Home Top Darknet Markets Forums Services Glossary How to Access Darknet OPSEC Guide Anti-Phishing Privacy Tools Market Shutdowns Buyer's Guide About Disclaimer

Directory — Services

Darknet Services

Privacy tools, encrypted communication, secure hosting, and legitimate hidden services accessible via the Tor network.

Encrypted Email

Privacy-focused email services with .onion access points allow anonymous communication without clearnet exposure. Unlike standard email providers, these services are designed to minimize metadata leakage, resist surveillance, and operate without requiring personally identifiable information.

ProtonMail (Proton)

Swiss-based end-to-end encrypted email operated under Swiss privacy law. Supports PGP key import/export for interoperability with external contacts. The dedicated .onion address eliminates exit-node exposure and MITM risks when accessing your inbox over Tor. Also provides Proton Calendar, Proton Drive, and Proton VPN through the same hidden service.

Proton — Tor Hidden Service

01 protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion

Tutanota (Tuta)

German provider with end-to-end encryption and minimal metadata retention. Calendar and contacts are also encrypted. Uses its own AES/RSA-based encryption protocol (not PGP-compatible). No .onion hidden service currently available — access via Tor Browser with clearnet address. Zero-knowledge architecture ensures Tuta cannot read your email content.

Access: tuta.com — accessible via Tor Browser (no dedicated .onion)

Elude

Tor-native email service that requires no clearnet registration, no phone number, and no personal information. Designed specifically for dark web users who need disposable or long-term anonymous email accounts. Supports SMTP/IMAP for use with third-party clients over Tor.

Elude — Tor Hidden Service

01 eludemailxhnqzfmxehy3bk5guyhlxbunfqooop32dlber2ldnlp7yd.onion

Secure Messaging

Encrypted messengers designed for anonymity. These alternatives to Signal and Telegram prioritize metadata protection and do not require phone numbers or personal identifiers. For a deeper guide on choosing the right tool, see our Privacy Tools Reference.

Session

Decentralized messenger built on the Oxen (formerly Loki) network with onion routing. No phone number, no email, no metadata collection. Messages are routed through a decentralized node network architecturally similar to Tor. Open-source, audited, and funded through the OPTF (Oxen Privacy Tech Foundation). Supports group chats, voice messages, and file attachments.

Access: getsession.org — desktop/mobile clients available, all traffic routed through onion network

XMPP + OMEMO

Federated messaging protocol with forward-secrecy encryption via the OMEMO extension (based on the Signal protocol's Double Ratchet). Run your own XMPP server or use Tor-accessible public servers. Considered the gold standard for darknet communication when configured correctly. Compatible clients include Conversations (Android), Dino (Linux), and Gajim (Windows/Linux).

Recommended Tor-accessible XMPP servers are listed and discussed on Dread's privacy community.

Briar

Peer-to-peer messenger that routes all traffic through Tor by default. No central server — messages sync directly between devices via Tor hidden services. Designed for activists, journalists, and anyone operating under hostile network conditions. Can also sync via Wi-Fi/Bluetooth when internet is unavailable. Open-source and audited by Cure53.

Access: briarproject.org — Android-only currently (desktop in beta)

SecureDrop Instances

SecureDrop is an open-source whistleblower submission system maintained by the Freedom of the Press Foundation. It allows anonymous submission of documents and tips to news organizations through Tor hidden services, ensuring source protection through technical architecture — not journalistic promises. The system generates a unique codename for each source, which serves as the only authentication mechanism.

All addresses below are verified against the official SecureDrop Directory.

The New York Times

NYT SecureDrop

01 ej3kv4ebuugcmuwxctx5ic7zxh73rnxt42soi3tdneu2c2em55thufqd.onion

The Washington Post

WaPo SecureDrop

01 vfnmxpa6fo4jdpyq3yneqhglluweax2uclvxkytfpmpkp5rsl75ir5qd.onion

The Guardian

Guardian SecureDrop

01 xp44cagis447k3lpb4wwhcqukix6cgqokbuys24vmxmbzmaq2gjvc2yd.onion

Additional SecureDrop instances are maintained by ProPublica, The Intercept, CBC, and dozens of regional outlets. The full directory is available at securedrop.org/directory.

Search Engines

Conventional search engines cannot index .onion addresses. These Tor-compatible search engines crawl hidden services and provide searchable indexes for darknet discovery. Always treat search results with caution — these engines index content indiscriminately, and results may include phishing sites or honeypots.

