Encrypted Email
Privacy-focused email services with .onion access points allow anonymous communication without clearnet exposure. Unlike standard email providers, these services are designed to minimize metadata leakage, resist surveillance, and operate without requiring personally identifiable information.
ProtonMail (Proton)
Swiss-based end-to-end encrypted email operated under Swiss privacy law. Supports PGP key import/export for interoperability with external contacts. The dedicated .onion address eliminates exit-node exposure and MITM risks when accessing your inbox over Tor. Also provides Proton Calendar, Proton Drive, and Proton VPN through the same hidden service.
Proton — Tor Hidden Service
Tutanota (Tuta)
German provider with end-to-end encryption and minimal metadata retention. Calendar and contacts are also encrypted. Uses its own AES/RSA-based encryption protocol (not PGP-compatible). No .onion hidden service currently available — access via Tor Browser with clearnet address. Zero-knowledge architecture ensures Tuta cannot read your email content.
Access: tuta.com — accessible via Tor Browser (no dedicated .onion)
Elude
Tor-native email service that requires no clearnet registration, no phone number, and no personal information. Designed specifically for dark web users who need disposable or long-term anonymous email accounts. Supports SMTP/IMAP for use with third-party clients over Tor.
Elude — Tor Hidden Service
Secure Messaging
Encrypted messengers designed for anonymity. These alternatives to Signal and Telegram prioritize metadata protection and do not require phone numbers or personal identifiers. For a deeper guide on choosing the right tool, see our Privacy Tools Reference.
Session
Decentralized messenger built on the Oxen (formerly Loki) network with onion routing. No phone number, no email, no metadata collection. Messages are routed through a decentralized node network architecturally similar to Tor. Open-source, audited, and funded through the OPTF (Oxen Privacy Tech Foundation). Supports group chats, voice messages, and file attachments.
Access: getsession.org — desktop/mobile clients available, all traffic routed through onion network
XMPP + OMEMO
Federated messaging protocol with forward-secrecy encryption via the OMEMO extension (based on the Signal protocol's Double Ratchet). Run your own XMPP server or use Tor-accessible public servers. Considered the gold standard for darknet communication when configured correctly. Compatible clients include Conversations (Android), Dino (Linux), and Gajim (Windows/Linux).
Recommended Tor-accessible XMPP servers are listed and discussed on Dread's privacy community.
Briar
Peer-to-peer messenger that routes all traffic through Tor by default. No central server — messages sync directly between devices via Tor hidden services. Designed for activists, journalists, and anyone operating under hostile network conditions. Can also sync via Wi-Fi/Bluetooth when internet is unavailable. Open-source and audited by Cure53.
Access: briarproject.org — Android-only currently (desktop in beta)
SecureDrop Instances
SecureDrop is an open-source whistleblower submission system maintained by the Freedom of the Press Foundation. It allows anonymous submission of documents and tips to news organizations through Tor hidden services, ensuring source protection through technical architecture — not journalistic promises. The system generates a unique codename for each source, which serves as the only authentication mechanism.
All addresses below are verified against the official SecureDrop Directory.
The New York Times
NYT SecureDrop
The Washington Post
WaPo SecureDrop
The Guardian
Guardian SecureDrop
Additional SecureDrop instances are maintained by ProPublica, The Intercept, CBC, and dozens of regional outlets. The full directory is available at securedrop.org/directory.
Search Engines
Conventional search engines cannot index .onion addresses. These Tor-compatible search engines crawl hidden services and provide searchable indexes for darknet discovery. Always treat search results with caution — these engines index content indiscriminately, and results may include phishing sites or honeypots.
Ahmia
The most reputable Tor search engine. Indexes .onion sites while actively filtering abusive and illegal content. Open-source, operated by Finnish security researcher Juha Nurmi, and partially funded by the Tor Project. Ahmia's filtering makes it the safest starting point for .onion discovery.
Ahmia — Tor Search
Torch
One of the oldest and largest Tor search engines, operational since 2013. Indexes millions of .onion pages with minimal content filtering. Broader in scope than Ahmia but includes unvetted results — exercise caution with every link.
