tor

hidden service

Tor network service hidden by IP address, accessed via .onion address, both operator and client anonymous.

A Tor network service that operates without exposing its IP address. Hidden services use .onion addresses and are reachable only via Tor. The service operator stays anonymous; the client stays anonymous. Both sides get plausible deniability.

Hidden services power legitimate operations: journalism, activism, whistleblowing, privacy-focused commerce. Also unsavory marketplaces. The protocol itself doesn't care.

Technically: a hidden service generates an RSA keypair, publishes a descriptor to the Tor network, and maintains inbound circuits. Clients fetch the descriptor and build circuits to the service without learning its real location. End-to-end encryption is built in.

Why it matters for bunkerdomains: a .onion domain is your frontend. Hidden services host the actual site. They work well together—you get anonymous domain registration plus anonymous hosting. Neither registry nor ISP sees traffic. No DMCA takedown, no subpoena compliance, no upstream pressure. The tradeoff: slower, Tor-only access, and you're responsible for your own opsec.