Which mainstream organizations publish official .onion services and how are those addresses verified?

Checked on January 23, 2026
Disclaimer: Factually can make mistakes. Please verify important information or breaking news. Learn more.

Executive summary

A range of mainstream organizations — major newsrooms, large tech platforms, privacy-focused services and some civil-society groups — operate official .onion services to offer censorship-resistant access or secure submission channels, and those addresses are verified through a mix of clearnet publication, cryptographic binding in the onion address itself, SecureDrop directories, curated community lists, and increasingly by traditional TLS certificates issued for v3 onion names (with attendant tradeoffs) [1] [2] [3] [4].

1. Who publishes official .onion services: newsrooms, big tech, and privacy providers

Investigative news organizations such as ProPublica and outlets that use SecureDrop publish official onion endpoints so sources can submit tips and files securely [1] [3]; large consumer platforms including Facebook and formerly Twitter/X have published onion gateways to improve access in censored regions and offer privacy-respecting connections [5] [6]; privacy-first services like ProtonMail and community projects such as Riseup operate onion addresses to protect users’ metadata and bypass local blocks [6] [1]. Community-maintained indexes and GitHub collections track many “mainstream” onion deployments to map where substantial commercial or social-good organizations provide a Tor entry point [7] [8].

2. The technical guarantee baked into an onion address

An onion v3 address is cryptographically derived from the service’s public key, so the string itself encodes a binding to a specific key pair; a Tor client retrieving an onion service descriptor verifies the descriptor signature against the public key encoded in the address, meaning successful connection implies the service controls the corresponding private key and cannot be trivially spoofed [2] [9]. This property gives onion addresses a stronger intrinsic tamper-resistance than ordinary DNS names: if the address matches, the Tor protocol cryptographically links the endpoint to that address [2].

3. Clearnet publication and third‑party directories as practical verification

Organizations commonly publish their official onion addresses on their clearnet websites or official social channels so users can cross-check before connecting; SecureDrop maintains a directory of newsroom endpoints that journalists and sources are instructed to verify against the organization’s public pages [3] [1]. Independent curated lists — such as GitHub repositories that catalog “real-world” onion sites and commercial directories that claim to verify listings — serve as practical, crowd-checked references, though they are third-party and require users to confirm via the organization’s own channels [7] [5] [8].

4. TLS certificates for .onion addresses: convenience with privacy tradeoffs

Certificate Authorities began issuing X.509 certificates that include v3 .onion names after a policy change circa 2020, and providers such as DigiCert have issued EV/TLS certs for onion services; this enables users to click and manually verify an HTTPS certificate for an onion URL as an additional signal of authenticity [4]. However, obtaining traditional certificates can leak onion names into Certificate Transparency logs and other infrastructure, creating a privacy and operational risk; the Tor Project documents both the availability of this option and the concerns, and suggests Tor-specific verification workflows where appropriate [4].

5. Practical verification checklist and limits of public reporting

Authoritative verification therefore combines cryptographic assurance (the onion address encodes the public key), direct publication by the organization on clearnet or official channels (including SecureDrop’s directory for newsroom endpoints), and corroboration via trusted community lists; users are advised to cross-check rather than rely on random indexes [2] [3] [7]. Reporting and directories document many mainstream examples — ProPublica, NYT SecureDrop endpoints, ProtonMail, Facebook, Riseup and others — but public sources vary in completeness and timeliness, and the provided materials do not claim a comprehensive, up-to-the-minute roster of every mainstream publisher of onion services [1] [6] [5].

Want to dive deeper?
How does SecureDrop publish and maintain verified onion addresses for newsrooms?
What are the privacy risks of obtaining a public TLS certificate for an onion v3 address?
Which major tech platforms currently maintain official .onion gateways and where are they documented?