Dark Web Email & Messaging — Complete Directory 2026
Anonymous email services, encrypted messaging platforms and communication tools accessible via Tor. Every service on this page allows you to communicate without revealing your real identity or IP address.
Quick Comparison
| Service | Type | Requires Tor | Account Required | Invite Only | Last Verified |
|---|---|---|---|---|---|
| ProtonMail | Optional | Yes | No | March 2026 | |
| OnionMail | Yes | Yes | No | March 2026 | |
| Mail2Tor | Yes | Yes | No | March 2026 | |
| Riseup | Email + more | Optional | Yes | Yes | March 2026 |
| Tutanota | Optional | Yes | No | March 2026 | |
| Keybase | Messaging + files | Optional | Yes | No | March 2026 |
| Briar | Messaging | No | No | No | March 2026 |
| Session | Messaging | No | No | No | March 2026 |
| Cwtch | Messaging | Yes | No | No | March 2026 |
Email Services - Full Breakdown
ProtonMail The most widely used anonymous email service.
ProtonMail is end-to-end encrypted by default — Proton cannot read your emails, and neither can anyone who intercepts them in transit. It requires no personal information to create a free account. Its servers are based in Switzerland, which has strong privacy laws and is outside US and EU jurisdiction for data requests.
Its official .onion address provides an additional layer of anonymity on top of ProtonMail’s existing privacy guarantees — your IP address is hidden from Proton’s servers, meaning even Proton cannot link your account to your physical location.
- Onion address:
https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion - Clearnet:
https://proton.me - Free tier: Yes — 1GB storage, limited features
- Open source: Partially
- Last verified: March 2026
Who it’s for: Anyone who needs encrypted email with a reputable provider. The most practical starting point for most users — familiar interface, reliable service, strong privacy baseline.
Limitation: ProtonMail’s free tier has sending limits. The company has complied with Swiss legal orders in the past — if your threat model includes Swiss law enforcement, use an .onion-only service instead.
OnionMail Email that exists only inside Tor.
OnionMail is an email service with addresses ending in .onion — meaning emails can only be sent and received between OnionMail users, or to other .onion email services. It never touches the clearnet, which means there is no point at which your email exits the Tor network and becomes traceable.
It requires no personal information to register, accepts no payment and keeps no logs. The trade-off is that you can only communicate with others who also use .onion email services.
- Onion address:
http://rypjstugemdalojzmwwivyubl3mhcqkyvxhz3vk3idycm5rw3oc3yoyd.onion - Clearnet: None
- Free tier: Yes
- Open source: Yes
- Last verified: March 2026
Who it’s for: Users who need to communicate exclusively within the Tor ecosystem — for example, between a journalist and a source who both use .onion email addresses.
Limitation: Cannot send or receive email to or from Gmail, ProtonMail or any clearnet address. Only useful if both parties use .onion email.
Mail2Tor Free anonymous email with clearnet delivery.
Mail2Tor provides free anonymous email accessible via Tor, with the ability to send and receive messages to regular clearnet email addresses. This makes it more practically useful than OnionMail for most users — you can email anyone, not just other .onion users.
- Onion address:
http://mail2torjgmxgexntbrmhvgluavhj7ouul5yar6ylbvjkxwqf6ixkwyd.onion - Clearnet: None
- Free tier: Yes
- Open source: Partially
- Last verified: March 2026
Who it’s for: Users who need to send anonymous email to regular email addresses without creating an account on a clearnet service.
Limitation: Less established than ProtonMail. No independent audit of its privacy claims has been published.
Riseup Privacy infrastructure for activists.
Riseup provides email, mailing lists, VPN, chat and other communication services specifically for social justice activists and organizations. It has operated since 1999 with a documented commitment to user privacy and no commercial interests. It does not log IP addresses, does not comply with requests it considers politically motivated and has a published canary statement indicating whether it has received government orders.
- Onion address:
http://vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion - Clearnet:
https://riseup.net - Free tier: Yes — invite required
- Open source: Yes
- Last verified: March 2026
Who it’s for: Activists, journalists and organizations with a genuine need for privacy-first communication infrastructure and a connection to the activist community that can provide an invitation.
Limitation: Invite-only access. If you don’t already know someone with a Riseup account, you cannot get one — though the website explains how to apply directly.
Messaging Services - Full Breakdown
Keybase Encrypted messaging with cross-platform identity verification.
Keybase lets you verify that a username on Keybase corresponds to a real person who also controls specific accounts elsewhere — their Twitter, GitHub, Reddit and so on. This cross-platform identity verification makes it harder for impersonators to deceive you. It supports end-to-end encrypted messaging, file sharing and team collaboration.
- Onion address:
http://keybase5wmilwokqirssclfnsqrjdsi7jdir5wy7y7iu3tanwmtp6oid.onion - Clearnet:
https://keybase.io - Account required: Yes
- Open source: Yes
- Last verified: March 2026
Who it’s for: Users who need to verify the identity of people they’re communicating with — journalists confirming sources, security researchers verifying contacts, teams coordinating across platforms.
Limitation: Acquired by Zoom in 2020. Development has slowed significantly and long-term maintenance is uncertain.
Briar Messaging that works without internet infrastructure.
Briar is a peer-to-peer encrypted messaging app that routes messages through Tor when internet is available, and through Bluetooth or Wi-Fi when it isn’t. This makes it useful in environments where internet access is blocked or monitored — protests, authoritarian crackdowns, network outages.
It requires no server, no account and no phone number. Messages are stored on devices only, not on any central server.
- Clearnet:
https://briarproject.org - Onion address: Not applicable — runs locally
- Account required: No
- Open source: Yes
- Last verified: March 2026
Who it’s for: Activists and journalists operating in environments where internet infrastructure may be shut down or monitored. The Bluetooth/Wi-Fi fallback is its unique feature.
Limitation: Both parties must have Briar installed. No desktop version — Android only.
Session Decentralized encrypted messaging with no phone number required.
Session is a fork of Signal that removes the phone number requirement entirely. Instead of a phone number, you get a randomly generated Session ID. Messages are routed through a decentralized network of nodes rather than a central server, which means there is no single operator who can be compelled to hand over metadata.
- Clearnet:
https://getsession.org - Onion address: None official
- Account required: No — Session ID only
- Open source: Yes
- Last verified: March 2026
Who it’s for: Users who want Signal-level encryption without linking their phone number to their identity. More private than Signal for users whose phone number is a sensitive identifier.
Limitation: Smaller user base than Signal makes it harder to find contacts already using it. Decentralized routing introduces occasional message delivery delays.
Cwtch Tor-native group messaging with strong metadata protection.
Cwtch (pronounced “kutch”) is built on Tor hidden services from the ground up. Every user runs their own .onion address, and messages route through Tor by default. This means no central server, no metadata visible to any operator and no IP addresses exposed even to other users in a conversation.
It supports group conversations through “servers” that any user can run themselves — making it resistant to takedowns since there is no single point of failure.
- Onion address: Built-in — each user generates their own
- Clearnet:
https://cwtch.im - Account required: No
- Open source: Yes
- Last verified: March 2026
Who it’s for: Users who need group messaging with the strongest available metadata protection. Particularly useful for organizing groups in repressive environments where even knowing who is communicating with whom is dangerous.
Limitation: Small user base. Interface is functional but less polished than mainstream messaging apps. Setup requires more technical comfort than Signal or Session.
Choosing the Right Service
For most users starting out: ProtonMail via its .onion address. Familiar interface, strong encryption, reputable provider, free tier available.
For communicating exclusively within Tor: OnionMail. Nothing leaves the Tor network.
For sending anonymous email to regular addresses: Mail2Tor. Bridges the gap between .onion and clearnet email.
For activist organizations: Riseup — if you can get an invitation.
For messaging without a phone number: Session. The most practical Signal alternative for users who need to separate their identity from their phone number.
For messaging in environments with no internet: Briar. The Bluetooth fallback is unique and genuinely useful in protest or shutdown scenarios.
For group coordination with maximum metadata protection: Cwtch. The strongest option for group messaging privacy.
Email Security Basics
Always use end-to-end encryption. End-to-end encryption means only the sender and recipient can read the message. The provider cannot. ProtonMail, Tutanota and OnionMail all do this by default. Regular Gmail and Outlook do not.
Understand what metadata is. Even if your email content is encrypted, metadata — who you emailed, when, how often, the subject line — may be visible to your provider and to law enforcement. Tutanota encrypts subject lines. Most services do not.
Use PGP for sensitive communications outside these platforms. If you need to communicate securely with someone who uses regular email, PGP encryption applied before sending protects the content regardless of what email service carries it.
Never access anonymous email from a device or network linked to your real identity. Using ProtonMail’s .onion address from your home Wi-Fi on your work laptop defeats the anonymity the .onion address provides. Use Tor Browser, ideally from a dedicated device or Tails.
Frequently Asked Questions
Is ProtonMail actually private? For most threat models, yes. ProtonMail cannot read your emails due to end-to-end encryption. However, it has complied with Swiss legal orders requiring account data — specifically IP addresses for logins prior to 2021, before they made IP logging opt-in. Using ProtonMail via its .onion address prevents this because your IP is never visible to Proton’s servers.
Can I use Signal on the dark web? Signal does not have a .onion address and requires a phone number to register. It provides strong end-to-end encryption but your phone number is visible to Signal and to anyone you contact. For dark web-compatible messaging, use Session (no phone number required) or Cwtch (built on Tor).
What’s the safest way to receive documents from a source? SecureDrop, covered in the Privacy & Security Tools section. It is specifically designed for this use case and is the tool used by The New York Times, The Guardian and over 70 other news organizations.
Can law enforcement read my ProtonMail? They cannot read the content of your emails due to end-to-end encryption. They can potentially obtain metadata — who you emailed, when — through a Swiss legal process. Using ProtonMail’s .onion address removes IP address data from what Proton can hand over.