Type: Anonymous file sharing tool
Access: Desktop application — runs locally
Account required: No
Clearnet version: onionshare.org
Open source: Yes — fully audited
Created by: Micah Lee — journalist and security researcher
Built into: Tails OS
Last verified: March 2026
What Is OnionShare?
OnionShare is an open-source tool that lets you share files, receive files, host websites and chat anonymously — all by creating a temporary .onion address directly on your own computer. There is no server involved, no account required and no third party who can see what you are transferring. The file goes directly from your machine to the recipient’s Tor Browser, encrypted through Tor’s relay network the entire way.
It was created by Micah Lee, a journalist and security researcher who has worked with The Intercept and the Freedom of the Press Foundation. It is included by default in Tails OS and is recommended by the Tor Project as the safest available method for anonymous file transfer.
Download
Platforms: Windows, Mac, Linux
Also available in: Tails OS (pre-installed), some Linux package managers
Verify: PGP signatures are published for all releases — verify before installing
How OnionShare Works
OnionShare’s architecture is fundamentally different from conventional file sharing services. Instead of uploading a file to a central server — Dropbox, Google Drive, WeTransfer — and sharing a link to that server, OnionShare turns your own computer into a temporary .onion hidden service.
| Conventional File Sharing | OnionShare |
|---|---|
| File uploaded to central server | File stays on your computer |
| Server operator can see file | No server operator — direct transfer |
| Download link is a clearnet URL | Download link is a .onion address |
| Recipient’s IP visible to server | Recipient’s IP hidden through Tor |
| Your IP visible to server | Your IP hidden — .onion server |
| File persists on server after transfer | Address disappears after transfer completes |
Four Modes of Operation
1. Share Files
The primary use case. Select files or folders, click Start Sharing, and OnionShare generates a .onion address. Send that address to your recipient — they open it in Tor Browser and download directly from your machine. The address can be set to self-destruct after the first download or to remain active for multiple downloads.
2. Receive Files
The reverse mode — you generate a .onion address and send it to a source. They open it in Tor Browser and upload files to you. The files arrive directly on your machine. This mode is used by journalists receiving documents from sources — it provides similar protection to SecureDrop without requiring server infrastructure.
Important distinction from SecureDrop: OnionShare’s receive mode requires your computer to be running and online. SecureDrop runs on a dedicated server that is always available. For ongoing source relationships, SecureDrop is more practical. For one-time transfers, OnionShare is simpler.
3. Host a Website
OnionShare can host static HTML websites as .onion hidden services directly from your computer. The site is accessible only via Tor Browser and disappears when you close OnionShare. This is useful for temporarily publishing sensitive documents or creating a censorship-resistant web presence without server infrastructure.
4. Anonymous Chat
OnionShare creates a temporary .onion chat room with no accounts, no logs and no persistent data. Everyone who joins uses the same .onion address. Messages are not stored anywhere — they exist only in the session. When the chat is closed, everything disappears.
Step-by-Step: Sharing a File
- Download and install OnionShare from onionshare.org
- Open OnionShare and click Share Files
- Drag files or folders into the OnionShare window
- Configure options:
- Stop sharing after first download — recommended for sensitive files
- Public mode — removes password requirement (less secure)
- Click Start Sharing
- OnionShare generates a .onion address — copy it
- Send the address to your recipient via a secure channel
- The recipient opens the address in Tor Browser and downloads
- OnionShare shows download progress in real time
- Close OnionShare when done — the address becomes permanently inaccessible
Step-by-Step: Receiving Files
- Open OnionShare and click Receive Files
- Configure options:
- Set a save location for incoming files
- Enable or disable notifications
- Click Start Receive Mode
- OnionShare generates a .onion address — send it to your source
- The source opens the address in Tor Browser and uploads files
- Files arrive in your designated save folder
- Close OnionShare when done
OnionShare vs. Other File Transfer Methods
| Method | Server Required | Anonymous | Encrypted | File Size Limit |
|---|---|---|---|---|
| OnionShare | ❌ No | ✅ Both parties | ✅ Tor + HTTPS | Limited by disk space |
| SecureDrop | ✅ Yes | ✅ Source only | ✅ Yes | 500MB typical |
| Signal | ✅ Yes | ⚠️ Phone number | ✅ Yes | 100MB |
| WeTransfer | ✅ Yes | ❌ No | ⚠️ In transit only | 2GB free |
| Google Drive | ✅ Yes | ❌ No | ⚠️ In transit only | 15GB free |
Security Considerations
Your computer must stay online during the transfer. Unlike cloud services, OnionShare serves files directly from your machine. If your computer goes to sleep, loses internet or closes OnionShare during a transfer, the recipient cannot complete the download. For large files, ensure your computer stays awake and connected for the duration.
