We Support Tor
This is a list of clearnet services whose policy supports access to their services via the Tor network, and/or they support the Tor network itself. It is the opposite of the DontBlockMe project.
Tor users may wish to use, purchase from, support, and/or promote these services.
List Of Services Supporting Tor
Services should be listed only if they meet one or more of these support levels:
- Defacto Support
- Class A – They multi-home one or more of their clearnet services on a .onion address. In other words, the onion service is the second address to exactly the same clearnet service; it is not a copy or mirror.
- Class B – They run one or more exit nodes, at least one of which must allow the use of their services.
- Explicit Support – They display a written policy permitting "Tor" specifically by name.
- Implicit Support – They display a written policy permitting proxies, VPN's, open/free/wifi networks, travelers, etc. However, this case must be tested with Tor before being listed.
- Relay Support – They run one or more nodes (possibly of various types), none of which meet Defacto Class B spec.
Services meeting more than one level should be listed in the first level they meet above (as read from the top down), therein it should contain links to any other proofs it has of activities in other applicable levels.
This list, though it does comprise "services", is intended to be a "showcase of categorized entities" not a "service list" (the full list of their provided services are readable at the entity itself). However, each listing may contain a brief text list of non-web services offered such as "IRC, BTC, IMAP..." as a hint where not otherwise clear.
Links to "Proof of (Onion / Relay / Policy)" statements MUST be included for each listing. Furthermore, links to "Proof of (Onion / Relay)" statements MUST originate on the clearnet HTTPS site (domain name root of authority) of the entity itself (not on secondary sites such as Twitter or Facebook) and MUST include the cryptographic identifiers of those nodes. A proof located on a .onion service is not considered a proof as it has no authentication and may be fake. A clearnet HTTP website is not acceptable. Proof MUST be accessed over an authenticated channel like HTTPS with a modern cipher suite because adversaries can rewrite the links to .onion services written in not-encrypted HTTP traffic with an impostor onion service in order to do a Man In The Middle (MITM) attack. All listings without such proof (and origination in the case of nodes) will be removed. Contact the entity, and encourage them to publish proper authoritative proofs.
Onion services that are not multihomed or managed by a clearnet service do not belong on this page because they are exclusively inside the Tor network and have no built-in means of authenticating themselves.
The list is sorted within each level by entity name. The "Defacto Class A" level will contain many items and may thus be broken out into the same service "Categories" as the ListOfServicesBlockingTor.
The List
Defacto Support
Class A – Onions
Other lists:
-
Darkweb-Everywhere maintains an extensive list of Rules, and Proofs for Tor's Onions (and Rules and Proofs for I2P's Eepsites).Discontinued on Oct 7, 2015. - Searxes will redirect to onion website if available. You can help anonymously by updating their rulesets.
- List of Tor onion services on Wikipedia. Also see the page in other languages.
Our list:
- If you're going to add yours, remember to add proof.
- Don't add yours to the top. This list is sorted alphabetically.
- If the proof is the same as the clearnet URL, just write "Clearnet".
- The list is here just to inform you what service is good and what else is bad. This wiki can be edited by anyone. You should check proof of URLs by yourself.
- You can add a maximum of 3 links per edit submission. More than that and Trac will complain, "Maximum number of external links per post exceeded." Sometimes, Trac will accept the edit if you enter the Captcha. See ticket #24191 (moved).
Class B – Exits (Open or Enclave)
- Access Now – Proof
- Digital Defenders Partnership – Proof
- Digitalcourage – Proof
- Digitale Gesellschaft – (English: Digital Society) Proof
- Föreningen för Digitala Fri- och Rättighete (DFRI) – (English: Association for Digital Freedoms and Rights) Proof
- Frënn vun der Ënn – (English: Friends of the Onion) Proof
- Hart voor Internetvrijheid – (English: Heart for Internet Freedom) Proof
- ibiblio – Proof
- Johannes Kepler University, Institute of Networks and Security – Proof
- Kilton Public Library – Proof
-
https://mailbox.org/ – Proof 1, Relay Search Warning: They recommend that you edit your
torrc
configuration file. However, if you edit thetorrc
file in Tor Browser Bundle, your edits may be overwritten later by an automatic update. Furthermore, it is uncertain that theMapAddress
option will preserve the default level of anonymity of Tor Browser Bundle. See the tor manual. - Nos oignons – (English: Our onions) Proof: Clearnet
- Open Internet – Proof: Clearnet
- Reporters Without Borders – Proof
- Torservers.net – Proof: Clearnet
- Wau Holland Stiftung – (English: Wau Holland Foundation) Proof 1 and Proof 2
Explicit Support
- https://antipolygraph.org/ – Recommends Tor Browser Bundle (TBB) or Tails for the site. Proof
- https://bitcoin.org/ – The official Bitcoin client has support for onion services, SOCKS5 proxies, and split-horizon. Proof
- http://www.bsdstats.org/ – The BSDstats client supports submission via Tor. Proof Warning: The package and script on bsdstats.org are not hosted via HTTPS nor are cryptographically signed, but the SVN repository proof is hosted on HTTPS.
- https://sks-keyservers.net/ – "An experimental Tor OnionBalance onion service is running at hkp://jirk5u4osbsr34t5.onion:11371 (http://jirk5u4osbsr34t5.onion/ and http://jirk5u4osbsr34t5.onion:11371/) consisting of the servers marked with Tor support in the status list as backend." Proof Warning: The federated SKS PGP keyservers marked with Tor support do not list their direct onion service addresses. The sks-keyservers.net onion service is positioned as a Man In The Middle (MITM), a potential eavesdropper, and displaying one chosen by OnionBalance.
SecureDrop
This table was made from the list on the SecureDrop website also accessible by its onion service in the [#SecureDropOnion Class A – Onions] table.
NOTE TO EDITORS:
Make sure that all Clearnet links open in Tor Browser. Make sure that onion services are not down and that they are running a recent version of SecureDrop. Version numbers are here:
https://github.com/freedomofpress/securedrop/releases
Check whether the onion service can be accessed by HTTPS.
GlobaLeaks
This table was made from the list on the GlobaLeaks website. Warning: GlobaLeaks may not load in Tor Browser unless you lower your security level to Standard, increasing the risk that you may be exposed. In contrast, SecureDrop works on any security level.
NOTE TO EDITORS:
Make sure that all Clearnet links open in Tor Browser. Make sure that onion services are not down and that they are running a recent version of GlobaLeaks. Version numbers are here:
https://github.com/globaleaks/GlobaLeaks/releases
Check whether the onion service can be accessed by HTTPS.
Implicit Support
- None at the moment
Relay Support – Nodes (Other types and rare !Enclave Exits)
- None at the moment
IRC networks
For IRC Networks supporting Tor, including ones that have an onion service, see doc/BlockingIrc.