the Internet Windows Android

Configure hidden services on the TOR network. Tor - Service Tor Service Tor

Over the past few months, I had to solve quite aimerous tasks several times - regularly access computers, "hidden" for NAT. While it was one stationary computer, Everything was solved by the port promotion on the home router plus dyndns. Then the laptop was added. And one more. Laptops could connect to home WiFi, and could be, for example, in the workplace. Our company provides VPN services, but it was during this period that VPN for some reason worked not stable. VPS went to move, reverse SSH tunnels. When the configuration stopped placed in the head, the idea has come to reduce the number of entities using the Tor Hidden Service.

As you know, TOR provides the ability to create "hidden" services - network names from space.onion, connecting to which is possible through any client TOR network. In this case, the purpose of anonymization server that hosts these services, the connection takes place through a "meeting place» (rendezvous points) - the computers are not closed NAT. The computer itself on which the hidden service is located may be for NAT, firewall, etc., but through the Tor network to it still can be accessed.

No sooner said than done. Install the Tor client. IN configuration file. Add two lines:
HiddenServicedir / Var / Lib / Tor / Hidden_Service / HiddenServicePort 22 127.0.0.1:22

As HiddenServicedir, specify any place in which Tor will be able to create a directory itself (if there is no) and several configuration files.
In the HiddenServicePort line, the first number is the port number to which we get access through TOR. Theoretically, you can specify not 22, but, for example, 1234.

Restart Tor. Two file will appear in the directory:

  • private_Key is a secret key of your service. Tor uses this key from this file to work. Please note that this key, the attacker can introduce themselves to your service and no one will understand anything;
  • hostName - Automatically generated file with your service name. If you delete or change this file, everything will still work.

The HostName file contains the name of your service XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
After that I have on any machine I can tell torsocks ssh xxxxxxxxxxxxxxxx.onion and get on my laptop.

For a hidden service, you can choose a less random name. To do this, use the Scallion program. The generated key places into the folder corresponding to the hidden service.

One Tor client can serve several hidden services (just specify these lines several times). Each hidden service "serves" one or more ports spoiled through TOR (specify several rows with a HiddenServicePort in a row).

Recently, interest in an anonymous network is constantly growing. And this is a lot of reasons ..

"Democratic reforms" in the world go in full swing. Governments of almost all countries now sincerely consider themselves to have the right to decide where to walk their citizens to watch and what to read. The packs of laws, "from the best motives" stamped by thought, glads and parliaments, determine the boundaries of reservations, within which the existence of users in the global network is now possible.

"You do not go there - go here. And then the snow tank will fall - you will be completely dead. "© Gentlemen of Good luck."

Another straining moment are not stopping revelations of Edward Snowden, from which it is clear that total surveillance of special services for each and every one has acquired a truly global scale. Of course, there is nothing to hide the overwhelming number of people, but it is extremely unpleasant to realize that you are under a constant cap special, each of your step is tracked and fixed, and someone regularly tries to pick up with its Skodly handms in your "dirty underwear." And absolutely do not care, for what purpose he does, good or not he has intent.

Why is it needed, this tor?

More and more people are trying to preserve the inviolability of their frequent life from a long nose of the special services. More and more people are trying to get rid of "deceic care" officials from the state and want to realize their own constitutional law Self decide where to walk that you choose where to watch and what to do.

And here the anonymous Tor network comes to the aid. Since it can provide a separate weakening of obsessive attention to a separate individual, along the way, removing almost all restrictions on moving across the World Wide Web. Tor will hide your identity on the net, it will hide everything that you did on the Internet and where we went.

In addition, the Tor network has another small practical bonus. It often allows us to bypass such an annoying thing as the IP ban on various sites. Trifle, but nice.

What is tor, and how it works

So, what is the anonymous network TOR. Tor is the Abbreviation The Onion Router (not knowing the Bourgeois, but curious - to watch the translation into). If someone is interested in tedious technical details, let him get to the TOR-A page in Wikipedia and disassembled. I want a little simpler - on the same page on Lurkomorier. I will try to explain to the "on your fingers".

Although this network and operates on the basis of the usual internet, but it does not go all the data directly from you to the server and back again, as in "big" network, and everything is run through a long chain of specialized servers and multiple encrypted at every step. As a result, the final recipient, that is, you are completely anonymous for sites - instead of your real address, absolutely left IP is displayed, having nothing to do with you. All your movements becomes impossible to track, like what you did. And the interception of your traffic also becomes completely useless.

This is in theory. In practice, sometimes not everything is so rosy. But all possible problems Let's talk later. After all, you are already tired of a long and boring accession, right? Does not tolerate quickly put and try this miracle? Well, let's go!

Let's start using TOR?

Tor is quite complex in the installation plan and adjustment. And during the time, it is not so old that the conventional "kettle" becomes the task not at all trivial. However, today everything is much easier. Smart and kind people took all the necessary modules, gathered them into a coherent bunch, set up everything as it was necessary and shook it into a single package. This package is called. And after downloading, all the way with him comes down to the usual unpacking and the subsequent tramp of the button "Want to Tor!". And Tor appears.

Of course, computer geeks and those who have nothing to do or want to entertain their CDA, as before can download all the necessary for individual modules and to gnaw a multi-technical "Kama Sutra", trying to tie it all into one, and somehow get up and running The resulting design. We wish them good luck, and they ourselves do more thanks.

I advise you to pay attention to the link on this tab. Check Internet Settings Tor" Click on it will help you finally make sure that you are actually now in an anonymous network. By the way, there is also a link on a brief guide.

So, you are now invisible. However, while your head has not finally spoken from anonymity and imaginary impunity, sleeping slightly spoil your mood. Just like that of personal harmfulness.

I just have to tell you about some of the "pitfalls" the Tor network, so in search of adventure on their "lower hemisphere" You did not hurt them on the stones.

Little security in Tor

So, from what Tor will not be able to protect. Tor will not be able to protect a person from his own nonsense. If a person has some sawdust in the cervix instead of brains, or it is purposefully looking for a problem, then it will find these problems. And no torment will help here. Learn to use the brain and observe elementary caution. Another Tor will not be able to protect you from chatty programs on your computer. Any plugin or addition in the browser can at one point all your anonymity "multiply to zero". And myself browser ...

That is why in the package we consider and use a specially doped version of the fireload. By the way, about the fact that the Windows itself is one huge Trojan and a spike, someone else can be reminded? ( Linuxoids here can breathe freely - their such children's problems "Footers" do not worry). Another Tor will not be able to protect you from viruses and hackers. Well, it is not intended for this! To make yourself a normal antivirus and firewall, correctly mood them and learn to use - and sleep calmly.

The main problems of the anonymous network TOR

Okay, finishing a lyrical retreat and turn directly to the problems of the TOR network itself. The first thing that rushes into the eye is speed. Page download speed. Although the words "speed" and "rushes" here are clearly inappropriate. Pages loaded much slower than usual. This is a fee for anonymity. The page requested by you before getting to you in the browser, for a long time Cuts between servers around the world. It should, however, recognize that the situation is now much better than a couple of years ago, and with such a speed you can already live. If you get used to get used to it. Despite anything, the network is developing and growing.

Special services

Another one - and, perhaps, the main thing is the problem of the TOR network are special services. They can't accept the fact that the crowds of users are free and uncontrollably roam over the network without them " all-seeing" And constantly take all sorts of attempts to change the situation. Attempts are very different, up to frankly criminal. To viral, hacker attack and hacking, targeted infection of software and servers with Trojans. Although it is infrequent, but sometimes their efforts are completed successfully for them, and from the "Low" network falls entire segments, and "Patenn" leaves for some of the most unhappy (or the most stupid or pests). But you are not going to engage in TOR-E something criminal, right? It's all that you are not relaxed too frankly and constantly remembered that Tor is not a panacea, and any anonymity is relative. And if I decided to play gambling with the state, the question of your capture is only a matter of time.

Officials

In addition to the special services, representing the interests of states, often the problem for the anonymous Tor network represents officials from the state. The desire to "hold and not to be bred" in people who were expensive to power are indestructible. Occasionally, in relation to some things, this desire is quite justified and fair, but most often - no. And the Tolik of Freedom, the Tor-Ohm, acts on them as a red rag. In some countries, the TOR network is already prohibited. Legally. There was such an attempt in Russia. So far only in the version of the project. Will this project be the law and when, I am unknown. At the moment, the TOR network in Russia works without restrictions. They will be banned - there is something else instead of it. I will not lay out literally popular wisdom on this score, and I will say a bit softer and encruption: "There is my opposition to every action."

Hackers

Another misfortune for TOR-A is hackers. Some of them are ideological. And some simply hammed up *** (sorry for the non-parliamentary expression). From time to time, mostly during the spring or autumn aggravation they arrange a "crusade", trying to "cleanse the world of filth." At the same time, the opinion of the world itself absolutely does not care. It seems to them that they are entitled to decide for everyone. Not so long ago, "campaign" against, say, alternative porn, on the Tor network. The point in this case is quite a boggerous. However, a bunch of absolutely white sites was cut down with porn. Just like that by passing. And who said that next time they would be limited to this? So know if your favorite "Low" site suddenly stopped opening, it is quite possible that these are the actions of one of these with inflamed brains.

Infectious files

To hackers closely adjoins the problem with infected files itself Tor Browser-A. And here often overlook the ears of various special services trying instead of an anonymous network to put your Trojan to you. For example, in App Store. still offered to download infected Tor Browser. And the administration of the App Store was notified repeatedly in the fall. However, Troyan is still there. Strange situation and strange slowness. However, all the strangeness vanishes instantly, when you remember that the gentle and timid friendship between Apple Inc. and the NSA the US is growing day by day. So download files of Tor-and only from the official site, or - our engine, in fact, too, will give you the file directly from the official website.

Small drawbacks TOR.

With an overview of the more or less serious problems of the TOR network end. Let's go to small trouble. About periodically missing sites I have already spoken. Now about Russian sites in this anonymous network. They are few. But they are already there, and they are becoming more and more. And even in many surrounding forums, sections for Russians appear. So where to wander and with whom there you will find. However, the main language in the Tor network is still there is still English, and all the most delicious in this network on the Bourgeisky. Although there are always all sorts of dictionaries to your services.

Further. It should be remembered that the TOR network fundamentally is not moderated and is not controlled by anyone. Sometimes some control is found on individual sites when their owners establish the rules for their visitors. But not more. Therefore, you can quite stumble upon things that you shock. Be to this ready. Also in this network there are various scumbags, frank schizoids, maniacs and other freaks. They are full and in the "big" internet, but in an anonymous network they feel more comfortable and especially not shy. Their percentage is much less than we are trying to broadcast officials from power, but they are. And if you have minor children, I recommend to protect them from Tor.

And in general, I strongly demand to protect the Internet from children! The Internet it will only benefit. He will become much safer from this.

Well, in general, all the horror stories told. Let me remind you only about the viruses, from which TOR will not protect you - Protect yourself. Well, about the anonymity again - one hundred percent it never happens, more often use their gray substance.

And for dessert a small list of "onion" sites, so to speak, for overclocking.

Utya and bonuses - a small list of "onion" sites

By the way, if you have not realized, the Tor Browser can be opened as normal sites "large" Internet, bypassing some inconvenience, and special sites anonymous "onion" network. These sites are in a special pseudomous zone .onion (Look carefully at the address). From the usual Internet they do not open. At all. Only from the started and connected to the Tor Browser-A network.

  • Tor Wiki. (http://torwikignoueupfm.onion/) - directory of Tor-links.
  • The Hidden Wiki. (Http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page) - the first site, which should look into each new user of the Tor network. Contains links to almost all the resources of the "Low" network. Often unavailable because of the huge influx of visitors.
  • The UNCENSORED Hidden Wiki (http://zqktlwi4fecvo6ri.onion/wiki/index.php/main_page) - The Hidden Wiki mirror. Moderation is minimal.
  • TORDIR (http://dppmfxaacucguzpc.onion/) - big catalog "Onion" sites.
  • Tor Search. (http://kbhpodhnfxl3clb4.onion/), Torgle (http://zw3crggtadila2sg.onion/TORGLE), Torch. (http://xmh57jrzrnw6insl.onion/) and The Abyss. (http://nstmo7lvh4l32epo.onion/) - search engines on the TOR network, at least one of them, it works.
  • Flibusta (http://flibustahezeous3.onion/) - the mirror of the famous library in the "Low" network (RU language).
  • Onionnet (http://onionnetrtpkrc4f.onion/) - IRC network. The main language of communication is English. Different channels for discussion, up to illegal. Additional server: ftwircdwyhghzw4i.onion, renko743grixe7ob.onion, nissehqau52b5kuo.onion.
  • vtor "E. (http://da36c4h6gxbckn32.onion/) - social network. Clubs for interests, blogs, forum.
  • Ramp (http://ramp2bombkadwvgz.onion/) - the largest marketplace in the Russian-speaking segment of the TOR network. Recently, there are a lot of complaints to the actions of the administration and the frequent cases of Kidalov. (So \u200b\u200bdo not climb the beak and keep your eyes and ears open) at the same time the largest choice throughout the network. And the highest prices.
  • RUFORUM. (Http://ruforumqewhlrqvi.onion/) - Russian forum with communication and marketing of all, what is not. Recently, closed for outsiders. Registration Paid - $ 10.
  • Amberoad. (http://amberoadychffmyw.onion/) - one of the largest platforms of the shadow trading.
  • Assassination Market. (http://assmkedzgorodn7o.onion/) - a tote on guessing the date of death of all kind of bad people. Anyone can make a person in the list or raise the bet on the already existing positions. At the moment, Barack Obama and Ben Bernanke are leading.
  • Hack IT. (http://tuwrg72tjmay47uv.onion/) - Living service for hiring hackers.
  • Wikileaks. (http://zbnnr7qzaxlk5tms.onion/) - I hope you do not need to explain what it is? Mirror in the "Low" network (ENG).
  • Onion portal (http://ximqy45aat273ha5.onion/) - Guide on the "Low" network (RU).
  • http://k4bmdpobhqdguh2y.onion/ - a blog about new hidden network services (eng).
  • Lucochan (Http://562tqunvqdece76h.onion/Lukochan/) - large Borda (ENG, RU).
  • Silk Road. (Http://silkroadvb5piz3r.onion) - another large anonymous marketplace (ENG).
  • Keys Open Doors. (http://wdnqg3ehh3hvalpe.onion/) - site about hacking gaming consoles and all sorts of gadgets (ENG).
  • http://n2wrix623bp7vvdc.onion/hackingservices.html - resource about hacking social networks etc. (ENG).

All political and revolutionary-partisan resources here do not bring intentionally. Who needs, finds himself.

We need a configuration file, so create it in the catalog C: \\ Tor \\, this file must have a name torrc.c.:

Echo (\u003e C: \\ Tor \\ Torrc

Check whether the service is launched with the settings file (it does not contain errors) can be such a command:

Now set the Tor service, which will read the settings from the file C: \\ Tor \\ Torrc:

Remember that options can be indicated after the flag -Options.Otherwise they will be ignored.

To start and stop service, use commands:

C: \\ Tor \\ Tor.exe --Service Start C: \\ Tor \\ Tor.exe --Service Stop

To delete the service:

C: \\ Tor \\ Tor.exe --Service Stop C: \\ Tor \\ Tor.exe --Service Remove

Please note that you first need to stop the service, and then delete it.

By default, the TOR service listens 9050 So you can check whether it is launched by a team that shows if the port 9050 is listening:

Netstat -aon | Findstr ": 9050"

You can also use the following command:

For / f "tokens \u003d 1,2,3,4,5 *"% i in ( "netstat -aon ^ | findstr": 9050 "^ | findstr / i listening") do echo% j% l & @tasklist | Findstr% M.

Now that the TOR service is installed and running, several recipes will be shown how it can be used.

Using TOR in Windows to download files from blocked sites

Some sites with media content allow you to view, but do not allow you to download files to yourself hDD. An example of this YouTube site.

YouTube (for now) We have not blocked, but I think among you there are those who have to go to the favorite blocked site through Tor browserBut from which it is impossible to download the video due to the fact that the switching program does not use TOR and, of course, cannot access it.

I'll show you on the example JdownLoader.(free, open source code, Supports a huge number of sites and file sharing, cross-platform), but this instruction will suit any such programs if they support SOCKS 5 or SOCKS 4. JDownLoader site , direct download link.

In jdownloader go to Settings, then tab Connection manager and click on the button Add. Replace Type by SOCKS5., in field Host / port Enter localhost.and 9050 :

Click OKto save the settings and closing the window.

JdownLoader rotates connections. So if you download from a locked site, then remove the checkbox Without proxy:

Now you can not only browse again, but also download from blocked sites!

Setting up a hidden service in Windows

The essence of the hidden service is that on your computer (it can be rented VPS. Or yours home computer) A web server is running. Your computer must have access to the Tor network. Through this network, any address of your hidden service (domain of the * .onion type) can go to your website that serves your web server. You do not need to worry about acquiring a domain name (free of charge), about DNS, white IP, etc. - Tor network itself take care of it. To start a hidden service, only two things are required:

  • working web server
  • connect to Tor network

If you have Linux, then you can approach the "Configuring the Hidden Tor Service in Arch Linux / Blackarch". If you want to run a hidden service from Windows, then it is written how to do it.

We need us to have a working web server. To configure it, refer to the instructions "".

Now that the web server is installed and its performance is checked, proceed to configure the hidden service in Windows.

Your site for the hidden service should already work and open from Lockal. I will create a plug page for a demonstration of work. In folder C: \\ Server \\ Data \\ Htdocs \\ I'm creating new folder hidden.and in it the file index.htm. With the following conjunction:

Works!

Hidden service works!

Consequently, this file is available with local Server at http: // localhost / hidden /:

Now open configuration apache file C: \\ Server \\ Bin \\ Apache24 \\ CONF \\ httpd.conf And add there:

Listen 127.0.0.1:9475 Documentroot "C: / Server / Data / Htdocs / Hidden /" ServerName Localhost Serveradmin [Email Protected] Options + Indexes + FollowovymLinks + ExecCGI AllowOverride All Order Deny, Allow Allow from All Require All Granted

In principle, you just need to edit only a line in it. Documentroot "C: / Server / Data / Htdocs / Hidden /" - She shows the way to your website, which will be a hidden Tor service.

Restart the Apache web server to change the changes:

C: \\ Server \\ Bin \\ Apache24 \\ Bin \\ httpd.exe -k Restart

Now your site for hidden service should be available with local computer At http: // Localhost: 9475

Go to Tor setup.

Open any text editor file C: \\ Tor \\ Torrc And copy to it:

HiddenServicedir "C: / Tor / Hidden_Service /" HiddenServicePort 80 127.0.0.1:9475

Note how we recorded C: \\ Tor \\ Hidden_Service \\ - instead \ we use / . Also be sure to use quotes.

Restart the Tor service:

C: \\ Tor \\ Tor.exe --Service Stop C: \\ Tor \\ Tor.exe --Service Start

The folder will automatically be generated. hidden_Service. And two files in it. In file C: \\ Tor \\ Hidden_Service \\ HostName you will see domain name For your hidden service:

In my case it is 77pam5zhvzu5jhst.onion, we try to open in the browser Tor:

It may take a few minutes before the hidden service will open in the browser.

To change the settings in Firefox, go to Settings -\u003e Additional -\u003e Network -\u003e Set up. In the window that opens, put the switch to Manual setting Proxy Server. In field Node Socks. Enter 127.0.0.1 , and the field Port- 9050 . Put the switch on SOCKS 5.. Click OKto save the settings.

System System Proxy Settings in Windows

Windows has a WinHTTP proxy program. It allows you to set a proxy settings for the system as a whole. By logic it is expected that all applications must use system-wide settings, but this does not happen. Windows uses WinHTTP for certain services, for example, to download windows updates and perform checks for canceled certificates. Nevertheless, you may find applying it.

With the help of the team

Netsh WinHttp Import Proxy Source \u003d IE

you can import settings from Internet Explorer.

And the following commands you can view / reset the use of system-wide settings:

Netsh Winhttp show Proxy Netsh Winhttp Reset Proxy

Access to TOR from PHP program

If you installed the TOR service and to configure the hidden service you installed a web server, you can also receive data from the TOR network in your PHP program (Using CURL). An example of a working code:

Using TOR with tools for penzes in Windows

If the program supports work with SOCKS 5 or SOCKS 4, then specify as a proxy server 127.0.0.1 , and as a port - 9050 .

If the program only supports HTTP proxy, then it is necessary to except PRIVOXY. How to do this on the example on the example of JSQL Injection is shown.

How to prevent DNS leakage in Windows

To connect to sites and hosts on the Internet, your computer constantly makes DNS requests. The essence of these requests is as follows:

"Which IP address has the name ya.ru" "Which IP address has the name Super-site.ru" "What is the name of the name Any-site.ru" ................ .........................

Moreover, these requests are transmitted in unencrypted. If someone hasnfify (listens) Your traffic When you use the TOR network through a regular web browser, then it can indirectly find out the DNS requests outgoing from your computer, which sites you attend. By the way, since these DNS requests and answers are not encrypted, the attacker can modify the answers that come to you. As a result, one of the attack options can be performed, or you can be "blocked" access to certain sites.

Also, knowing which DNS server you use, you can assume from which country you are and even in what Internet provider use:

You can make settings, thanks to which DNS requests will be transmitted via the TOR network. Thanks to this: these requests will be made to you from another computer, as well as these requests will be passed part of the path (from your computer to the output node - Tor nodes) by encrypted compound.

Let's start by checking what the name server is used by default. To do this, run on the command prompt:

Nslookup.exe ya.ru.

In the resulting output, information about the DNS server is important, more precisely its address:

Server: Google-Public-Dns-a.google.com Address: 8.8.8.8

If you have already running the TOR service, then stop it and remove it from the autorun.

To redirect DNS requests via Tor, open (or create if it is missing) file C: \\ Tor \\ Torrc And add a string to it:

DNSPORT 53.

Check if the service is launched with the settings file (it does not contain errors):

C: \\ Tor \\ Tor.exe -f "C: \\ Tor \\ Torrc"

Now install the TOR service, which will read the settings from the C: \\ Tor \\ Torrc file:

C: \\ Tor \\ Tor.exe --Service Install -OPTIONS -F "C: \\ Tor \\ Torrc"

Go to the settings of the network adapter:

Find " Internet Protocol Version 4 (TCP / IPv4)"In the settings menu that opens, set a tick for a user DNS server and enter the address 127.0.0.1 :

Save settings.

We again check which name server is used:

Nslookup.exe ya.ru.

Now the information is indicated as a server:

Server: Unknown Address: 127.0.0.1

Excellent, then our settings worked.

To verify anonymity settings, including DNS leaks, you can use the following services:

By the way, note that there is no DNS leakage, the IP address is changed, but there is a fatal problem with anonymity: my real IP address is revealed through WebrTC:

And this is despite the fact that with the same settings 2IP.ru shows:

IP leak through webrtc no

Be very careful to this! WEBRTC also breaks the local IP address. What is characteristic, if I switch to OpenVPN, now my real IP (this is the one that Thai) is not disclosed.

WEBRTC is very difficult to overcome (one of the cardinal measures is a full javascript shutdown) - which is why when you are really important a high degree of anonymity (and not just go to the site to bypass blocking), it is recommended to use Tor Browser, in which additional plugins and settings are built Enhance the level of anonymity.

Apparently, the Tor network remains Nevzloman. At least according to the internal NSA report of 2012, although this organization has the opportunity in certain cases to disclose the identity of certain NODs, as a whole, they are not able to disclose anyone on request. Yes, and these disclosures occurred on the focus of the type of error in the Firefox browser, which was included in Tor Bundle and others like. If you use TOR correctly, the probability of disclosure is extremely small.

