Type: Dark web-native news outlet
Access: Tor Browser required
Account required: No — free access
Clearnet version: None
Primary language: English
Focus: Dark web ecosystem news, security, privacy
Last verified: March 2026
What Is Flashlight?
Flashlight is a dark web-native news outlet — a publication that exists exclusively as a .onion hidden service and covers topics specifically relevant to the Tor network ecosystem. Its coverage focuses on darknet market operations and takedowns, law enforcement operations targeting dark web infrastructure, security research affecting Tor users and privacy developments that mainstream technology media covers incompletely or not at all.
Unlike the mainstream news organizations in this directory — BBC, NYT, ProPublica — Flashlight was not built as a censorship circumvention tool for readers in blocked countries. It was built for the dark web community itself, covering the specific events and developments that matter to people who use Tor regularly and need timely, detailed coverage of the ecosystem they operate in.
Its value is not in replacing mainstream news — it is in providing coverage of a niche that mainstream media genuinely underserves. When a significant darknet market is seized, when a new law enforcement technique is used, when a vulnerability in Tor Browser is disclosed or when a major exit scam occurs, Flashlight covers it in the depth and with the community-specific context that a BBC or Reuters article cannot provide.
Onion Address
How to find the current address:
- Search “Flashlight dark web news” on Ahmia — the current address typically appears in indexed results
- Check Dread’s /d/Onions subforum for current addresses of active dark web media
- Verify any address against a second independent source before trusting it
How to Access Flashlight
- Download Tor Browser from torproject.org
- Set security level to Safer
- Find and verify the current .onion address through Ahmia or Dread
- Paste the address into Tor Browser
- Browse articles freely — no account or registration required
What Flashlight Covers
| Coverage Area | Details |
|---|---|
| Market takedowns | Law enforcement operations, seizures, arrests — detailed coverage with community context |
| Exit scam warnings | Early reporting on market exit scams — often faster than mainstream tech media |
| Security vulnerabilities | Tor Browser exploits, de-anonymization techniques, operational security failures |
| Law enforcement techniques | Analysis of how investigators identify dark web users — from court documents and reporting |
| Privacy technology | Tor Project updates, new anonymity tools, cryptography developments |
| Cryptocurrency | Monero developments, chain analysis, privacy coin regulatory pressure |
| Community news | New market launches, notable vendor arrests, Dread developments |
Why Dark Web-Native News Matters
Mainstream technology and security journalism covers dark web topics — but from the outside looking in. A Wired article about a market takedown will cover the law enforcement perspective, the government press release and the political implications. It will not cover the operational security failure that allowed investigators to identify the operators, the specific blockchain analysis technique used to trace funds or the community implications for buyers and vendors on related markets.
Flashlight covers the same events from inside the community — with the specific context, technical detail and community perspective that mainstream media cannot provide because it lacks the background to recognize what is significant.
For dark web users, this difference is practical not academic. Understanding why a market was taken down — which specific operational security mistake the operators made — is directly relevant to avoiding the same mistakes. Understanding which law enforcement techniques successfully de-anonymized specific users informs operational security decisions in real time. Mainstream media does not provide this analysis. Flashlight does.
Evaluating Flashlight’s Reporting
As a dark web-native publication with anonymous operators, Flashlight cannot be evaluated by the same standards as established mainstream outlets. Several factors help assess the reliability of specific articles:
Primary source citations. Reliable Flashlight reporting cites specific court documents, official press releases, blockchain transaction hashes or other verifiable primary sources. Articles that make specific factual claims without citing verifiable sources require more skepticism.
Cross-reference with Dread. Significant dark web news events generate community discussion on Dread almost immediately. Cross-referencing Flashlight reporting against Dread community reactions — particularly from users with established histories in relevant subforums — provides a reality check on specific claims.
Consistency with mainstream coverage. For major events that mainstream media also covers — significant market seizures, high-profile arrests — compare Flashlight’s coverage against Reuters, Vice or Wired reporting. Consistency on verifiable facts is a positive signal; significant divergence on checkable details warrants caution.