Ahmia

The most reputable Tor search engine. Indexes .onion sites while actively filtering abusive and illegal content. Open-source, operated by Finnish security researcher Juha Nurmi, and partially funded by the Tor Project. Ahmia's filtering makes it the safest starting point for .onion discovery.

Ahmia — Tor Search

01 juhanurmihxlp77nkq76byazcldy2hlmovfu2epvl5ankdibsot4csyd.onion

Torch

One of the oldest and largest Tor search engines, operational since 2013. Indexes millions of .onion pages with minimal content filtering. Broader in scope than Ahmia but includes unvetted results — exercise caution with every link.

Torch — Tor Search

01 xmh57jrknzkhv6y3ls3ubitzfqnkrwxhopf5aygthi7d6rplyvk3noyd.onion

DuckDuckGo

Privacy-focused clearnet search engine with a dedicated .onion service. Does not index .onion sites directly — use it for private access to clearnet search results over Tor, avoiding exit-node interception. No search history tracking, no ad profiling.

DuckDuckGo — Tor Service

01 duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion

File Hosting & Pastebin

Anonymous file sharing and text hosting services for users who need to transmit data without identity exposure. Essential for document leaks, code sharing, and secure collaboration.

OnionShare

Open-source tool that creates temporary Tor hidden services for direct file sharing. Files are served from your machine through an auto-generated .onion address — no third-party server ever touches your data. Supports file sending, file receiving, website hosting, and anonymous chat rooms. Developed by Micah Lee (co-founder of The Intercept's security team).

Access: onionshare.org — download the desktop client (Windows/macOS/Linux)

PrivateBin

Zero-knowledge pastebin where the server has no access to pasted content. All encryption and decryption happens in your browser using AES-256-GCM. Self-hostable, open-source, and available through several Tor-accessible community instances. Supports expiration timers, burn-after-reading, and password protection.

Directories & Link Verification

Independent link directories verify and catalog .onion addresses, providing a critical safety layer against phishing. Always cross-reference links from at least two independent sources before use.

Dark.fail

The most trusted independent link verification service for darknet markets and services. Monitors market uptime, verifies .onion addresses against PGP-signed canaries, and provides real-time status updates. No JavaScript required — works in the safest Tor Browser configuration.

Access: dark.fail

Daunt.link

Community-maintained darknet directory with verified .onion links for markets, forums, and services. Provides uptime monitoring and phishing alerts. Maintained by a well-established Dread contributor.

Access: daunt.link

TorWiki (this site)

You are currently using TorWiki — an editorially maintained directory with independent reviews, verified links, and weekly uptime checks. See our full market directory for 13 verified market listings.

Operating Systems & Security Tools

For maximum anonymity, dedicated privacy-focused operating systems provide hardware-level isolation that browser-based tools cannot achieve. For a complete setup walkthrough, see our darknet access guide and OPSEC Fundamentals.

Tails OS

Amnesic live operating system that boots from USB drive and leaves zero forensic traces on the host machine. All network traffic is routed through Tor by default. Includes built-in email client, KeePassXC for password management, and OnionShare for file transfer. The operating system recommended by Edward Snowden and used by journalists worldwide.

Download: tails.net — verify ISO signatures before booting

Whonix

Desktop operating system designed for advanced security and privacy. Runs inside a virtual machine with a security-hardened gateway that forces all connections through Tor. Even if the workstation VM is compromised, your real IP address cannot leak. Supports persistent storage and unlimited session duration — unlike Tails.

Download: whonix.org — available for VirtualBox, KVM, and Qubes

Qubes OS

Security-oriented operating system built on Xen hypervisor that isolates each activity in its own virtual machine. Combine with Whonix for the most secure Tor configuration available: each VM is compartmentalized so that a compromise in one cannot affect others. Used by advanced security researchers and high-risk journalists.

Download: qubes-os.org — requires dedicated hardware (no VMs)

Verification Warning: Always verify service links through multiple independent sources. Phishing clones exist for every popular service listed above. Cross-reference .onion addresses with PGP-signed announcements on Dread and the official SecureDrop directory. For anti-phishing techniques, see our Anti-Phishing Detection guide.

Explore By Category

Deep-dive into each services category with dedicated directory pages featuring additional providers, comparison tables, and detailed reviews: