Author

Topic: service - hidden . tk - Simplest How - To Hidden Service [ Ubuntu ] (Read 2451 times)

legendary
Activity: 1552
Merit: 1047
https over Tor is useless when connecting to hidden services, because then you already have end-to-end encryption.

But when exploring clearnet from Tor, https is very useful and can protect again a malicious exit node.
newbie
Activity: 26
Merit: 0
bitcoindigi, b!z, TheKoziTwo,

What do you think about https?

Could ssl protect against malicious web gateway? Should I improve my How-To?
b!z
legendary
Activity: 1582
Merit: 1010
stay away from web-tor-gateways.

only a retard would recommend using those.

I couldn't have said it better myself.
As long as you are only looking and not doing anything illegal there is no good reason not to use such gateways.
It is better to connect to TOR yourself. How do you know the data being transferred is not being modified or recorded?
Yes, it's better, but if you trust the gateway it's a fair solution to check out a site without firing up Tor first.
I guess it depends on who you trust, and who you don't, then.
legendary
Activity: 1552
Merit: 1047
stay away from web-tor-gateways.

only a retard would recommend using those.

I couldn't have said it better myself.
As long as you are only looking and not doing anything illegal there is no good reason not to use such gateways.
It is better to connect to TOR yourself. How do you know the data being transferred is not being modified or recorded?
Yes, it's better, but if you trust the gateway it's a fair solution to check out a site without firing up Tor first.
newbie
Activity: 41
Merit: 0
thanks on instruction hidden services.
b!z
legendary
Activity: 1582
Merit: 1010
stay away from web-tor-gateways.

only a retard would recommend using those.

I couldn't have said it better myself.
As long as you are only looking and not doing anything illegal there is no good reason not to use such gateways.
It is better to connect to TOR yourself. How do you know the data being transferred is not being modified or recorded?
legendary
Activity: 1552
Merit: 1047
stay away from web-tor-gateways.

only a retard would recommend using those.

I couldn't have said it better myself.
As long as you are only looking and not doing anything illegal there is no good reason not to use such gateways.
b!z
legendary
Activity: 1582
Merit: 1010
stay away from web-tor-gateways.

only a retard would recommend using those.

I couldn't have said it better myself.
full member
Activity: 238
Merit: 100
stay away from web-tor-gateways.

only a retard would recommend using those.
newbie
Activity: 26
Merit: 0
Add little more information to my "How-To".

Would be great to hear what, someone who interesting in anonymity, want to see in my Ubuntu's How-To.
newbie
Activity: 26
Merit: 0
I know, I was using onion.to, but seems the hidden service is down.

This problem may be on http://onion.to gateway, try to reload page again.

You need no tor anymore, there are many other gateways, e.g. tor2web.org, but onion.to is my choose for the first time.

Also, web-gateways are blocked on providers side, like tor-exits. My provider do this, may be your too.
legendary
Activity: 1552
Merit: 1047
I know, I was using onion.to, but seems the hidden service is down.
legendary
Activity: 1862
Merit: 1011
Reverse engineer from time to time
I'm getting:
Quote
nfokjgfj3hxs4nwu.onion is currently unavailable. Proxy timed out while trying to connect. (4).


You need Tor for that .onion address. Anyway, funny thing this HiddenService, as my router's wireless AP is also called HiddenService, but is in fact not broadcasting it's SSID.
legendary
Activity: 1552
Merit: 1047
I'm getting:
Quote
nfokjgfj3hxs4nwu.onion is currently unavailable. Proxy timed out while trying to connect. (4).

newbie
Activity: 26
Merit: 0
Greetings,

I want to introduce my super "How-To create your own hidden service".

service - hidden . tk

My instruction is the easiest and the fastest way to setup your own hidden service.




1.
Install http://www.ubuntu.com. You may install Ubuntu into VMWare or VirtualBox.
Code:
# apt-get install -y apache2 tor 

2. Configure Apache2:
Code:
# vi /etc/apache2/ports.conf  

Code:
NameVirtualHost 127.0.0.1:80
Listen 127.0.0.1:80

    NameVirtualHost 127.0.0.1:443
    Listen 127.0.0.1:443



    NameVirtualHost 127.0.0.1:443
    Listen 127.0.0.1:443


Change apache's user from www-data to debian-tor:

Code:
# vi /etc/apache2/envvars

#export APACHE_RUN_USER=www-data
#export APACHE_RUN_GROUP=www-data
export APACHE_RUN_USER=debian-tor
export APACHE_RUN_GROUP=debian-tor

# sudo chown -R debian-tor:debian-tor /var/{lock,log}/apache2 /var/www

Close by .htaccess private_key file of your hidden service:

Code:
# vi /etc/apache2/sites-available/default 

Code:
#AllowOverride None
AllowOverride All

Code:
# cat > /var/www/.htaccess << EOF 
RedirectMatch 404 private_key
Options -Indexes
ServerSignature Off
EOF

Let's create your first hidden personal web page:
Code:
# echo "whisper: hello world..." > /var/www/index.html 
Restart apache2:
Code:
# service apache2 restart  	

3. Tor:
Let's configure Tor:

Code:
# cat >> /etc/tor/torrc << EOF 
HiddenServiceDir /var/www
HiddenServicePort 80 127.0.0.1:80
EOF
Tor almost configured !
You need no any motions ! Actually, you need no outer ip address !
You can stay behing huge amount of routers without any port forwarding.
E.g. through wi-fi of your neighbor's internet cafe.
This is wonderful, you'll see...
Restart Tor daemon:

Code:
# service tor restart  

4. www . tk
Open in your browser www . dot . tk and choose right domain name, like my service - hidden . tk.
Read your onion domain name:

Code:
# cat /var/www/hostname
nfokjgfj3hxs4nwu.onion

Set field "Your referer URL:" to http://YOUR-ONION-HUMAN-UNREADABLE-DOMAIN-NAME.onion.to
E.g. http://nfokjgfj3hxs4nwu.onion.to

5. Complete !


Visit my How-To: service - hidden . tk

Jump to: