Prior attacks against the Tor network to enumerate onion services allowed attackers to discover private ``.onion`` addresses.
To access an OnionShare service from its address, the private key used for client authentication must be guessed (unless the service is already made public by turning off the private key -- see :ref:`turn_off_private_key`).
**Communicating the OnionShare address and private key might not be secure.**
Communicating the OnionShare address to people is the responsibility of the OnionShare user.
If sent insecurely (such as through an e-mail message monitored by an attacker), an eavesdropper can tell that OnionShare is being used.
Eavesdroppers can access services that are still up by loading their addresses and/or lost key in the Tor Browser.
Avoid this by communicating the address securely, via encrypted text message (probably with disappearing messages enabled), encrypted e-mail, or in person.
This isn't necessary when using OnionShare for something that isn't secret.
**Communicating the OnionShare address and private key might not be anonymous.**
Extra precaution must be taken to ensure the OnionShare address is communicated anonymously.
A new e-mail or chat account, only accessed over Tor, can be used to share the address.