Your fact-checks

Your fact-checks will appear here

factually
Support us
  • Home
  • Politics
  • Business
  • Society
  • Technology
  • Health
  • Science
  • Entertainment
Index/Topics/Tor Protocol and Cryptographic Updates

Tor Protocol and Cryptographic Updates

Updates to Tor's protocol and cryptographic algorithms, and their impact on onion service security

Fact-Checks

4 results
Jan 17, 2026
Most Viewed

What legitimate uses of Tor and .onion services exist and how do operators distinguish them from illicit sites?

Tor and .onion services are privacy and anti-censorship technologies used by journalists, activists, whistleblowers, researchers, and ordinary users to host and access services without revealing serve...

Jan 18, 2026
Most Viewed

How do .onion (hidden service) addresses prevent exit-node exposure compared to HTTPS?

.onion addresses (Tor onion services) keep client and server traffic inside the Tor overlay so there is no traditional “exit” hop that can observe plaintext or IP endpoints, unlike standard HTTPS over...

Jan 21, 2026

Does using tor over vpn protect you from malitious exit nodes

Using a VPN before ("") does not reliably protect against malicious — the exit node still handles the final hop to the destination and can read or modify any unencrypted content (so is essential) . In...

Jan 18, 2026

What technical methods have researchers used to deanonymize Tor onion services through traffic correlation?

Researchers have used a range of traffic-correlation techniques to deanonymize Tor onion services, from large-scale passive correlation across ISPs to active, protocol-level manipulations that induce ...

About
Blog
Contact
FAQ
Terms & ConditionsTerms
Privacy PolicyPrivacy
Manage data