diff --git a/about/index.html b/about/index.html index 0588863..25eccc7 100644 --- a/about/index.html +++ b/about/index.html @@ -1 +1 @@ -About

About

Emerald Onion is a U.S. 501(c)(3) nonprofit organization and transit internet service provider (ISP) based in Seattle, WA. Emerald Onion's mission is to protect privacy, anonymity, access to information, and free speech online. To further that mission, Emerald Onion operates high capacity, unfiltered Tor exit relays with direct peering to the Seattle Internet Exchange, the Fremont Cabal Internet Exchange, and the Berlin Commercial Internet Exchange. Emerald Onion envisions a world where access and privacy are the defaults; if we do not have human rights online, we will not have them offline, either.

Network

Emerald Onion's Autonomous System Numbers (ASN) is 396507.

Volunteer Directors

Christopher Sheats (he/they, @yawnbox)

yawnbox is a privacy and security engineer, and a cypherpunk. He has been a Tor educator and relay operator since 2010, and was Tor Project's first full-time grant writer in early 2016. yawnbox's volunteerism has also included work with the Seattle Privacy Coalition, City of Seattle's Community Technology Advisory Board, and the ACLU of Washington. yawnbox presented Emerald Onion to DEF CON 26 in August 2018.

Will Scott, PhD (@willscott)

Will is a research fellow at the University of Michigan studying Internet security and access. His work includes Satellite, a project scanning the internet for DNS censorship, and Onionproxy for routing public email to location-hidden services. A Seattle native, Will's previous experiences have included teaching skiing, living in China, working on the Gmail and Jigsaw teams at Google, teaching Computer Science in Pyongyang, and playing with fire.

Jake Visser (@jakevis_)

Jake is a cyber security architect living and working in Seattle. An Australian native, with a long history in government, IT security, and many forms of packet forwarding (and a couple masters degrees from the University of New South Wales to help). Jake has been involved with several not for profits, ranging from long range community wireless networks, community ISP’s to other Defcon community groups.

Matt McCoy, Esq.

Matt is an attorney in Seattle practicing in privacy and security law who advises in niche technology matters such as cyberstalking, Tor exit node operation, and other information security issues. Matt has worked at places such as the FTC’s Department of Privacy and Identity Protection, the ACLU of Washington, the Senate Consumer Protection and Data Security, and as a Google Policy Fellow. He helped author State of Washington E.O. 16-01 (PDF) which created Washington’s Office of Privacy and Data Protection, and has worked on technology policy with federal, state, and local governments.

Volunteer Advisory Board

Shawn Webb (@lattera)

Shawn is an offensive and defensive security researcher, with over a decade of experience in the field. Primarily on the defensive side, Shawn co-founded HardenedBSD and sits on the core team. Shawn's most well-known offensive research is libhijack, a post-exploitation tool that makes runtime process infection easy on FreeBSD. An avid fan of Tor, he runs a public relay on a Raspberry Pi 3 running HardenedBSD. In fact, his home is wired for Tor. Plug in a device and all its traffic magically goes through Tor!

John Brooks (@jbrooks_)

John is the lead developer of Ricochet, an infrastructure-less chat program built on the Tor network and focused on ease of use. John has contributed to Tor's Onion Service specification and development. He is otherwise unremarkable and enjoys his anonymity, and lack of hassling at borders.

Paul English (@penglish1)

Paul is CEO of PreOS Security Inc and is a board member for the League of Professional System Administrator, a nonprofit professional association for the advancement of the practice of system administration from 2015 through 2017. Paul has a bachelor's degree in computer science from Worcester Polytechnic Institute obtained in 1998. He has been a UNIX & Linux system administrator and wearer of many other IT hats since 1996. More recently he has managed a few sysadmins while still racking the occasional server. In 2016, Paul ventured into a firmware security startup to help sysadmins keep their systems safe from new threats.

Wilton Gorske (@wiltongorske)

Wilton is a FOSS, encryption, and privacy advocate in his spare time. His interest in actively running relays for the Tor network piqued in 2013 after global surveillance disclosures came to light. Wilton is particularly passionate about communicating the importance of privacy technology in everyday life in a way that is understandable and practical to the general public as well as activists and organizers working towards progressive change in an increasingly hostile surveillance state and economy.

Nate Sales (@natesales)

Nate is a student and software developer with a focus on infrastructure and security. He works on many layers of the stack but most often likes ensuring packets arrive at their intended destination and writing software to make that job easier. Nate manages the software department at Team 1540, building autonomous robot control code. He also enjoys Linux, BSD and radio communication.

Brendan McMillion

Brendan is a cryptography engineer that focuses on developing and deploying standards that make the whole Internet safer. His experience includes building the first major TLS 1.3 deployment at Cloudflare and operating Certificate Transparency logs that are trusted in Chrome. He believes end-to-end encryption should be ubiquitous and is currently working on more secure and efficient encryption protocols to support that goal.

\ No newline at end of file +About

About

Emerald Onion is a U.S. 501(c)(3) nonprofit organization and transit internet service provider (ISP) based in Seattle, WA. Emerald Onion's mission is to protect privacy, anonymity, access to information, and free speech online. To further that mission, Emerald Onion operates high capacity, unfiltered Tor exit relays with direct peering to the Seattle Internet Exchange, the Fremont Cabal Internet Exchange, and the Berlin Commercial Internet Exchange. Emerald Onion envisions a world where access and privacy are the defaults; if we do not have human rights online, we will not have them offline, either.

Network

Emerald Onion's Autonomous System Numbers (ASN) is 396507.

