A toolkit for easily deploying HTTP and HTTPS onion services (Tor hidden services) for existing websites.
The Enterprise Onion Toolkit (EOTK) is a tool for deploying HTTP and HTTPS onion services (Tor hidden services) for existing websites. It acts as a reverse proxy, enabling organizations to offer their content via Tor's onion network for enhanced privacy, security, and censorship circumvention. It simplifies the process of creating an official onion presence, handling configuration, SSL certificates, and routing.
Organizations, publishers, and enterprises that want to provide a Tor onion version of their public website for increased privacy, security, and accessibility in censored regions.
EOTK reduces the complexity of setting up onion services, providing a proven, production-ready toolkit used by major news outlets and companies. It focuses on the non-anonymity benefits of Tor, such as tamper-proofing and anti-blocking, making it suitable for official brand presences.
Enterprise Onion Toolkit
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Used by major organizations like The New York Times, BBC News, and Brave, as listed in the README, demonstrating reliability and real-world adoption for enterprise-scale deployments.
Configures SSL/TLS for onion addresses, including multi-onion EV certificates, enabling secure connections without compromising on privacy benefits.
Leverages NGINX as a rewriting proxy to forward traffic seamlessly between onion services and origin web servers, minimizing changes to existing infrastructure.
Supports Ubuntu, macOS via Homebrew, and Raspbian, as stated in the README, allowing deployment across diverse operating environments.
The March 2022 announcement introduces breaking changes for HTTPS certificates, requiring manual file renaming and directory updates, which can disrupt existing setups if not carefully managed.
Setup involves multiple steps like installing Tor and NGINX, configuring projects, and handling SSL certificates, making it non-trivial for users without sysadmin experience.
Explicitly designed for non-anonymity benefits like anti-blocking and integrity, so it's unsuitable for projects where hiding server or user identity is critical, as noted in the philosophy section.