A privacy oriented, anti-phishing add-on for Tor Browser that protects you from bad .onion sites.
This is an experimental software. The add-on is fully functional but somewhat rough around the edges. Feedback and code contributions are welcomed.
-
Protects against phishing onion sites by utilizing a whitelist of verified links.
-
Provides alternative mirrors, if current one does not work.
-
Warns when accessing an onion site using a Tor2Web proxy.
The add-on imports databases of well-known, verified addresses. By default, the add-on imports OnionTree. Every time you visit a website, website's URL is looked up in a database. URL lookups are done on your machine only. OnionTree Sentinel never sends out addresses that you visit.
If URL is found in a database, the canary icon turns green and a pop up becomes available which displays the name of the site and alternative mirrors.
If URL is not found in a database, the canary icon turns red and a pop up becomes available, warning a user to be aware that this site may be a phishing site. Optionally a user can report the URL as a phishing site. At the moment, this works by opening a new issue in OnionTree GitHub repository.
The add-on is available via Mozilla's Addons.
In order to test the add-on locally.
$ git clone https://github.com/onionltd/oniontree-sentinel
Open Tor Browser and navigate to about:debugging
. Click Load Temporary Add-on...
and load the add-on's manifest in src/manifest.json
.
-
Improve UI
-
Make the add-on persistent on Tails
See sentinel species. Icons are an edited version of canary made by Freepik from www.flaticon.com.