Emerald Onion is a Seattle-based 501(c)3 not-for-profit and encrypted-transit internet service provider. We work to protect privacy, anonymity, access to information, and free speech online. To further that mission, we operate high-capacity, fully open Tor exit routers with connectivity to the Seattle Internet Exchange. Emerald Onion envisions a world where access and privacy are the defaults. If we do not have human rights online, we will not have them offline, either.

 We’re on Twitter: @EmeraldOnion


Christopher Sheats (@yawnbox)

Yawnbox is an information security engineer and cypherpunk. He has been a Tor educator for over 7 years, a Tor exit router operator for over 5 years, and was Tor Project‘s grant writer in early 2016. Yawnbox’s volunteerism also has had him involved with the Seattle Privacy Coalition, City of Seattle’s Community Technology Advisory Board, and the ACLU of Washington.

Christian Severt (@xanaduregio)

XanaduRegio is an information security engineer. He served in the U.S. Navy administering classified Command, Control, Communication, Computers & Intelligence (C4I) systems. XanaduRegio also volunteers with the Seattle Privacy Coalition.

Will Scott, PhD (@willscott)

Will is a research fellow at the University of Michigan studying Internet security and access. His work includes Satellite, a project scanning the internet for DNS censorship, and Onionproxy for routing public email to location-hidden services. A Seattle native, Will’s previous experiences have included teaching skiing, living in China, working on the Gmail and Jigsaw teams at Google, teaching Computer Science in Pyongyang, and playing with fire.

Matt McCoy, Esq. (@mhays_)

Matt is an attorney in Seattle practicing in privacy and security law who advises in niche technology matters such as cyberstalking, Tor exit node operation, and other information security issues. Matt has worked at places such as the FTC’s Department of Privacy and Identity Protection, the ACLU of Washington, the Senate Consumer Protection and Data Security, and as a Google Policy Fellow. He helped author State of Washington E.O. 16-01 (PDF) which created Washington’s Office of Privacy and Data Protection, and has worked on technology policy with federal, state, and local governments.

Advisory Board


John Brooks (@jbrooks_)

John is the lead developer of Ricochet, an infrastructure-less chat program built on the Tor network and focused on ease of use. John has contributed to Tor’s Onion Service specification and development. He is otherwise unremarkable and enjoys his anonymity, and lack of hassling at borders.

Paul English (@penglish1)

Paul is CEO of PreOS Security Inc and is a board member for the League of Professional System Administrator, a nonprofit professional association for the advancement of the practice of system administration from 2015 through 2017. Paul has a bachelor’s degree in computer science from Worcester Polytechnic Institute obtained in 1998. He has been a UNIX & Linux system administrator and wearer of many other IT hats since 1996. More recently he has managed a few sysadmins while still racking the occasional server. In 2016, Paul ventured into a firmware security startup to help sysadmins keep their systems safe from new threats.

Thomas White (@CthulhuSec)

Thomas is a British independent security researcher and Linux Systems Administrator. He has been involved in holding large corporations to account for their data security and has been a staple for journalists reporting on information security breaches. Thomas has been operating Tor exit routers for more than 8 years and has been fighting against the ever-expanding U.K. surveillance laws for as long.

Shawn Webb (@lattera)

Shawn is an offensive and defensive security researcher, with over a decade of experience in the field. Primarily on the defensive side, Shawn co-founded HardenedBSD and sits on the core team. Shawn’s most well-known offensive research is libhijack, a post-exploitation tool that makes runtime process infection easy on FreeBSD. An avid fan of Tor, he runs a public relay on a Raspberry Pi 3 running HardenedBSD. In fact, his home is wired for Tor. Plug in a device and all its traffic magically goes through Tor!