Adresse Onion
Instead, your connection first bounces between three Tor nodes and then finally exits the Tor network and goes to the website. Even Tor itself won’t know what you’re up to. Now, there’s a new way for readers of The Intercept to browse this website more securely and anonymously over the Tor network. Tor, the decentralized anonymity network, has been an integral part of our workflows at The Intercept since we launched in 2013. This helps automate alerting, enrich existing intelligence, and reduce the manual effort involved in tracking threat actors.
The term adresse onion refers to a cryptographic string used to locate hidden services on the Tor network. Unlike standard internet domains, an adresse onion is not resolved through traditional DNS servers. Instead, it relies on the Tor network's distributed hash table, ensuring both the host server and the visitor remain anonymous. These addresses typically end with the suffix .onion, distinguishing them from conventional clearnet domains.
How an Adresse Onion Works
When a user enters an adresse onion into the Tor Browser, the request is routed through a series of encrypted relay nodes. The hidden service behind that address generates a public-private key pair, with the adresse onion derived from the public key. This process eliminates the need for a central authority, making decentralization a core feature. The adresse onion itself is a 56-character base32 string (plus the .onion suffix) for version 3 services, offering stronger cryptographic security than earlier versions.

Common Uses of Adresse Onion
Journalists and activists frequently employ an adresse onion to host whistleblowing platforms or communication tools. For example, ProtonMail and SecureDrop maintain official .onion addresses to bypass censorship. Darknet markets also rely on adresse onion for anonymous trading, though this often draws legal scrutiny. Additionally, some privacy-focused websites mirror their clearnet content via an adresse onion to protect visitor metadata.
- The disadvantage is that they are often slower to innovate, and the security may be worse than with the centralized network.
- Even Tor itself won’t know what you’re up to.
- Riseup provides email and chat services that keep no record of your online activity.
- Also that figure is somewhat misleading, as it’s most likely under represented given all the users constantly testing and inflating en-US
Security Considerations

While an adresse onion provides strong anonymity, it is not immune to risks. Phishing attacks leverage fake .onion URLs to steal credentials, so users must verify the adresse onion through trusted sources. Furthermore, malicious exit nodes can attempt to deanonymize traffic if the chaining of relays is improperly configured. Always ensure the Tor Browser and its adresse onion software are up-to-date to mitigate known vulnerabilities.
Finding Legitimate Adresse Onion Links
Reliable directories like the Hidden Wiki or curated lists from privacy advocates can help locate genuine adresse onion resources. However, these sources may contain broken or malicious links. A better approach is to follow official .onion URLs shared by reputable organizations via their clearnet websites. For maximum safety, bookmark only verified adresse onion addresses after cross-referencing them with multiple independent sources.

