Today, we’re announcing .onion addresses for eff.org and two of its affiliated projects: Certbot, an EFF-developed tool for automatically obtaining and renewing TLS certificates for websites, and Surveillance Self-Defense, which provides resources and guidance for individuals and organizations to protect themselves from surveillance and other security threats.
We have been made aware of events that indicate censorship could be occurring on some of our resources. By accessing these websites through their Tor .onion addresses, users can further protect their privacy and security while using another avenue to access important information.
A Tor onion address is a unique identifier for a hidden service hosted on the Tor network. It is a random string of letters and numbers followed by the ".onion" top-level domain. Unlike traditional websites, which have a public IP address that can be used to locate the server hosting the website, Tor hidden services have a unique address on the Tor network that provides end-to-end encryption and anonymity. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” would connect to eff.org normally. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting.
Tor onions are useful for hosting a “copy” of your website within the Tor network without the need to “leave” via an exit relay, providing an extra layer of protection and obscurity.
EFF has long partnered with Tor and supported the project. So we are glad to have our own resources hosted on the Tor network for those out there in parts of the world where internet surveillance is heightened or modified due to oppressive regimes and laws.