Today, were announcing .onion addresses for eff.org and
two of its affiliated projects: Certbot, an EFF-developed tool for
automatically obtaining and renewing TLS certificates for websites,
and Surveillance Self-Defense, which provides resources and
guidance for individuals and organizations to protect themselves
from surveillance and other security threats.
We have been made aware of events that indicate
censorship could be
occurring on some of our resources. By accessing
these websites through their Tor .onion addresses, users can
further protect their privacy and security while using another
avenue to access important information.
A Tor onion address is a unique identifier for a hidden
service hosted on the Tor network. It is a random string of letters
and numbers followed by the ".onion" top-level domain. Unlike
traditional websites, which have a public IP address that can be
used to locate the server hosting the website, Tor hidden services
have a unique address on the Tor network that provides end-to-end
encryption and anonymity. Tor routes the connection through several
relays, which can be run by different individuals or organizations
all over the world. The final exit relay would connect to eff.org
normally. The ISP can see that
youre using Tor, but cannot easily see what site you are
visiting.
Tor onions are useful for hosting a copy of your website
within the Tor network without the need to leave via an exit relay,
providing an extra layer of protection and obscurity.
EFF has long partnered with Tor and supported the project.
So we are glad to have our own resources hosted on the Tor network
for those out there in parts of the world where internet
surveillance is heightened or modified due to oppressive regimes
and laws.
eff.org
iykpqm7jiradoeezzkhj7c4b33g4hbgfwelht2evxxeicbpjy44c7ead.onion
certbot.eff.org
5yl6j7al5iwjn3kltayvumj5d25agnq4t6rznkvphossoqyzb3batwid.onion
ssd.eff.org
y7yea4pmqqtznb33qiugvysyn2bob5v62e4pvoadoibrwkq3tsddjeyd.onion