This is a list of substantial, commercial-or-social-good mainstream websites which provide onion services.
Go to file
Bernard Tyers 8baecfeb32 Adding "communities and organisations"
 category
The list is quite rich already, but there are some onion sites, which
don’t fall under the current categories.

I propose a “community and organisation” categories for associations,
organised communities.

I have added a hackerspace in Prague (both their clearweb and .onion
site) to this PR as an example of one such organisation.

I have including first-party "proof" url.
2017-02-01 19:34:21 +00:00
.gitignore commit: ignorefile 2017-01-25 21:52:03 +00:00
README.md Adding "communities and organisations"
 category 2017-02-01 19:34:21 +00:00

Onion Sites That Don't Suck

An index of the non-dark web...

  • updated: 25 jan 2017 (see the change history for specifics)
  • licensed: cc-by-sa
  • author/editor: alec muffett

The Theme

This list is for substantial, commercial-or-social-good mainstream websites with onion presence.

  • no nudity, exploitation, drugs, copyright infringement or sketchy-content sites
  • no sites for tech with less than (arbitrary) 10,000 users
  • no onion-only sites

The editor may choose to annotate or drop any entries as deemed fit.

Formatting / how to submit entries ("pull-requests") are explained in the footer of this page.


Sites & Services

Blockchain.Info

Decoded:Legal

DuckDuckGo

Facebook

Library Freedom Project

Mail2Tor

Privacy International

ProPublica

Protonmail

Riseup

(Riseup keeps a huge number of onion sites and services; see the index)

Surveillance Law / Stanford


SecureDrop Sites for Organisations

Sites that use https://securedrop.org/

See also https://securedrop.org/directory - but this page seeks to be more inclusive.

Aftenposten

Apache

Associated Press

BalkanLeaks

BerlinLeaks

CBC / Canadian Broadcasting Corporation

CPJ / Committee to Protect Journalists

ExposeFacts

Fairfax Media Group (.au; SMH et al.)

Gawker Media

Globe and Mail (.ca; Toronto)

Greenpeace New Zealand

Guardian

Intercept

Lucy Parsons Labs (.us; Chicago)

NEOSleaks

NRKbeta

New Internationalist

New York Times

New Yorker

POGO / Project On Government Oversight

Peerlyst

ProPublica

Radio-Canada

Radio24syv

VG / Verdens Gang

VICE Media

Washington Post


SecureDrop Sites for Individual Journalists

Individual Journalists that use https://securedrop.org/

See also https://securedrop.org/directory

Barton Gellman

Espen Andersen

Kevin Poulsen


GlobalLeaks Sites

TBD


Infrastructure & Software

Cyph

Debian

(Debian keeps a huge number of onion sites; see the index)

ExpressVPN

keybase.io

Mailpile

Qubes OS

Tor Project

(Tor Project keeps a huge number of onion sites, in varying states of stability; see the index)

Whonix


Communities and organisations

Brmlab, Prague Hackerspace


Submission Notes

  • NO MORE THAN 1 SITE PER REQUEST WILL BE ACCEPTED
    • it's easy enough to make multiple requests, and it helps.
    • if you have a huge batch, contact the editor.
  • Check that the site is up and the link works
    • if the onion site is down, the site will not be added / may be removed from the list; no exceptions.
  • HTTP and/or HTTPS only
    • check for SSL availability, upgrade to that if available and add a 🔒 emoji.
  • Structure
    • maintain alphabetical sorting
    • elide leading "The" from sitenames
    • stick to the existing categories
  • Contact the editor for anything more complex than a simple update.

Main Lists

Pull requests for the main list will be accepted only for entries of the form:

## Sitename
* <url of onion> [<lock emoji if https>] [<site notes, four words max>]
...

[(site note in parentheses)]

If there are many onions, submit a few, key, ones, plus an "index" page for the others. The "index" page must be an onion site, and must be followed with a sub-bullet for its cleartext equivalent; see existing examples for precedent.

If the Sitename is an acronym, append / <acronym spelled out>

If the site is locally scoped or an umbrella for several organisations, consider appending (.cc; <notes>) where cc is the ISO 2-letter country code.

Drops & Leaks

Pull requests for the SecureDrop or GlobalLeaks lists will be accepted only for entries of the form:

## Descriptive Publication *or* Journalist Name
* <url of onion> <lock emoji if https>
* <first-party "proof" url citing the above url>

Don't have a GitHub account?

GitHub and the online editor at:

...are certainly the fastest and most effective way to submit a suggestion.

If you lack that, then try @alecmuffett on Twitter.