Volunteer Directors

Christopher Sheats (he/they, @yawnbox)

yawnbox is a privacy and security engineer, and a cypherpunk. He has been a Tor educator and relay operator since 2010, and was Tor Project's first full-time grant writer in early 2016. yawnbox's volunteerism has also included work with the Seattle Privacy Coalition, City of Seattle's Community Technology Advisory Board, and the ACLU of Washington. yawnbox presented Emerald Onion to DEF CON 26 in August 2018.

Will Scott, PhD (@willscott)

Will is a research fellow at the University of Michigan studying Internet security and access. His work includes Satellite, a project scanning the internet for DNS censorship, and Onionproxy for routing public email to location-hidden services. A Seattle native, Will's previous experiences have included teaching skiing, living in China, working on the Gmail and Jigsaw teams at Google, teaching Computer Science in Pyongyang, and playing with fire.

Jake Visser (@jakevis_)

Jake is a cyber security architect living and working in Seattle. An Australian native, with a long history in government, IT security, and many forms of packet forwarding (and a couple masters degrees from the University of New South Wales to help). Jake has been involved with several not for profits, ranging from long range community wireless networks, community ISP’s to other Defcon community groups.

Matt McCoy, Esq.

Matt is an attorney in Seattle practicing in privacy and security law who advises in niche technology matters such as cyberstalking, Tor exit node operation, and other information security issues. Matt has worked at places such as the FTC’s Department of Privacy and Identity Protection, the ACLU of Washington, the Senate Consumer Protection and Data Security, and as a Google Policy Fellow. He helped author State of Washington E.O. 16-01 (PDF) which created Washington’s Office of Privacy and Data Protection, and has worked on technology policy with federal, state, and local governments.

Volunteer Advisory Board

Shawn Webb (@lattera)

Shawn is an offensive and defensive security researcher, with over a decade of experience in the field. Primarily on the defensive side, Shawn co-founded HardenedBSD and sits on the core team. Shawn's most well-known offensive research is libhijack, a post-exploitation tool that makes runtime process infection easy on FreeBSD. An avid fan of Tor, he runs a public relay on a Raspberry Pi 3 running HardenedBSD. In fact, his home is wired for Tor. Plug in a device and all its traffic magically goes through Tor!

John Brooks (@jbrooks_)

John is the lead developer of Ricochet, an infrastructure-less chat program built on the Tor network and focused on ease of use. John has contributed to Tor's Onion Service specification and development. He is otherwise unremarkable and enjoys his anonymity, and lack of hassling at borders.

Paul English (@penglish1)

Paul is CEO of PreOS Security Inc and is a board member for the League of Professional System Administrator, a nonprofit professional association for the advancement of the practice of system administration from 2015 through 2017. Paul has a bachelor's degree in computer science from Worcester Polytechnic Institute obtained in 1998. He has been a UNIX & Linux system administrator and wearer of many other IT hats since 1996. More recently he has managed a few sysadmins while still racking the occasional server. In 2016, Paul ventured into a firmware security startup to help sysadmins keep their systems safe from new threats.

Wilton Gorske (@wiltongorske)

Wilton is a FOSS, encryption, and privacy advocate in his spare time. His interest in actively running relays for the Tor network piqued in 2013 after global surveillance disclosures came to light. Wilton is particularly passionate about communicating the importance of privacy technology in everyday life in a way that is understandable and practical to the general public as well as activists and organizers working towards progressive change in an increasingly hostile surveillance state and economy.

Nate Sales (@natesales)

Nate is a student and software developer with a focus on infrastructure and security. He works on many layers of the stack but most often likes ensuring packets arrive at their intended destination and writing software to make that job easier. Nate manages the software department at Team 1540, building autonomous robot control code. He also enjoys Linux, BSD and radio communication.

Brendan McMillion

Brendan is a cryptography engineer that focuses on developing and deploying standards that make the whole Internet safer. His experience includes building the first major TLS 1.3 deployment at Cloudflare and operating Certificate Transparency logs that are trusted in Chrome. He believes end-to-end encryption should be ubiquitous and is currently working on more secure and efficient encryption protocols to support that goal.

\ No newline at end of file diff --git a/bridges/index.html b/bridges/index.html index 5392a0d..5986b99 100644 --- a/bridges/index.html +++ b/bridges/index.html @@ -1 +1 @@ -Bridges

Emerald Onion hosted Tor bridges

The following public Tor bridges that are hosted in Seattle, WA, United States.

Please see to Tor Project's documentation on how to set a manual bridge in Tor Browser. The below configuration lines go into Tor Browser when manually entering a Tor bridge.

These bridges run on a dedicated bare-metal server, with a 10Gbps uplink. The WebTunnel bridge was built from source. The obfs4 bridges were created using Emerald Onion's bridge management script.

Per Emerald Onion's Legal FAQ, network firewall and host firewall logging is disabled. If there were any legal demands made to Emerald Onion concerning these bridges, they would be published on the Transparency Report. If Emerald Onion were forced to retain logs via a U.S. court order, we would instead cease operating these bridges. Please consider donating!

WebTunnel Bridges

webtunnel 10.0.0.2:443 F76C85011FD8C113AA00960BD9FC7F5B66F726A2 url=https://disobey.net/vM8i19mU4gvHOzRm33DaBNuM

Obfs4 Bridges

Choose only one!

obfs4 23.129.64.90:443 0DBE48B7218883A05E57237E756B622C1BCC1F7F cert=V33cEVShHItMHiT3a6AEGvYey7Jg7nc412XHzfdRX3j8lBUN94n2oFGSZ9hmM3r0jocTIA iat-mode=0

obfs4 23.129.64.91:443 711E83753F1CDD3F28319CDA8833012F1275355A cert=LREbzThqRTC2GHtYLa33+cnRv/DwQT22QYb1iySrGjyh7aIUXwzEWMQSowkLrDgMFdNXeA iat-mode=0

obfs4 23.129.64.92:443 14B05E1A3D6784AE505288B666B54C115E960502 cert=+0Mq+YT7IIuBk90shYZcWaADGlmxIXBwCc8FjHbf/VOkvLTiJWKb3qLBj+Tojddf+65xBw iat-mode=0

obfs4 23.129.64.93:443 CBBF5BC10E8FECE6511E71B3AD2CE14BF88E3449 cert=5UnVIzkpTVS3uTGYCMa9vyrS6GLiVOtiKOaxo7ZgHNDWtR+NsIGfRhtdgy1A8Deo2pE9QQ iat-mode=0

obfs4 23.129.64.94:443 21F6BA217C1A9390600D62A6DA6D4D9C9F790259 cert=id1W2fU+DRDy4I+uHZW94QkW7JhEQhW0ZsG5LkFc4804Cj8kuP6oyWZjzH33rlmhSu7JTQ iat-mode=0

obfs4 23.129.64.95:443 069ACAC5ACA9B1575293B7840212875A70895366 cert=xRKDw2Ac6a1ngucPlIT3fszgeoBu1qzghe1G1bUAhFf3YBxK2Kfu5yc0sUX9Wc5YI6JUVw iat-mode=0

obfs4 23.129.64.96:443 9535874EC2BEE28C961E35F43D0F75228885D925 cert=Ndn+2m0Gyed7869h8LHf5aV9aqvatQVWMn6it83NWGFYdZrD/GTefbAMeIvaKFrs91rGXg iat-mode=0

obfs4 23.129.64.97:443 5AFFFF99B0070D6E8140ABF0A873E9334515B020 cert=2zTQUO3ijg0iL42AL0XA/e1kjVvTuWchYDgnC+MWnWuj04hPO96ft8utCCU2iS3LIxddEQ iat-mode=0

obfs4 23.129.64.98:443 9ED6BDE66619D0CA320AFEBA52C24470CDF64A04 cert=cIZdfn9ZNqFqBQtLLi8N1p5sNh7Zmn6te8Dq730ogiaQiWgYZY9s6RFMO7oei1eU9ynlAA iat-mode=0

obfs4 23.129.64.99:443 CAFDB3585F1675C07B8F9A2383BFCCEB148A97D7 cert=aHLkQPLD65eICdeEah6OpUWq6wYt0OjBHYcida/qAATXXOiRTeT/SetAhmte8p3qRkafAA iat-mode=0

\ No newline at end of file +Bridges

Emerald Onion hosted Tor bridges

The following public Tor bridges that are hosted in Seattle, WA, United States.

Please see to Tor Project's documentation on how to set a manual bridge in Tor Browser. The below configuration lines go into Tor Browser when manually entering a Tor bridge.

These bridges run on a dedicated bare-metal server, with a 10Gbps uplink. The WebTunnel bridge was built from source. The obfs4 bridges were created using Emerald Onion's bridge management script.

Per Emerald Onion's Legal FAQ, network firewall and host firewall logging is disabled. If there were any legal demands made to Emerald Onion concerning these bridges, they would be published on the Transparency Report. If Emerald Onion were forced to retain logs via a U.S. court order, we would instead cease operating these bridges. Please consider donating!

WebTunnel Bridges

webtunnel 10.0.0.2:443 F76C85011FD8C113AA00960BD9FC7F5B66F726A2 url=https://disobey.net/vM8i19mU4gvHOzRm33DaBNuM

Obfs4 Bridges

Choose only one!

obfs4 23.129.64.90:443 0DBE48B7218883A05E57237E756B622C1BCC1F7F cert=V33cEVShHItMHiT3a6AEGvYey7Jg7nc412XHzfdRX3j8lBUN94n2oFGSZ9hmM3r0jocTIA iat-mode=0

obfs4 23.129.64.91:443 711E83753F1CDD3F28319CDA8833012F1275355A cert=LREbzThqRTC2GHtYLa33+cnRv/DwQT22QYb1iySrGjyh7aIUXwzEWMQSowkLrDgMFdNXeA iat-mode=0

obfs4 23.129.64.92:443 14B05E1A3D6784AE505288B666B54C115E960502 cert=+0Mq+YT7IIuBk90shYZcWaADGlmxIXBwCc8FjHbf/VOkvLTiJWKb3qLBj+Tojddf+65xBw iat-mode=0

obfs4 23.129.64.93:443 CBBF5BC10E8FECE6511E71B3AD2CE14BF88E3449 cert=5UnVIzkpTVS3uTGYCMa9vyrS6GLiVOtiKOaxo7ZgHNDWtR+NsIGfRhtdgy1A8Deo2pE9QQ iat-mode=0

obfs4 23.129.64.94:443 21F6BA217C1A9390600D62A6DA6D4D9C9F790259 cert=id1W2fU+DRDy4I+uHZW94QkW7JhEQhW0ZsG5LkFc4804Cj8kuP6oyWZjzH33rlmhSu7JTQ iat-mode=0

obfs4 23.129.64.95:443 069ACAC5ACA9B1575293B7840212875A70895366 cert=xRKDw2Ac6a1ngucPlIT3fszgeoBu1qzghe1G1bUAhFf3YBxK2Kfu5yc0sUX9Wc5YI6JUVw iat-mode=0

obfs4 23.129.64.96:443 9535874EC2BEE28C961E35F43D0F75228885D925 cert=Ndn+2m0Gyed7869h8LHf5aV9aqvatQVWMn6it83NWGFYdZrD/GTefbAMeIvaKFrs91rGXg iat-mode=0

obfs4 23.129.64.97:443 5AFFFF99B0070D6E8140ABF0A873E9334515B020 cert=2zTQUO3ijg0iL42AL0XA/e1kjVvTuWchYDgnC+MWnWuj04hPO96ft8utCCU2iS3LIxddEQ iat-mode=0

obfs4 23.129.64.98:443 9ED6BDE66619D0CA320AFEBA52C24470CDF64A04 cert=cIZdfn9ZNqFqBQtLLi8N1p5sNh7Zmn6te8Dq730ogiaQiWgYZY9s6RFMO7oei1eU9ynlAA iat-mode=0

obfs4 23.129.64.99:443 CAFDB3585F1675C07B8F9A2383BFCCEB148A97D7 cert=aHLkQPLD65eICdeEah6OpUWq6wYt0OjBHYcida/qAATXXOiRTeT/SetAhmte8p3qRkafAA iat-mode=0

\ No newline at end of file diff --git a/donate/index.html b/donate/index.html index 5bcb421..533d407 100644 --- a/donate/index.html +++ b/donate/index.html @@ -1 +1 @@ -Donate

Donate

Emerald Onion would not exist without the generosity of people, including the people behind Emerald Onion who are all volunteers. Grants and donations make up 100% of our income, and we would sincerely welcome your help. Being a U.S. tax-deductible nonprofit, we depend on grants and donations for deploying and maintaining privacy infrastructure.

If you are interested in donating time or IPv4 space, or volunteering, please contact us via Signal (+1 206-739-3390), Twitter (EmeraldOnion) or email (donations at emeraldonion.org) with questions.

Emerald Onion is a U.S. 501(c)(3) nonprofit, tax ID #82-2009438. Contributions are tax deductible as allowed by law. Thank you!

PayPal Giving Fund

This is our preferred method because we receive 100% of the donated amount (no fees!) https://www.paypal.com/us/fundraiser/charity/2819730

Cash, Check, or Money Order

Emerald Onion
1425 Broadway # 454
Seattle, WA 98122-3854
United States

Cryptocurrency

If a currency is not listed, please contact us to coordinate, via Signal or email.

Benevity

Your company might match donations (like if you work for Apple, Google, or Microsoft)! https://causes.benevity.org/causes/840-822009438

Teespring

https://teespring.com/emerald-onion

\ No newline at end of file +Donate

Donate

Emerald Onion would not exist without the generosity of people, including the people behind Emerald Onion who are all volunteers. Grants and donations make up 100% of our income, and we would sincerely welcome your help. Being a U.S. tax-deductible nonprofit, we depend on grants and donations for deploying and maintaining privacy infrastructure.

If you are interested in donating time or IPv4 space, or volunteering, please contact us via Signal (+1 206-739-3390), Twitter (EmeraldOnion) or email (donations at emeraldonion.org) with questions.

Emerald Onion is a U.S. 501(c)(3) nonprofit, tax ID #82-2009438. Contributions are tax deductible as allowed by law. Thank you!

PayPal Giving Fund

This is our preferred method because we receive 100% of the donated amount (no fees!) https://www.paypal.com/us/fundraiser/charity/2819730

Cash, Check, or Money Order

Emerald Onion
113 Cherry St # 279488
Seattle, WA 98104-2205
United States

Cryptocurrency

If a currency is not listed, please contact us to coordinate, via Signal or email.

Benevity

Your company might match donations (like if you work for Apple, Google, or Microsoft)! https://causes.benevity.org/causes/840-822009438

Teespring

https://teespring.com/emerald-onion

\ No newline at end of file diff --git a/history/index.html b/history/index.html index 9f813d2..9ab3f78 100644 --- a/history/index.html +++ b/history/index.html @@ -1 +1 @@ -History

History

2024-May-1

  • Emerald Onion's Board of Directors updated the Transparency Report to include the past 6 months.

2024-April-07

2024-February-28

  • Emerald Onion upgraded system memory (RAM) for all three of the Tor exit relays in Seattle to 128GB.

2023-November-28

  • Emerald Onion launched 10 public obfs4 bridges.

2023-November-12

  • Emerald Onion published a bridge management shell script for Tor operators on Github.

2023-October-31

2023-August-13

  • Emerald Onion setup one of the first Veilid headless/server nodes while attending DEF CON 31.

2023-April-30

2023-April-7

2023-March-13

  • Emerald Onion's Tor exit probability hit 3rd in the world (4.9118%) with advertised bandwidth at 1,907 MiB's and peak throughput at 5.2 Gbps symmetrical.

2022-October-31

2021-October-4

  • Emerald Onion's Tor exit traffic peaked at 10.25 Gigabits (symmetrical) at 2.77 million packets per second.

2021-September-28

  • Tor Project's synthetic bandwidth measurements made Emerald Onion temporarily look like #1 in Tor Exit providers @ 11.65 Gbps Advertised Bandwidth and 17% Exit Probability.

2021-September-19

  • Emerald Onion deployed two more AMD Epyc 7402P servers along with 80 new Tor exit relays for stress testing, for 118 relays in total.

2021-March-25

2021-March-24

  • Emerald Onion migrated 20 (of 37) relays to a new AMD Epyc 7402P system using HardenedBSD 13.

2021-February-5

2021-January-6

  • Emerald Onion upgraded their Seattle edge router to a MikroTik CCR1072-1G-8S+.

2020-August-10

  • Emerald Onion joined the League of Entropy to provide verifiable randomness as a service.

2020-June-27

2020-June-17

  • Emerald Onion deployed a Point of Presence (POP) in Fremont, California with connectivity to FCIX, thanks to a Hurricane Electric donation.

2019-August-8

  • Emerald Onion's overclocked Intel i7-8086k system became the fastest Tor relay.
  • Emerald Onion's total advertised bandwidth reached 10.9 Gbps (symmetrical).

2019-June-24

  • Emerald Onion added an Intel QuickAssist Adapter 8950 to the overclocked Intel i7-8086k relay and migrated its OS to CentOS.

2019-June-21

  • Emerald Onion reached top 4 of exit families, 5.65% exit probability, at 8.9 Gbps (symmetrical) advertised bandwidth.

2019-June-10

  • Emerald Onion migrated their Intel Xeon D-2146NT edge router to VyOS.

2019-May-13

  • Emerald Onion deployed two Intel Xeon E5-2667 v3 relay servers using HardenedBSD 12.

2019-May-1

  • Emerald Onion reached 3.05% exit probability at 4.6 Gbps (symmetrical) advertised bandwidth.

2019-April-27

  • Emerald Onion reached top 5 of exit families at 4.04 Gbps (symmetrical) advertised bandwidth.

2019-April-15

  • Emerald Onion reached the top 10 of Tor exit families for the first time.

2019-April-8

  • Emerald Onion migrated their edge router to an Intel Xeon D-2146NT system using HardenedBSD 12.

2019-April-2

  • Emerald Onion deployed a 40-core Tor relay server using HardenedBSD and Ansible-Relayor.

2019-April-1

2019-March-12

  • Emerald Onion reached the top 11 of Tor exit families for the first time.

2019-March-6

  • Emerald Onion deployed 10 Gbps high-availability switching for their Local Area Network (LAN).

2019-February-24

  • Emerald Onion upgraded their edge router to an Intel Xeon D-1557 system.

2018-December-9

  • Emerald Onion completed IRR deployment with ARIN.

2018-November-14

  • Emerald Onion deployed an overclocked (Intel i7-8086k at 5.2 GHz) Linux server for Tor relaying.

2018-August-10

  • yawnbox presented Emerald Onion to DEF CON 26 in Las Vegas, Nevada.

2018-June-30

2018-June-2

  • Emerald Onion migrated their edge router from pfSense to HardenedBSD.

2018-March-26

2018-March-14

2017-October-27

  • Emerald Onion's 501(c)(3) tax-exempt status approved by the United States IRS.

2017-September-22

  • Emerald Onion reached top 12 of exit families for the first time.

2017-August-19

  • Emerald Onion deployed DNSSEC for forward and reverse lookup zones.

2017-July-19

  • Emerald Onion was granted their first direct-assignment IPv4 /24 subnet from ARIN.

2017-July-11

  • Emerald Onion breached 1 Gbps (symmetrical) actual throughput from Tor exit relay traffic.

2017-July-7

  • Emerald Onion deployed a 1 Gbps link to Seattle Internet Exchange (SIX).

2017-July-2

  • Emerald Onion was assigned Autonomous System Number (ASN) 396507 by ARIN.
  • Emerald Onion turned on their first Tor exit relays.

2017-June-30

  • Emerald Onion was granted their first direct-assignment IPv6 /36 subnet from ARIN.

2017-June-19

  • Emerald Onion deployed this website, emeraldonion.org.

2017-June-15

  • Emerald Onion received nonprofit incorporation approval by Washington's Secretary of State.
\ No newline at end of file +History

History

2024-August-10

2024-July-24

  • Emerald Onion changed its mailing address to 113 Cherry St # 279488, Seattle, WA 98104-2205, United States

2024-May-1

  • Emerald Onion's Board of Directors updated the Transparency Report to include the past 6 months.

2024-April-07

2024-February-28

  • Emerald Onion upgraded system memory (RAM) for all three of the Tor exit relays in Seattle to 128GB.

2023-November-28

  • Emerald Onion launched 10 public obfs4 bridges.

2023-November-12

  • Emerald Onion published a bridge management shell script for Tor operators on Github.

2023-October-31

2023-August-13

  • Emerald Onion setup one of the first Veilid headless/server nodes while attending DEF CON 31.

2023-April-30

2023-April-7

2023-March-13

  • Emerald Onion's Tor exit probability hit 3rd in the world (4.9118%) with advertised bandwidth at 1,907 MiB's and peak throughput at 5.2 Gbps symmetrical.

2022-October-31

2021-October-4

  • Emerald Onion's Tor exit traffic peaked at 10.25 Gigabits (symmetrical) at 2.77 million packets per second.

2021-September-28

  • Tor Project's synthetic bandwidth measurements made Emerald Onion temporarily look like #1 in Tor Exit providers @ 11.65 Gbps Advertised Bandwidth and 17% Exit Probability.

2021-September-19

  • Emerald Onion deployed two more AMD Epyc 7402P servers along with 80 new Tor exit relays for stress testing, for 118 relays in total.

2021-March-25

2021-March-24

  • Emerald Onion migrated 20 (of 37) relays to a new AMD Epyc 7402P system using HardenedBSD 13.

2021-February-5

2021-January-6

  • Emerald Onion upgraded their Seattle edge router to a MikroTik CCR1072-1G-8S+.

2020-August-10

  • Emerald Onion joined the League of Entropy to provide verifiable randomness as a service.

2020-June-27

2020-June-17

  • Emerald Onion deployed a Point of Presence (POP) in Fremont, California with connectivity to FCIX, thanks to a Hurricane Electric donation.

2019-August-8

  • Emerald Onion's overclocked Intel i7-8086k system became the fastest Tor relay.
  • Emerald Onion's total advertised bandwidth reached 10.9 Gbps (symmetrical).

2019-June-24

  • Emerald Onion added an Intel QuickAssist Adapter 8950 to the overclocked Intel i7-8086k relay and migrated its OS to CentOS.

2019-June-21

  • Emerald Onion reached top 4 of exit families, 5.65% exit probability, at 8.9 Gbps (symmetrical) advertised bandwidth.

2019-June-10

  • Emerald Onion migrated their Intel Xeon D-2146NT edge router to VyOS.

2019-May-13

  • Emerald Onion deployed two Intel Xeon E5-2667 v3 relay servers using HardenedBSD 12.

2019-May-1

  • Emerald Onion reached 3.05% exit probability at 4.6 Gbps (symmetrical) advertised bandwidth.

2019-April-27

  • Emerald Onion reached top 5 of exit families at 4.04 Gbps (symmetrical) advertised bandwidth.

2019-April-15

  • Emerald Onion reached the top 10 of Tor exit families for the first time.

2019-April-8

  • Emerald Onion migrated their edge router to an Intel Xeon D-2146NT system using HardenedBSD 12.

2019-April-2

  • Emerald Onion deployed a 40-core Tor relay server using HardenedBSD and Ansible-Relayor.

2019-April-1

2019-March-12

  • Emerald Onion reached the top 11 of Tor exit families for the first time.

2019-March-6

  • Emerald Onion deployed 10 Gbps high-availability switching for their Local Area Network (LAN).

2019-February-24

  • Emerald Onion upgraded their edge router to an Intel Xeon D-1557 system.

2018-December-9

  • Emerald Onion completed IRR deployment with ARIN.

2018-November-14

  • Emerald Onion deployed an overclocked (Intel i7-8086k at 5.2 GHz) Linux server for Tor relaying.

2018-August-10

  • yawnbox presented Emerald Onion to DEF CON 26 in Las Vegas, Nevada.

2018-June-30

2018-June-2

  • Emerald Onion migrated their edge router from pfSense to HardenedBSD.

2018-March-26

2018-March-14

2017-October-27

  • Emerald Onion's 501(c)(3) tax-exempt status approved by the United States IRS.

2017-September-22

  • Emerald Onion reached top 12 of exit families for the first time.

2017-August-19

  • Emerald Onion deployed DNSSEC for forward and reverse lookup zones.

2017-July-19

  • Emerald Onion was granted their first direct-assignment IPv4 /24 subnet from ARIN.

2017-July-11

  • Emerald Onion breached 1 Gbps (symmetrical) actual throughput from Tor exit relay traffic.

2017-July-7

  • Emerald Onion deployed a 1 Gbps link to Seattle Internet Exchange (SIX).

2017-July-2

  • Emerald Onion was assigned Autonomous System Number (ASN) 396507 by ARIN.
  • Emerald Onion turned on their first Tor exit relays.

2017-June-30

  • Emerald Onion was granted their first direct-assignment IPv6 /36 subnet from ARIN.

2017-June-19

  • Emerald Onion deployed this website, emeraldonion.org.

2017-June-15

  • Emerald Onion received nonprofit incorporation approval by Washington's Secretary of State.
\ No newline at end of file diff --git a/index.html b/index.html index 95feaa3..f6148a6 100644 --- a/index.html +++ b/index.html @@ -1 +1 @@ -Emerald Onion
avatar
Emerald Onion
Building public-use privacy infrastructure centered on human rights since 2017.

Emerald Onion is a U.S. 501(c)(3) nonprofit organization and transit internet service provider (ISP) based in Seattle, WA. Emerald Onion's mission is to protect privacy, anonymity, access to information, and free speech online. To further that mission, Emerald Onion operates high capacity, unfiltered Tor exit relays with direct peering to the Seattle Internet Exchange, the Fremont Cabal Internet Exchange, and the Berlin Commercial Internet Exchange. Emerald Onion envisions a world where access and privacy are the defaults; if we do not have human rights online, we will not have them offline, either.

Status

\ No newline at end of file +Emerald Onion
avatar
Emerald Onion
Building public-use privacy infrastructure centered on human rights since 2017.

Emerald Onion is a U.S. 501(c)(3) nonprofit organization and transit internet service provider (ISP) based in Seattle, WA. Emerald Onion's mission is to protect privacy, anonymity, access to information, and free speech online. To further that mission, Emerald Onion operates high capacity, unfiltered Tor exit relays with direct peering to the Seattle Internet Exchange, the Fremont Cabal Internet Exchange, and the Berlin Commercial Internet Exchange. Emerald Onion envisions a world where access and privacy are the defaults; if we do not have human rights online, we will not have them offline, either.

Status

\ No newline at end of file diff --git a/legal/index.html b/legal/index.html index 63fb0d2..6e5ea10 100644 --- a/legal/index.html +++ b/legal/index.html @@ -1 +1 @@ -Legal

Legal FAQ

What is Emerald Onion?

Emerald Onion is a Washington State-based not-for-profit corporation and encrypted transit internet service provider. Emerald Onion works to protect privacy, anonymity, access to information, and free speech online. To further that mission, we operate high-capacity, fully open Tor exit routers with connectivity to the Seattle Internet Exchange.

By supporting transit of encrypted traffic, Emerald Onion protects the human rights and civil liberties of those subjected to censorship and surveillance. By implementing emerging privacy and anonymity-focused services, Emerald Onion promotes the development and normalization of those technologies. Through publishing, consulting, and advocacy, Emerald Onion furthers academic research and awareness for the development of new, privacy-preserving techniques.

What is Tor and Why Does Emerald Onion Run Tor Exit Routers?

Tor is a research project funded by a multitude of nonprofits, NGOs, the U.S. National Science Foundation, and the U.S. Department of State. Its primary goal is to provide people in hostile environments with unsurveilled and uncensored access to the Internet. Running Tor exit routers is our way of supporting people that have something important to read or say and undermining global mass surveillance by oppressive regimes.

To learn more about Tor, see:

How Can I Tell if an IP Address is Actually an Emerald Onion Tor Exit Router?

The Tor Project validates IP addresses of Tor routers at https://exonerator.torproject.org/. You can use this site to verify the status of Emerald Onion's Tor routers by entering the IP address in question.

What Information Does Emerald Onion Retain?

Emerald Onion does not log any network information, not even on our perimeter firewall and router.

The Digital Millennium Copyright Act (DMCA) offers four safe harbors to protect ISPs from copyright liability for the acts of their users, provided that certain requirements are met (17 U.S.C. § 512). Emerald Onion is a section 512(a) “conduit” provider.

Emerald Onion Repeat Infringer Termination Policy

Emerald Onion does not have subscribers or account holders and cannot identify the IP addresses of individuals who send communications over the Tor network. Nonetheless, it is our policy to terminate the use of Emerald Onion by repeat infringers in appropriate circumstances.

Email Spam

Emerald Onion does not provide or use any manner of email service on its premises, nor does it provide access to port 25 on its servers. Please direct your complaint to the mail server operator given in the email header so they can handle abuse according to their laws and policies.

Contact Info

We would be happy to answer any questions you have about our Tor exit routers that are not covered by this page. Please contact us at abuse@emeraldonion.org. If email is not an option, our physical address is:

Emerald Onion
1425 Broadway # 454
Seattle, WA 98122-3854
United States

\ No newline at end of file +Legal

Legal FAQ

What is Emerald Onion?

Emerald Onion is a Washington State-based not-for-profit corporation and encrypted transit internet service provider. Emerald Onion works to protect privacy, anonymity, access to information, and free speech online. To further that mission, we operate high-capacity, fully open Tor exit routers with connectivity to the Seattle Internet Exchange.

By supporting transit of encrypted traffic, Emerald Onion protects the human rights and civil liberties of those subjected to censorship and surveillance. By implementing emerging privacy and anonymity-focused services, Emerald Onion promotes the development and normalization of those technologies. Through publishing, consulting, and advocacy, Emerald Onion furthers academic research and awareness for the development of new, privacy-preserving techniques.

What is Tor and Why Does Emerald Onion Run Tor Exit Routers?

Tor is a research project funded by a multitude of nonprofits, NGOs, the U.S. National Science Foundation, and the U.S. Department of State. Its primary goal is to provide people in hostile environments with unsurveilled and uncensored access to the Internet. Running Tor exit routers is our way of supporting people that have something important to read or say and undermining global mass surveillance by oppressive regimes.

To learn more about Tor, see:

How Can I Tell if an IP Address is Actually an Emerald Onion Tor Exit Router?

The Tor Project validates IP addresses of Tor routers at https://exonerator.torproject.org/. You can use this site to verify the status of Emerald Onion's Tor routers by entering the IP address in question.

What Information Does Emerald Onion Retain?

Emerald Onion does not log any network information, not even on our perimeter firewall and router.

The Digital Millennium Copyright Act (DMCA) offers four safe harbors to protect ISPs from copyright liability for the acts of their users, provided that certain requirements are met (17 U.S.C. § 512). Emerald Onion is a section 512(a) “conduit” provider.

Emerald Onion Repeat Infringer Termination Policy

Emerald Onion does not have subscribers or account holders and cannot identify the IP addresses of individuals who send communications over the Tor network. Nonetheless, it is our policy to terminate the use of Emerald Onion by repeat infringers in appropriate circumstances.

Email Spam

Emerald Onion does not provide or use any manner of email service on its premises, nor does it provide access to port 25 on its servers. Please direct your complaint to the mail server operator given in the email header so they can handle abuse according to their laws and policies.

Contact Info

We would be happy to answer any questions you have about our Tor exit routers that are not covered by this page. Please contact us at abuse@emeraldonion.org. If email is not an option, our physical address is:

Emerald Onion
113 Cherry St # 279488
Seattle, WA 98104-2205
United States

\ No newline at end of file diff --git a/peering/index.html b/peering/index.html index 8a6a1ae..c59523c 100644 --- a/peering/index.html +++ b/peering/index.html @@ -1,4 +1,4 @@ -Peering

Peering

Peering with Emerald Onion is an excellent way to contribute to the Tor network! We strongly recommend peering with us if you're a member of the following Internet Exchanges:

  • Seattle Internet Exchange
  • Fremont Cabal Internet Exchange
  • Berlin Commercial Internet Exchange

Emerald Onion has an open peering policy; in some circumstances, we are willing to peer over tunnels. All we ask is that:

  • Do not point default or static routes at Emerald Onion without a signed written agreement.
  • Keep your contact information up-to-date (preferably in PeeringDB).

View our PeeringDB information at https://as396507.peeringdb.com.

All routes have IRR records, and are RPKI signed. Check our current status at: https://bgp.he.net/AS396507

Traffic Profile

Our traffic profile is symmetrical.

Requests

You may contact peering@emeraldonion.org for requests.

Seattle Internet Exchange details

206.81.81.158
+Peering

Peering

Peering with Emerald Onion is an excellent way to contribute to the Tor network! We strongly recommend peering with us if you're a member of the following Internet Exchanges:

  • Seattle Internet Exchange
  • Fremont Cabal Internet Exchange
  • Berlin Commercial Internet Exchange

Emerald Onion has an open peering policy; in some circumstances, we are willing to peer over tunnels. All we ask is that:

  • Do not point default or static routes at Emerald Onion without a signed written agreement.
  • Keep your contact information up-to-date (preferably in PeeringDB).

View our PeeringDB information at https://as396507.peeringdb.com.

All routes have IRR records, and are RPKI signed. Check our current status at: https://bgp.he.net/AS396507

Traffic Profile

Our traffic profile is symmetrical.

Requests

You may contact peering@emeraldonion.org for requests.

