Pitch — Presentation Platform Accessible via Tor (2026)

Type: Collaborative presentation platform

Access: Tor Browser — clearnet site, no .onion address

Account required: Yes — free tier available

Clearnet version: pitch.com

Official .onion: None

Last verified: March 2026

What Is Pitch?

Pitch is a collaborative presentation and design platform — a modern alternative to PowerPoint and Google Slides that focuses on real-time team collaboration, professional templates and polished output. Teams use it to create pitch decks, reports, presentations and visual documents with multiple collaborators working simultaneously.

It has no official .onion address and is not a dark web-native service. It appears in this directory because it is accessible via Tor Browser — the clearnet site at pitch.com loads and functions through Tor’s routing infrastructure. This makes it usable for teams who want to access collaboration tools without exposing their IP address to Pitch’s servers, or for users in countries where pitch.com is blocked or restricted.

Access via Tor

https://pitch.com

Access method: Open this URL in Tor Browser — not a .onion address. Tor Browser routes your connection to pitch.com through three Tor relays, hiding your real IP from Pitch’s servers.

Security level: Set to Standard — Pitch is a JavaScript-heavy application that will not function in Safer or Safest mode. This is a significant limitation for security-conscious users.

Why Pitch Is in This Directory

Pitch’s inclusion in a dark web directory requires explanation — it is not a dark web service and most of its users have no connection to Tor or dark web activity.

It appears here because darknetking.com’s catalog of dark web sites includes services accessible through Tor regardless of whether they are .onion-native. For users who already use Tor for other purposes and want to access collaboration tools without creating additional IP-based records of their activity, knowing that Pitch works through Tor is practically useful information.

The use cases are narrow but legitimate: a team of journalists collaborating on a sensitive project who want to avoid creating a clearnet record of their collaboration tool usage, or an organization in a country where productivity tools are monitored that needs collaboration infrastructure accessible without creating surveillance-visible connections.

Pitch via Tor vs. Google Slides via Tor

Feature Pitch via Tor Google Slides via Tor
IP hidden from service ✅ Yes — Tor exit node ✅ Yes — Tor exit node
Account identity visible ✅ If logged in ✅ If logged in
Data collection ⚠️ Standard SaaS collection ✅ Extensive — Google
Account requirement ✅ Yes ✅ Yes — Google account
Speed via Tor ⚠️ Slower than clearnet ⚠️ Slower than clearnet

Practical Limitations of Using Pitch via Tor

JavaScript requirement. Pitch is a rich web application built entirely on JavaScript. It requires Standard security mode in Tor Browser — the same mode you would use on a regular browser. This means all of Tor Browser’s JavaScript-related security protections are disabled while using Pitch. For users who use Tor specifically for enhanced browser security, this defeats a significant portion of that security benefit.

Speed. Pitch involves real-time collaboration, live document syncing and loading of large visual assets — templates, images, design elements. Tor’s multi-relay routing adds meaningful latency to every network request. Collaborative real-time editing over Tor will feel noticeably slower than the same activity on a direct connection, particularly for teams with multiple simultaneous editors.

Account identity. Pitch accounts are linked to email addresses. If you log into a Pitch account that is linked to your real identity, Pitch knows who you are regardless of how you connected. The Tor routing hides your IP but does not hide your account identity. For genuinely anonymous use, create a Pitch account using an email address with no connection to your real identity — a ProtonMail address created over Tor.

No .onion address. Without a .onion address, your connection to Pitch exits the Tor network at an exit relay and then travels to Pitch’s servers over the regular internet. This means Pitch sees a Tor exit node IP rather than your real IP, but the exit relay operator can in principle see the unencrypted portion of your connection if you are not using HTTPS — though Pitch, like virtually all modern web services, uses HTTPS by default.

Better Alternatives for Privacy-Conscious Collaboration

If the reason you want to use Pitch via Tor is privacy rather than censorship circumvention, more privacy-preserving collaboration alternatives exist:

CryptPad is an open-source, end-to-end encrypted collaboration suite that includes document editing, spreadsheets, presentations and kanban boards. It has no clearnet tracking, stores only encrypted data and has an official .onion address. For teams with genuine privacy requirements, CryptPad is significantly more appropriate than Pitch via Tor.

Etherpad is an open-source real-time document editor that can be self-hosted or accessed through privacy-friendly instances. Several instances have .onion addresses. It does not support the polished presentation format Pitch provides but offers strong privacy for text-based collaboration.

OnionShare’s website mode allows hosting static documents as .onion services directly from a team member’s computer — no server, no account, no third-party service. For sharing finished presentations rather than collaborating on them in real time, this provides stronger privacy guarantees than any SaaS tool.

Who Should Use Pitch via Tor

The specific scenario where Pitch via Tor makes sense is narrow: a team that is already committed to using Pitch for its specific design and collaboration features, where the primary concern is preventing Pitch from logging their IP addresses, and where the team is comfortable with the JavaScript security trade-off and performance limitations.

For teams who are choosing a collaboration tool specifically for privacy reasons, CryptPad or a self-hosted alternative provides stronger guarantees without the limitations of using a JavaScript-heavy SaaS product through Tor.

Frequently Asked Questions

Does Pitch have an official .onion address?

No — as of March 2026, Pitch does not operate an official Tor hidden service. It is accessible via Tor Browser through its regular clearnet domain at pitch.com. This means your connection exits the Tor network before reaching Pitch’s servers, unlike .onion-native services where the connection stays within Tor throughout.

Is my Pitch account anonymous if I access it via Tor?

Your IP address is hidden from Pitch — they see a Tor exit node. Your account identity is not anonymous — if you log into an account linked to your real email address, Pitch knows who you are. For anonymous Pitch use, create an account with a ProtonMail address created over Tor, use a username with no connection to your real identity and avoid adding real personal information to the account profile.

Why is Pitch in a dark web directory if it has no .onion address?

This directory includes services accessible through Tor that may be useful to privacy-conscious users, not only .onion-native services. Pitch is accessible via Tor, is used by some teams who want to obscure their collaboration tool usage from their ISP or from Pitch’s analytics, and was included in the source catalog this directory is based on. The inclusion comes with honest disclosure of its limitations — it is not a dark web service and the privacy guarantees it provides through Tor are significantly weaker than .onion-native alternatives.

What is the best privacy-preserving alternative to Pitch?

For presentation and rich document collaboration with genuine privacy, CryptPad is the strongest currently available option — open source, end-to-end encrypted, accessible via Tor and actively maintained. It does not match Pitch’s design quality or template library, but provides security guarantees that no SaaS platform accessed through Tor can match.