How safe is Tor? Ask the CIA

Secure, anonymous, untraceable

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

The CIA now has a presence on thedark webvia an onion site that it has set up on the Tor network.

It can be found atciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.onionand while it does look like one of those dodgy URLs scammers often use, it is actually a genuine website although you won’t be able to access it via your usual browser.

Instead you will need the dedicated Tor browser, currently in version 8.0.9.

Secure

Secure

The agency introduced the announcement saying “Secure, anonymous, untraceable - traits ever-present in CIA’s intelligence collection mission - and the same is true for our onion site”. Commentators were quick to point out the irony of the statement with many pushing the sarcasm further by joking that it might be a trap.

The site is a copy of the official CIA.gov where you will find the exact content: from The World Factbook to reporting information to applying for a job.

Brittany Bramell, CIA’s Director of Public Affairs, said in a statement that the agency’s “global mission demands that individuals can access us securely from anywhere. Creating an onion site is just one of many ways we’re going where people are.”

Tor protects the IP address of the person visiting an onion site and the browsing data by encrypting it and bouncing the traffic via nodes located globally to make it near impossible to track a particular visitor.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

More astute users combine Tor with aVPNin order to make it even more difficult to pinpoint them.

Désiré has been musing and writing about technology during a career spanning four decades. He dabbled inwebsite buildersandweb hostingwhen DHTML and frames were in vogue and started narrating about the impact of technology on society just before the start of the Y2K hysteria at the turn of the last millennium.

A new form of macOS malware is being used by devious North Korean hackers

Scammers are using fake copyright infringement claims to hack businesses

Belkin’s Travel Bag for Vision Pro has pockets and is way cheaper than Apple’s own case