Tor 用例

在 Tor 上託管舉報平台 — 安全的 .onion 基礎設施

舉報平台需要最高級別的來源保護,Tor 網絡是匿名提交的黃金標準。AnubizHost 為舉報平台(如 SecureDrop、GlobaLeaks 和自定義提交系統)提供專門構建的 Tor 託管,確保您的來源保持匿名,您的基礎設施能夠抵禦拆除嘗試。

Need this done for your project?

We implement, you ship. Async, documented, done in days.

Start a Brief

為什麼為舉報使用 Tor?

Whistleblowers face extraordinary risks when disclosing sensitive information. Traditional web hosting exposes IP addresses, server locations, and operator identities — all of which can be used to trace and retaliate against sources. Tor hidden services eliminate these attack vectors by routing all traffic through multiple encrypted relays, making it virtually impossible to determine who is visiting or operating the platform.

Major news organizations including The New York Times, The Washington Post, and ProPublica all operate Tor-based submission systems. AnubizHost brings the same level of infrastructure to independent journalists, NGOs, and smaller newsrooms that lack dedicated IT teams.

  • End-to-end traffic encryption via Tor circuits
  • No IP address exposure for sources or operators
  • Resistance to DNS-based blocking and censorship
  • Cryptographic authentication of the .onion address

SecureDrop 和 GlobaLeaks 部署

AnubizHost supports turnkey deployment of the most trusted whistleblowing platforms. Our Tor hosting plans come pre-configured for running SecureDrop and GlobaLeaks with optimized Tor settings, automatic security updates, and encrypted storage for submitted documents.

  • SecureDrop — The open-source submission system used by 70+ newsrooms worldwide. We handle Tor configuration, application server hardening, and journalist workstation guidance.
  • GlobaLeaks — A flexible whistleblowing framework supporting customizable questionnaires, multi-language interfaces, and encrypted file handling. We deploy it with recommended security policies pre-applied.
  • Custom platforms — If you have built your own submission system, we provide Tor-optimized hosting with SSH access over Tor, pre-configured web servers, and security auditing assistance.

Every deployment includes full-disk encryption, automated encrypted backups, and real-time uptime monitoring via Tor probes.

運營安全最佳實踐

Hosting a whistleblowing platform on Tor is only part of the security equation. AnubizHost provides guidance on operational security (OpSec) to ensure your platform remains uncompromised:

  • Compartmentalization — Separate your submission server from your editorial systems. We can provision isolated VPS instances for each function.
  • Key management — Use GPG encryption for all submitted documents. Store decryption keys on air-gapped machines, never on the server.
  • Access control — Restrict SSH access to Tor-only connections. Use strong key-based authentication with no password fallback.
  • Monitoring — Our Tor-based health checks verify your .onion address is reachable every 5 minutes without exposing monitoring infrastructure on the clearnet.

We also recommend publishing your .onion address through multiple verified channels to help sources confirm they are connecting to the authentic platform.

開始使用 AnubizHost Tor 託管

AnubizHost makes it simple to deploy a whistleblowing platform on Tor with maximum privacy from day one. Our offshore servers are located in Iceland, Romania, and Finland — jurisdictions with strong privacy laws and no obligation to comply with foreign takedown requests without proper legal process.

  • No KYC required — Sign up without providing your real name, ID, or phone number
  • Crypto payments accepted — Pay with Bitcoin, Monero, Ethereum, or Litecoin for complete financial privacy
  • Zero logging — We do not record IP addresses, traffic patterns, or connection metadata
  • 24/7 support via encrypted channels — Reach us through Tor-accessible chat or encrypted email

Choose a Tor Hosting plan today and have your whistleblowing platform online within minutes. Protect your sources with infrastructure built for privacy.

Why Anubiz Host

100% async — no calls, no meetings
Delivered in days, not weeks
Full documentation included
Production-grade from day one
Security-first approach
Post-delivery support included

Ready to get started?

Skip the research. Tell us what you need, and we'll scope it, implement it, and hand it back — fully documented and production-ready.

Support Chat

Online