Tor

A look at the traffic originating from my Tor Exit relays

Have you ever wondered which clearnet web domains (as in not onions) are the most popular among users of The Onion Router project (Tor)? Is there any evidence to support the popular mainstream opinion that Tor is predominantly used by people with malicious and criminal intent? To add some spice to this question in 2026, I’ve aggregated non-identifiable data based on DNS queries made by my five Tor exit relays.

Year one of hosting Tor exit relays

It’s a dirty job, but somebody’s got to do it. Well, actually, that’s not quite true. I’ve been mirroring this blog as an onion site since 2016, so I figured it was time to contribute a little time, effort, and money towards the infrastructure of the Tor network. Besides, running Tor relays has always been on my bucket list, and I am getting old. No more time to waste ;)

How to configure Hugo as a Tor hidden service

After migrating my blog from WordPress to Hugo, I wanted to find a simple solution that allowed me to mirror my blog content effortlessly to my hidden services. As Hugo is a static content generator, I didn’t have the opportunity to dynamically rewrite content on the fly by pulling the HTTP host from the current request.

How to configure WordPress as a Tor hidden service

I decided I wanted to host my WordPress installation as a hidden service on Tor instead of backporting all my existing content to Hugo. I previously ran Hugo on my onion site and even though I still want to make that move eventually, for now, I’m sticking with what I already know. Besides, putting arguably the worst content management system ever invented on the dark web seemed like a fun venture.