Operational security claims. Flashlight articles analyzing law enforcement techniques or operational security failures should be treated with particular critical attention. Well-intentioned but incorrect analysis could cause readers to over- or under-estimate specific risks. Verify operational security recommendations against established resources — Tor Project documentation, EFF guides — before changing practices based on Flashlight analysis.
Flashlight vs. Mainstream Dark Web Coverage
| Feature | Flashlight | Wired / Vice / BBC |
|---|---|---|
| Community perspective | ✅ Inside — written for community | ⚠️ Outside — written for general audience |
| Technical detail | ✅ High — assumes reader knowledge | ⚠️ Low — simplified for general audience |
| Operator accountability | ❌ Anonymous operators | ✅ Named journalists, editorial standards |
| Speed on dark web news | ✅ Often faster | ⚠️ Slower — verification process |
| Verifiability | ⚠️ Variable | ✅ Higher — editorial standards |
| Accessible via Tor | ✅ .onion only | ✅ Via DuckDuckGo .onion |
Using Flashlight Responsibly
Flashlight is a useful resource when treated as a starting point for further investigation rather than a definitive source. Several practices improve how you use it:
Treat market exit scam reports with appropriate urgency but not panic. Flashlight’s exit scam coverage is among its most valuable content — early warning allows buyers to withdraw funds before a scam is confirmed. But false positives — incorrect exit scam reports about functioning markets — also occur in dark web community media. Cross-reference with Dread before acting on a specific exit scam report.
Use operational security analysis as a starting point. When Flashlight analyzes how a specific market operator was identified, read the analysis carefully and verify the technical claims against primary sources — court documents, Tor Project documentation — before adjusting your operational security practices based on the analysis.
Follow up significant stories in mainstream media. For major events — large market seizures, significant arrests — mainstream security journalism will eventually publish more thoroughly verified accounts. Flashlight’s speed is valuable; mainstream media’s verification processes add reliability. Using both together gives better coverage than either alone.
Frequently Asked Questions
Who operates Flashlight?
Flashlight’s operators are anonymous — consistent with its dark web-native nature. No named individuals or organizations are publicly associated with its operation. This anonymity is intentional and appropriate for a publication operating within the Tor ecosystem, but it means readers cannot evaluate the outlet through its operators’ credentials or track records the way they can with named journalists at mainstream outlets.
Is Flashlight’s reporting accurate?
Variable — like any media outlet, Flashlight’s accuracy depends on the specific article and topic. Its factual reporting on verifiable events — court document details, official press releases, blockchain analysis — tends to be more reliable than its opinion and analysis pieces. Apply standard media literacy practices: verify specific factual claims against primary sources, note when claims are attributed versus asserted and be appropriately skeptical of analysis that cannot be independently verified.
How often does Flashlight publish?
Publication frequency varies — dark web news is event-driven rather than calendar-driven. Periods of significant market activity, major law enforcement operations or important security disclosures generate more frequent publishing. Quiet periods may see less frequent updates. Check the site periodically rather than expecting regular scheduled publication.
Is there a Flashlight clearnet mirror?
No — Flashlight has no clearnet presence. The .onion address is the only access point. This design choice is consistent with covering topics that are sensitive in the context of clearnet surveillance — a publication covering darknet market operations, law enforcement techniques and operational security would face obvious conflicts operating on the clearnet under the same scrutiny it covers.
What is the best way to stay current on dark web news beyond Flashlight?
A combination of sources provides better coverage than any single outlet: Flashlight for dark web-specific coverage, Dread for community-sourced real-time developments, mainstream security journalism (Wired, Vice Motherboard, Krebs on Security) for verified reporting on major events and the Tor Project’s own blog for Tor-specific security and development news. Each source has different strengths and limitations — using them together covers the landscape more completely than relying on any single source.