Torch — Tor Search
DuckDuckGo
Privacy-focused clearnet search engine with a dedicated .onion service. Does not index .onion sites directly — use it for private access to clearnet search results over Tor, avoiding exit-node interception. No search history tracking, no ad profiling.
DuckDuckGo — Tor Service
File Hosting & Pastebin
Anonymous file sharing and text hosting services for users who need to transmit data without identity exposure. Essential for document leaks, code sharing, and secure collaboration.
OnionShare
Open-source tool that creates temporary Tor hidden services for direct file sharing. Files are served from your machine through an auto-generated .onion address — no third-party server ever touches your data. Supports file sending, file receiving, website hosting, and anonymous chat rooms. Developed by Micah Lee (co-founder of The Intercept's security team).
Access: onionshare.org — download the desktop client (Windows/macOS/Linux)
PrivateBin
Zero-knowledge pastebin where the server has no access to pasted content. All encryption and decryption happens in your browser using AES-256-GCM. Self-hostable, open-source, and available through several Tor-accessible community instances. Supports expiration timers, burn-after-reading, and password protection.
Directories & Link Verification
Independent link directories verify and catalog .onion addresses, providing a critical safety layer against phishing. Always cross-reference links from at least two independent sources before use.
Dark.fail
The most trusted independent link verification service for darknet markets and services. Monitors market uptime, verifies .onion addresses against PGP-signed canaries, and provides real-time status updates. No JavaScript required — works in the safest Tor Browser configuration.
Access: dark.fail
Daunt.link
Community-maintained darknet directory with verified .onion links for markets, forums, and services. Provides uptime monitoring and phishing alerts. Maintained by a well-established Dread contributor.
Access: daunt.link
TorWiki (this site)
You are currently using TorWiki — an editorially maintained directory with independent reviews, verified links, and weekly uptime checks. See our full market directory for 13 verified market listings.
Operating Systems & Security Tools
For maximum anonymity, dedicated privacy-focused operating systems provide hardware-level isolation that browser-based tools cannot achieve. For a complete setup walkthrough, see our darknet access guide and OPSEC Fundamentals.
Tails OS
Amnesic live operating system that boots from USB drive and leaves zero forensic traces on the host machine. All network traffic is routed through Tor by default. Includes built-in email client, KeePassXC for password management, and OnionShare for file transfer. The operating system recommended by Edward Snowden and used by journalists worldwide.
Download: tails.net — verify ISO signatures before booting
Whonix
Desktop operating system designed for advanced security and privacy. Runs inside a virtual machine with a security-hardened gateway that forces all connections through Tor. Even if the workstation VM is compromised, your real IP address cannot leak. Supports persistent storage and unlimited session duration — unlike Tails.
Download: whonix.org — available for VirtualBox, KVM, and Qubes
Qubes OS
Security-oriented operating system built on Xen hypervisor that isolates each activity in its own virtual machine. Combine with Whonix for the most secure Tor configuration available: each VM is compartmentalized so that a compromise in one cannot affect others. Used by advanced security researchers and high-risk journalists.
Download: qubes-os.org — requires dedicated hardware (no VMs)
Verification Warning: Always verify service links through multiple independent sources. Phishing clones exist for every popular service listed above. Cross-reference .onion addresses with PGP-signed announcements on Dread and the official SecureDrop directory. For anti-phishing techniques, see our Anti-Phishing Detection guide.
Explore By Category
Deep-dive into each services category with dedicated directory pages featuring additional providers, comparison tables, and detailed reviews:
Anonymous Email & Messaging
ProtonMail, DNMX, TorBox, Mail2Tor, Session, Briar, XMPP + OMEMO. Full comparison table.
Privacy Tools & Security Services
Mullvad VPN, AirVPN, PGP key servers, Njalla hosting, OnionShare, KYCnot.me, and more.
Whistleblowing & SecureDrop
SecureDrop instances: NYT, WaPo, Guardian, ProPublica, The Intercept. OPSEC for sources.