sites. Readers using Tor on a daily basis may think this number is inaccurate or exaggerated, but it is important to know that the Tor network is not just HTTP web servers.

There are tens of thousands of SSH, FTP, SMTP, Bitcoin, XMPP, Ricochet and IRC servers with onions for anonymity or convenience. Most of these servers are password protected or not publicly accessible and therefore not accessible to all.

We also need to consider the estimated two million users who access Tor every day. If only five percent of Tor users have created a .onion service in the last 24 hours, that's more than 1

00,000 Unique Onion addresses. Suddenly 100,000 services no longer seem unrealistic.

Who uses Tor?

Tor was supported by [EFFTheGuardianForbesundGizmodoand Null Byte often encourages browsing or hosting. The misconception that Tor is used only by criminals is completely wrong. Who are these two million users who access the Tor network daily? After gate:

  • Normal people . The two most common reasons why ordinary people use Tor are censorship and mass surveillance. World news, culture, health issues, religions and other types of information can be blocked behind a national firewall that Tor can break through. In addition, Internet Service Providers (ISPs) sell our browsing records to marketers or anyone willing to pay for them, and Tor can help prevent that.
  • Journalists and their audience . "Tor is part of SecureDrop, an open source whistleblower submission system that enables media organizations to securely accept and communicate with documents from anonymous sources, and many reputable news organizations use SecureDrop."
  • Law Enforcement Officials . Tor allows lawyers to conduct "covert" operations online to catch drug traffickers, hackers and criminals. It also allows for more anonymous evidence of criminal activity.
  • activists and informers . "Human rights defenders use Tor to anonymously report abuses from danger zones At the international level, workers' rights use Tor and other forms of online and offline anonymity to organize workers in accordance with the Universal Declaration of Human Rights, even though they are within the law, That does not mean they're safe, Tor offers the opportunity to avoid persecution while still raising a voice. "

I'll talk about a handful of .onion web servers that are publicly available. Some of the featured sites are also available as normal (Clearnet) sites and accessible without the Tor network. My goal in compiling this list was not to search the darknet for the strangest, scariest, and unusual websites online, but to find the most useful and practical points that users can actually use daily. Improve their anonymity in this age of mass surveillance [19659002] Disclaimer: None of the sites mentioned in this article has been verified as legitimate. Users should exercise caution when viewing any website or downloading anything on the Internet. In addition, these are not recommendations for a particular .onion website or service. All websites were discovered via the open internet and various .onion directories.

1. Tor Network Search Engines (6)

There are many search engines that allow users to search for content on the Tor network. Similar to Google, these search engines index other .onion sites and add them to a private database.

2. Internet Search Engines (3)

By collecting and collecting user data from Google using the various tools (Google Analytics, Google Fonts, etc.), they can track a user's route over the Internet by providing IP addresses and cookies (cross-domain tracking). However, there are several privacy-aware search engines that allow users to search the Internet anonymously without linking search queries to their Google Account or identity.

Below are some examples of .onion clearnet search engines that allow users to find anonymous resources on the Internet

  • DuckDuckGo : A Google-like Internet search engine dedicated to protecting the privacy of users [19659008] SearX : A highly customizable metasearch engine. This means that dozens of other other search engines are queried simultaneously to get the best possible results. There are over 100 search engines available for Searx, including DuckDuckGo, Bing and StartPage. Best of all, Searx supports operators (also known as "Google Dorks") for advanced search queries.
  • TPB : An index for digital content of software and media. TPB allows visitors to search and download content at no cost.

3. Security and privacy (8)

These resources provide helpful guidance for protection against electronic surveillance. Many of the guides will be useful to people with little technical knowledge, while other resources will target audiences with considerable technical know-how with privacy and security concepts. Some of this information provides useful information to avoid monitoring and improve operational safety ( OPSEC). GnuPG : Also known as GPG, it allows users to cryptographically sign and encrypt data and communications. The GnuPG website has excellent documentation and tutorials

  • OnionShare : An open source tool that allows users to securely and anonymously share a file of any size using the Tor network.
  • OpenPGPKeysever : A PGP key server that allows users to acquire keys anonymously for secure communication as well as download verification
  • Privacy International : A London-based charity that challenges government power by offering itself for strong digital protection and human rights] Security in a box : Provides guidance to assist users in installing and using essential digital security software and services.
  • SKS OpenPGP : Another PGP key server that allows users to acquire anonymous keys for secure communication as well as download verification
  • TorProject : A network of servers run by volunteers and organizations and Help individuals share information anonymously [1 9659008] Whonix : A forum where users can interact with developers and other members of the privacy community through their forum. It also houses a lot of OPSEC guides.
  • 4. Pastabins (6)

    Pastebins are useful for public (or private) sharing of code and data with friends and colleagues. Unlike pastebin.com, most Pastebins found in the Tor network automatically delete the pastes after a few weeks.

    • DeepPaste : A simple pastebin that offers self-destructive pastes and claims never to erase or censor them [19659008] Felixxx : There's little known about Felixxx, but it's another way you can use.
    • Riseup Paste : Pastes are automatically deleted within one week and must not exceed 50 MB.
    • Pasta : An open-source pastebin with a size limit of 10 MB and self-destructive functions
    • Stronghold Paste : Created by Sayak Banerjee, an open-source Pastebin web application and the most popular and most durable .onion pastebins
    • ZeroBin : A minimalist open-source pastebin. Pastes are encrypted on ZeroBin servers so system administrators can not read your content.

    5. News (4)

    Internet access is severely restricted in certain countries, so access to news channels may be extremely difficult for some.

    • Dark Web News : A source for dark web news, anonymous tools, and onion links
    • Deepdotweb : First and foremost, dark web news about arrests of criminals abusing Tor resources.
    • The New York Times : This news page made in October, 2017 headlines announced that nytimes.com would be available as a Toronion service
    • Propublica : A nonprofit and independent collective of journalists representing a number of topics such as technology, government, economics, criminal justice, environment and immigration.

    6. E-Mail (7)

    There are several reasons why users want to retrieve their e-mails via Tor . Forwarding traffic over the Tor network makes it difficult for attackers to discover what you are doing online over Internet connections. Tor also hides your true IP address and the location of the email provider itself.

    • Confidant : An open source, spam-resistant alternative to regular email. E-mail messages are stored encrypted so that Confidant administrators can not access any message content.
    • Daniel Email : A free and anonymous email provider that allows up to 25 MB of email storage on its servers
    • Elude :
    • GuerrillaMail : One free, anti-spam, one-way e-mail address service
    • Mailpile : A modern web client with built-in PGP encryption features that simplify secure e-mail communication
    • ProtonMail : An open source and easy-to-use email client with a modern web interface. All emails between ProtonMail clients are automatically encrypted.
    • Riseup : Riseup is a Seattle-based collective that supports freedom of expression and opposes oppression. Your e-mail service is accessible through the Tor network.

    7. Blogs and Personal Pages (4)

    There are many .onion service developers and enthusiasts who regularly publish their research and discoveries on their personal blogs.

    drksh : A personal hacker blog and git repository.

  • Jamie Scaife : Provides blog posts for the secure use of public Wi-Fi, Web site encryption, .onion services, operating system reviews, and Linux installation guides.
  • Sarah Jamie Lewis : Sarah has contributed to various projects, such as OnionShare (top in Security & Privacy section), Ricochet, and an extensive research program, the Tor Helping developers better understand the Tor network and .onion services.
  • Traudt : A personal blog from the Naval Research Lab researchers, which discusses Tor development and general Internet topics.
  • 8. Libraries (3)

    Most libraries found in the Tor network allow unlimited downloads without restrictions. This can be very liberating for people in many countries. However, it can also be illegal. The following sites list public domain content, unlicensed shared content, Creative Commons content, and other freely available media. However, some of them can be picked up from elsewhere. So be careful and be sure to pay for the items so that the original company or author receives their payday. We do not tolerate piracy.

    • Comic Books : Lists a lot of downloadable comics that have lost their copyright and are publicly available. However, copyrighted material may also be available, so avoid that.
    • Imperial : An open-source, DRM-free repository of e-books with the ability to upload books to the site to collect the collection enlarge. Again, there could be copyrighted material, so watch out.
    • Z-Library : Z-Lib is the self-proclaimed "world's largest e-book library" with over 3.4 million books ready for download. Again, there could be copyrighted material, so watch out.

    9. Social (8)

    Anonymous logon with social networks like Facebook can be extremely difficult. This is primarily the reason why many social Tor network networks are created. With the ability to register anonymously, they allow users to communicate freely.

