How safe is Tor? Ask the CIA

Image credit: CIA

The CIA now has a presence on the dark web via an onion site that it has set up on the Tor network.

It can be found at ciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.onion and while it does look like one of those dodgy URLs scammers often use, it is actually a genuine website although you won’t be able to access it via your usual browser. 

Instead you will need the dedicated Tor browser, currently in version 8.0.9.

Secure

The agency introduced the announcement saying “Secure, anonymous, untraceable - traits ever-present in CIA’s intelligence collection mission - and the same is true for our onion site”. Commentators were quick to point out the irony of the statement with many pushing the sarcasm further by joking that it might be a trap. 

The site is a copy of the official CIA.gov where you will find the exact content: from The World Factbook to reporting information to applying for a job.

Brittany Bramell, CIA’s Director of Public Affairs, said in a statement that the agency’s “global mission demands that individuals can access us securely from anywhere. Creating an onion site is just one of many ways we’re going where people are.” 

Tor protects the IP address of the person visiting an onion site and the browsing data by encrypting it and bouncing the traffic via nodes located globally to make it near impossible to track a particular visitor.

More astute users combine Tor with a VPN in order to make it even more difficult to pinpoint them. 

Desire Athow
Managing Editor, TechRadar Pro

Désiré has been musing and writing about technology during a career spanning four decades. He dabbled in website builders and web hosting when DHTML and frames were in vogue and started narrating about the impact of technology on society just before the start of the Y2K hysteria at the turn of the last millennium.

Latest in Security
A graphic showing someone on a tablet working through a supply chain.
Security issue in open source software leaves businesses concerned for systems
ransomware avast
One of the most powerful ransomware hacks around has been cracked using some serious GPU power
person at a computer
Infamous ransomware hackers reveal new tool to brute-force VPNs
person at a computer
Many workers are overconfident at spotting phishing attacks
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Microsoft 365 accounts are under attack from new malware spoofing popular work apps
Data Breach
Thousands of healthcare records exposed online, including private patient information
Latest in News
Panos Panay and Alexa Plus
Amazon's Panos Panay teases future Alexa+ devices from speakers to possible wearables
Metroid Prime 4
I reckon the Nintendo Switch 2 could launch with Metroid Prime 4 – here’s why
Samsung Galaxy Z Fold 6
New rumors predict a foldable iPhone will launch next year – and cost almost twice as much as the iPhone 16 Pro Max
Pebble smartwatch countdown
Pebble confirms its smartwatch announcement is just hours away
Logo of YouTube Shorts
Is YouTube auto-playing Shorts when you open the app? Well, you’re not alone - here’s how to fix it
Google DeepMind panel discussion
“More sovereignty and protection” - Google goes all-in on UK AI with data residency, upskilling projects, and startup investments