FYI, I have been collecting the proposed names at https://trac.torproject.org/projects/tor/wiki/org/sponsors/SponsorR/Terminology. I also just added two suggestions that haven’t been on this thread: “flagrant onion service” and “open onion service”. Thanks for Alec Muffett for the former. Apologies if I missed your suggestion - please feel free to add it!
This may be the central source of our disagreement and underscores the importance of terminology. I think of "onion service" as meaning a service that is reachable only inside of Tor not merely accessible only through Tor.
I have never though of “onion service” as applying only to hidden services, starting with my initial terminology tor-dev post in February [0]. Also, the semantics of “inside” and “outside” Tor isn’t so clear to me, because hidden services seem pretty “inside” Tor to me in the ways that matter (viz. onion-encrypted, running Tor software).
Suppose someone has a sensitive file that they don't want the wrong people to obtain or obtain before, e.g., an intended public release. It would be good for them to easily tell whether the server they're trusting with that file is location protected or self-authenticated or….
I don’t think that the user should rely on the type of onion service to verify server anonymity. Instead they should have some exogenous trust in the server operator, because there are so many ways to leak server location/identity outside of its Tor configuration.
Best, Aaron
[0] https://lists.torproject.org/pipermail/tor-dev/2015-February/008256.html