    10. Hosting (10)

    There is no shortage of hosting services in the Tor network. There are hundreds of websites that host images, notes, files, pastebins, and entire .onion sites.

    Do not miss: How to Host Your Own Gate Hidden Service with a Custom Onion Address [19659099] The Top 80+ Websites Available on the Tor Network ” width=”532″ height=”532″ style=”max-width:532px;height:auto;”/>

    11. Operating Systems (3)

    There are a handful of privacy-oriented operating systems that can be downloaded anonymously

    12. SecureDrops (4)

    SecureDrop is an open source whistleblower reporting system that allows news organizations to securely and anonymously receive documents and tips from sources. It is used in over 50 news organizations worldwide, including The New York Times, The Washington Post, ProPublica, The New Yorker and The Intercept

    • The Guardian : A British newspaper called "Newspaper of the Year" four times the annual British Press Awards, the youngest in 2014 because he was one of the first to report on state surveillance.
    • The Intercept : Launched in 2014, The Intercept initially served as a platform for reports published by Edward Snowden documents. Since then, they have dedicated their efforts to what they call "contradictory journalism."
    • NPR : An American non-profit media organization. NPR serves more than 1,000 public radio stations.
    • VICE : A digital media content and broadcasting company that deals with a variety of topics including politics, entertainment, drugs and technology.

    13. Bitcoin & Mixer (6)

    There is no truly perceptible Bitcoin (BTC) transaction. Blenders are used to blending [BTC] with other people's BTC, with the intention of veiling the trail back to its original source, aka you. When you mix BTC, your money is sent to an anonymous service and they essentially send you the BTC of other people for the same amount. Mixers can help make transactions harder for businesses and government.

    Disclaimer: I would like to remind readers that none of the articles mentioned in this article have been confirmed as legitimate. Beware of "anonymization" of Bitcoin with mixers

    14. Miscellaneous (12)

    TorMetrics is just one of many useful pages provided by TheTorProject, Debian, and Riseup. There are too many categories and obscure websites to handle in this article. Here are a variety of websites that are accessible through Tor that readers can find interesting.

    • CloudFlare : A privacy-aware DNS resolver that promises never to sell or misuse user data.
    • ExpressVPN : A VPN Provider
    • ExoneraTor : A database of IP addresses associated with the Tor network (or have been)
    • Fingerprint Central : A browser Fingerprinting tool to help developers better defend against browser attacks. Anonymization Techniques
    • jRAT : A cross-platform malware. (Currently offline.)
    • Keybase : A public key (GPG) database, private messaging application, and code-sharing (Git) service
    • Njalla : A privacy-protected domain name allows Anonymous registration and purchase of cryptocurrencies
    • Ooni : Anti-censorship and anti-surveillance tool for monitoring and identifying websites blocked worldwide
    • SMSPrivacy : An anonymous SMS service allows users to register and Buying Subscriptions with Bitcoin
    • TorMetrics : An analysis tool for capturing and visualizing Tor network statistics to help developers recognize traffic and patterns in the network.
    • Tor Nyx : A command-line tool that helps individual Tor users to configure and access information about Tor instances on their computers and servers.
    • 0day : An exploit database of exploits for sale that can be purchased with bi tcoin

    15. Onion Directories (6)

    The trick in maintaining a relevant list of active agents is knowing the .onion crawlers and directories. Onion crawlers regularly scan their databases to see which sites are offline. Onions that are offline for a long time are actively removed from the databases and left out of the open directories.

    Below are some directories to keep up with the latest onions.

    Conclusion

    Most onion services disappear within hours of discovery. This is probably the result of random people testing and experimenting with Tor. This is one of the reasons why .onion services are unique and powerful for people who need to share information quickly anonymously. This also makes the service of .onion terrible for anyone looking for reliable, legitimate content. Anyone, anywhere in the world, with an inexpensive Android or Raspberry Pi can anonymously cut their own private corner on the Internet – all without sharing personal information, signing up for a subscription, or paying a penny to third-party providers

    If you have questions or concerns, be sure to leave a comment.

    Do Not Miss: Anonymize Kali with Tor, Whonix & PIA VPN

    Cover Picture by Justin Meyers / Null Byte; Screenshots of Distortion / Null Byte


    Source link