Seattle Internet Exchange details

206.81.81.158
 2001:504:16::6:cdb
 

Fremont Cabal Internet Exchange details

206.80.238.80
 2001:504:91::80
diff --git a/transparency/index.html b/transparency/index.html
index 36382f1..2cde7ae 100644
--- a/transparency/index.html
+++ b/transparency/index.html
@@ -1 +1 @@
-Transparency

Transparency Report

Date: 2024-May-1

This is Emerald Onion’s transparency report for the period of 2017-July-2 through 2024-April-30.
Emerald Onion will update this transparency report every 6 months.

Emerald Onion is being prevented from disclosing information.
Emerald Onion is not being made to change any information.

Emerald Onion has not received any warrants.
Emerald Onion has not responded to any warrants.
Emerald Onion has not complied with any warrants.

Emerald Onion has received 2 19 U.S. Code § 1509 orders for user data.
Emerald Onion has responded to 2 19 U.S. Code § 1509 orders for user data.
Emerald Onion was unable to comply with 2 19 U.S. Code § 1509 orders for user data.

Emerald Onion has not received any National Security Letters.
Emerald Onion has not responded to any National Security Letters.
Emerald Onion has not complied with any National Security Letters.

Emerald Onion has received 2 18 U.S. Code § 2703(d) orders for user data along with 2 18 U.S. Code § 2705(b) gag orders.
Emerald Onion has responded to 2 18 U.S. Code § 2703(d) orders for user data.
Emerald Onion was unable to comply with 2 18 U.S. Code § 2703(d) orders for user data.

Emerald Onion has not received any U.S. Code Title III Wiretap orders.
Emerald Onion has not responded to any U.S. Code Title III Wiretap orders.
Emerald Onion has not complied with any U.S. Code Title III Wiretap orders.

Emerald Onion has not received any Foreign Intelligence Surveillance Act (FISA) Pen Register/Trap and Trace (PR/TT) orders.
Emerald Onion has not responded to any Foreign Intelligence Surveillance Act (FISA) Pen Register/Trap and Trace (PR/TT) orders.
Emerald Onion has not complied with any Foreign Intelligence Surveillance Act (FISA) Pen Register/Trap and Trace (PR/TT) orders.

Per Emerald Onion’s policy, as allowed by law, any related communications to the above communications will be published along with this transparency report.

Sincerely,

Christopher Sheats, Director
Will Scott, Director
Jake Visser, Director

2018-Feb-02 - 19 U.S.C. § 1509 Order

Page 1 of Emerald Onion ICE Summons Thumbnail Page 2 of Emerald Onion ICE Summons Thumbnail Page 3 of Emerald Onion ICE Summons Thumbnail Page 4 of Emerald Onion ICE Summons Thumbnail

2017-Nov-16 - 19 U.S.C. § 1509 Order

Page 1 of Emerald Onion DHS Summons Thumbnail Page 2 of Emerald Onion DHS Summons Thumbnail Page 3 of Emerald Onion DHS Summons Thumbnail Page 4 of Emerald Onion DHS Summons Thumbnail Page 5 of Emerald Onion DHS Summons Thumbnail

\ No newline at end of file +Transparency

Transparency Report

Date: 2024-May-1

This is Emerald Onion’s transparency report for the period of 2017-July-2 through 2024-April-30.
Emerald Onion will update this transparency report every 6 months.

Emerald Onion is being prevented from disclosing information.
Emerald Onion is not being made to change any information.

Emerald Onion has not received any warrants.
Emerald Onion has not responded to any warrants.
Emerald Onion has not complied with any warrants.

Emerald Onion has received 2 19 U.S. Code § 1509 orders for user data.
Emerald Onion has responded to 2 19 U.S. Code § 1509 orders for user data.
Emerald Onion was unable to comply with 2 19 U.S. Code § 1509 orders for user data.

Emerald Onion has not received any National Security Letters.
Emerald Onion has not responded to any National Security Letters.
Emerald Onion has not complied with any National Security Letters.

Emerald Onion has received 2 18 U.S. Code § 2703(d) orders for user data along with 2 18 U.S. Code § 2705(b) gag orders.
Emerald Onion has responded to 2 18 U.S. Code § 2703(d) orders for user data.
Emerald Onion was unable to comply with 2 18 U.S. Code § 2703(d) orders for user data.

Emerald Onion has not received any U.S. Code Title III Wiretap orders.
Emerald Onion has not responded to any U.S. Code Title III Wiretap orders.
Emerald Onion has not complied with any U.S. Code Title III Wiretap orders.

Emerald Onion has not received any Foreign Intelligence Surveillance Act (FISA) Pen Register/Trap and Trace (PR/TT) orders.
Emerald Onion has not responded to any Foreign Intelligence Surveillance Act (FISA) Pen Register/Trap and Trace (PR/TT) orders.
Emerald Onion has not complied with any Foreign Intelligence Surveillance Act (FISA) Pen Register/Trap and Trace (PR/TT) orders.

Per Emerald Onion’s policy, as allowed by law, any related communications to the above communications will be published along with this transparency report.

Sincerely,

Christopher Sheats, Director
Will Scott, Director
Jake Visser, Director

2018-Feb-02 - 19 U.S.C. § 1509 Order

Page 1 of Emerald Onion ICE Summons Thumbnail Page 2 of Emerald Onion ICE Summons Thumbnail Page 3 of Emerald Onion ICE Summons Thumbnail Page 4 of Emerald Onion ICE Summons Thumbnail

2017-Nov-16 - 19 U.S.C. § 1509 Order

Page 1 of Emerald Onion DHS Summons Thumbnail Page 2 of Emerald Onion DHS Summons Thumbnail Page 3 of Emerald Onion DHS Summons Thumbnail Page 4 of Emerald Onion DHS Summons Thumbnail Page 5 of Emerald Onion DHS Summons Thumbnail

\ No newline at end of file