Version 222 (modified by 2 months ago) (diff) | ,
---|
We Support Tor
This is a list of clearnet services whose policy supports access to their services via the Tor network, and/or they support the Tor network itself. It is the opposite of the DontBlockMe project.
Tor users may wish to use, purchase from, support, and/or promote these services.
List Of Services Supporting Tor
Services should be listed only if they meet one or more of these support levels:
- Defacto Support
- Class A – They multihome one or more of their clearnet services on a .onion address. In other words, the onion service is a second address to exactly the same clearnet service; it is not a copy or mirror.
- Class B – They run one or more exit nodes, at least one of which must allow use of their services.
- Explicit Support – They display a written policy permitting "Tor" specifically by name.
- Implicit Support – They display a written policy permitting proxies, VPN's, open/free/wifi networks, travelers, etc. However, this case must be tested with Tor before being listed.
- Relay Support – They run one or more nodes (possibly of various types), none of which meet Defacto Class B spec.
Services meeting more than one level should be listed in the first level they meet above (as read from the top down), therein it should contain links to any other proofs it has of activities in other applicable levels.
This list, though it does comprise "services", is intended to be a "showcase of categorized entities" not a "service list" (the full list of their provided services are readable at the entity itself). However, each listing may contain a brief text list of nonweb services offered such as "IRC, BTC, IMAP..." as a hint where not otherwise clear.
Links to "Proof of (Onion / Relay / Policy)" statements MUST be included for each listing. Furthermore, links to "Proof of (Onion / Relay)" statements MUST originate on the clearnet HTTPS site (domain name root of authority) of the entity itself (not on secondary sites such as Twitter or Facebook) and MUST include the cryptographic identifiers of those nodes. A proof located on an .onion service is not considered a proof as it has no authentication and may be fake. A clearnet HTTP website is not acceptable. Proof MUST be accessed over an authenticated channel like HTTPS with a modern cypher suite because adversaries can rewrite the links to .onion services written in not-encrypted HTTP traffic with an impostor onion service in order to do a Man In The Middle (MITM) attack. All listings without such proof (and origination in the case of nodes) will be removed. Contact the entity, and encourage them to publish proper authoritative proofs.
Onion services that are not multihomed or managed by a clearnet service do not belong on this page because they are exclusively inside the Tor network and have no built-in means of authenticating themselves.
The list is sorted within each level by entity name. The "Defacto Class A" level will contain many items and may thus be broken out into the same service "Categories" as the ListOfServicesBlockingTor.
The List
Defacto Support
Class A - Onions
Other lists:
- Discontinued on Oct 7, 2015.
Darkweb-Everywhere maintains an extensive list of Rules, and Proofs for Tor's Onions (and Rules and Proofs for I2P's Eepsites). - Healthy Onions Firefox add-on will redirect to onion website if available.
- You can help anonymously by updating the rulesets.
Our list:
- If you're going to add yours, remember to add proof.
- One owner (person/company) can add only one.
- Don't add yours to the top. This list is sorted alphabetically.
- If the proof is the same as the clearnet URL, just write "Clearnet".
- This wiki can be edited by anyone. The list is here just to inform you what service is good and what else is bad. Check proof of URLs by yourself.
You can add a maximum of five links per edit submission. More than that, and Trac will complain, "Maximum number of external links per post exceeded." Sometimes, Trac will accept the edit if you enter the Captcha. See ticket #24191.
Class B – Exits (Open or Enclave)
- Access Now – Proof
- Digital Defenders Partnership – Proof
- Digitalcourage – Proof
- Digitale Gesellschaft – (English: Digital Society) Proof
- Föreningen för Digitala Fri- och Rättighete (DFRI) – (English: Association for Digital Freedoms and Rights) Proof
- Frënn vun der Ënn – (English: Friends of the Onion) Proof
- Hart voor Internetvrijheid – (English: Heart for Internet Freedom) Proof
- ibiblio – Proof
- Johannes Kepler University, Institute of Networks and Security – Proof
- Kilton Public Library – Proof
- https://mailbox.org/ – Proof 1, Relay Search Warning: They recommend that you edit your
torrc
configuration file. However, if you edit thetorrc
file in Tor Browser Bundle, your edits may be overwritten later by an automatic update. Furthermore, it is uncertain that theMapAddress
option will preserve the default level of anonymity of Tor Browser Bundle. See the tor manual. - Nos oignons – (English: Our onions) Proof: Clearnet
- Open Internet – Proof: Clearnet
- Reporters Without Borders – Proof
- Torservers.net – Proof: Clearnet
- University of Warwick, Centre for Scientific Computing – Proof
- Wau Holland Stiftung – (English: Wau Holland Foundation) Proof 1 and Proof 2
Explicit Support
- https://antipolygraph.org/ – Recommends Tor Browser Bundle (TBB) or Tails for the site. Proof
- https://bitcoin.org/ – The official Bitcoin client has support for onion services, SOCKS5 proxies, and split-horizon. Proof
- http://www.bsdstats.org/ - The BSDstats client supports submission via Tor. Proof Warning: The package and script on bsdstats.org are not hosted via HTTPS nor are cryptographically signed, but the SVN repository proof is hosted on HTTPS.
- https://sks-keyservers.net/ – "An experimental Tor OnionBalance hidden service is running as hkp://jirk5u4osbsr34t5.onion (and http://jirk5u4osbsr34t5.onion) consisting of the servers marked with Tor support in the status list as backend." Proof Warning: The federated SKS PGP keyservers marked with Tor support do not list their direct onion service addresses. The sks-keyservers.net onion service is positioned as a Man In The Middle (MITM), a potential eavesdropper, and displaying one chosen by OnionBalance.
SecureDrop
Implicit Support
- None at the moment
Relay Support – Nodes (Other types and rare !Enclave Exits)
- None at the moment
IRC networks
For IRC Networks supporting Tor, including the ones having an onion service, see doc/BlockingIrc