The .onion address is the secret. Anyone who has the .onion address can download the file — there is no additional authentication by default. Send it only to the intended recipient via a secure channel. Do not post it publicly unless you intend public access.
Strip metadata before sharing. OnionShare protects the transfer but not the content of files. A Word document or PDF may contain metadata — author name, organization, editing history — that identifies you independently of how the file was transferred. Use MAT2 or ExifTool to strip metadata before adding files to OnionShare.
Use private mode by default. OnionShare generates a random password alongside the .onion address by default — both are required to access the file. This private mode adds a meaningful layer of protection against accidental exposure if the .onion address is intercepted. Do not disable private mode unless you have a specific reason to.
OnionShare in Tails OS
OnionShare is pre-installed in Tails OS — the amnesic operating system that boots from a USB drive and routes all traffic through Tor. Using OnionShare inside Tails provides the strongest available protection for file transfers:
- All traffic automatically routes through Tor — no configuration required
- Tails leaves no forensic trace on the host computer after shutdown
- OnionShare sessions disappear completely when Tails is closed
- MAT2 for metadata stripping is also pre-installed in Tails
For high-stakes file transfers — journalists receiving documents from sources, whistleblowers sharing evidence — running OnionShare inside Tails is the recommended setup.
Who Uses OnionShare
Journalists use OnionShare’s receive mode to collect documents from sources who cannot use SecureDrop — for example, sources who need to transfer files immediately without waiting for a SecureDrop instance to be set up. The receive mode provides similar network anonymity to SecureDrop without requiring server infrastructure.
Activists and human rights workers use OnionShare to transfer sensitive files across borders or between parties in surveillance-heavy environments. The absence of a central server means there is no third party who can be compelled to hand over transfer logs.
Privacy-conscious individuals use OnionShare for everyday file sharing where they prefer not to route files through commercial cloud services that scan content, collect metadata and retain files after transfer.
Security researchers use OnionShare to share sensitive findings — vulnerability disclosures, malware samples, research data — with colleagues and vendors without creating a record on commercial file sharing infrastructure.
Frequently Asked Questions
Does OnionShare work without Tor Browser?
OnionShare creates .onion addresses — these are accessible only through Tor Browser or a configured Tor proxy. The sender uses the OnionShare application, which handles Tor automatically. The recipient must use Tor Browser to access the generated .onion address and download the file.
What is the maximum file size OnionShare can transfer?
OnionShare has no built-in file size limit — you are limited only by your available disk space and the recipient’s patience. However, Tor’s bandwidth limitations make large file transfers slow. A 1GB file over Tor may take an hour or more depending on circuit speed. For very large files, compress and split them or consider whether a different transfer method is more practical.
Is OnionShare more secure than SecureDrop?
They serve different use cases. SecureDrop runs on a dedicated server that is always available, supports ongoing anonymous communication and is specifically hardened for newsroom use. OnionShare requires the sender’s computer to be online, is simpler to use and requires no server infrastructure. For one-time transfers, OnionShare is simpler and equally secure at the network layer. For ongoing source relationships requiring a persistent anonymous channel, SecureDrop is more appropriate.
Can I use OnionShare on mobile?
OnionShare is primarily a desktop application. A mobile version exists for Android but is less mature than the desktop version. For mobile file transfers, consider using a messaging app with end-to-end encryption — Signal for non-anonymous transfers, Session for pseudonymous transfers — rather than OnionShare.
What happens if I close OnionShare before the download completes?
The .onion address becomes immediately inaccessible and any in-progress download fails. The recipient would need to restart the download from a new OnionShare session with a new .onion address. For large files, ensure your machine stays online and awake for the expected duration of the transfer.