Tor Browser 9.5 allows website publishers to advertise their onion service to Tor users by adding HTTP headers. When Onion Location is enabled, Tor users will be prompted to opt-in to upgrade to the onion service.
Now, onion service administrators who want to add an extra layer of security to their website can set a pair of keys for access and control.
You can find how to set up Onion-Location and Client Authorization for your onion service here: https://community.torproject.org/onion-services/advanced/
When users try to visit onion sites and encounter an error, Tor Browser 9.5 now displays informational messages about the service-, client-, or network-side error. Previously, only standard Firefox error messages were displayed.
Onion service URLS are not easy for humans to remember, which makes it hard for users to discover or return to an onion site. In this release, we're bringing you a proof-of-concept for human-memorable names for SecureDrop
, developed with Freedom of Press
@torproject How does the naming service work?
@threed The human-memorable/meaningful names feature is still in very early stages of testing with HTTPS Everywhere.
Unfortunately it's not available for general use yet.
@torproject I'm more asking whether this DNS is in any way decentralized or based on some interesting cryptographic primitives? Or is it just a single spot that stores the mapping in plaintext?
@torproject Maybe letting the header be sent by the client in the first place, so every request after the first page load is upgraded to .onion?
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!