2. TOR is used not only by criminals

Contrary to promotional opinion, TOR is used not only by criminals, pedophiles and other bad terrorists. This, to put it mildly, is far away. Activists of various kinds, journalists, just people who loving privacy make up a portrait of Tor users. Personally, I am very impressed by the position of the Tor developers, responsible for the question "And what do you have, what to hide?" The phrase: "No, it's not a secret - it's just not your business."
And the criminals have a big arsenal of funds, from a person's change to stolen devices or network access, from botnets to Trojan viruses. Using and promoting Tor you help the criminals no more than using the Internet.

3. Tor has no hidden loopholes and backdoors

It is rumored that Tor was created by the military, and they specially made themselves hidden loopholes. Although Tor was initially funded by the US Navy, since then its code is in public domain, and many cryptography specialists studied its sources. Everyone can explore them. And now the project is working on enthusiasts, privacy and anonymity in the Internet.
It also provides information that the US intelligence services hold about 60% of all NODs - but it is most likely distorted information that about 60% of financing allocate the United States in grants.

4. There were no cases of condemnation of anyone for the support of the relay-node

True, in Europe, in this Sightstone of human rights and legitimate paradise, or rather - in Austria, literally the other day of a person who kept the day off, accused of complicity, because Through this node passed the traffic of illegal content. So the risk of the content of the output node is obvious. Well, the relay-nodes should be out of danger, since they do not know according to the network scheme, where the request came from where he sent, nor any traffic. And to prove the traffic pass through Relay is almost impossible.

5. Tor is easy to use.

Many think that Tor is something complicated for hackers and computer geniuses. In fact, the developers have already simplified its use as possible - just download Tor Browser, and when you start it you will automatically use the TOR network. No settings, commands in the command line and other things.

6. Tor is not as slow as you think

A couple of years ago, the network was slow. Now access to sites occurs with quite acceptable speed. Yes, torrents download via Tor cannot - and slowly, and harmful to the network. But you can conduct any other familiar activity without irritation.

7. Tor is not a panacea

Using Tor, still need to follow several rules and sort out a little about how it works, that he can and what he cannot, so as not to reduce the "no" all his efforts. If you are using the Tor Browser and, at the same time, log in to Facebook, meaning in this a bit. Understand how it works and use it competently.

Personally, I am a supporter of preserving privacy and anonymity on the Internet. Promotion and urge everyone to support the Tor project as the necessary and useful, especially in the light of sad events with new laws "against the Internet". Support Tor network. Install the relay - if you can select at least 50 KB / s in your channel for TOR, this will already be enough.

Why am I speaking for the privacy and the possibility of anonymity. After all, I am a law-abiding citizen and I have nothing to hide, right?
Well, for this personally I can answer the following arguments:

  • i can have nothing to hide, but what I do is not your business
  • times change, people change, and the laws change. I wrote something in the comments, and a couple of years after the adoption of the next chic law, it suddenly became possible to count to extremist statements
  • i do not believe that all people who are trying to follow my actions are crystal honest and loyal servants of the benemis. That no one will try to use the information obtained in their dirty selfish purposes.

It will be interesting to know your opinion on privacy and anonymity,% UserName%

,
For the quality of information of the responsibility is not

Tor allows customers and repeaters to provide the so-called. Hidden Services (Services). This means that you can make a public Web, SSH or other server without disclosing its IP address to users. Moreover, your hidden service can work for a firewall (Firewall), because There is no need for public addressing.

If the TOR is installed, you can see how hidden services work, visiting one of our official sites:

Idnxcnkne4qt76tg.onion/ - The Tor Project WebSite
j6im4v42ur6dpic3.onion/ - The Tor Package Archive
p3igkncehackjtib.onion/ - The Tor Media Archive

Other examples of reliable hidden sites are the DUCK DUCK GO search engine and someone's demonstration site.

This page describes the steps you need to configure your own hidden site. Detailed information and technical details are located.

Pitch zero: Install Tor

Before you start, you need to make sure that:

A. Tor installed and works,
b. You set it up correctly.

Windows users must familiarize themselves with the "Windows Guide",
OS X users - with "Manual for OS X",
and Linux / BSD / UNIX users - with "manual for Unix"

Step One: Install a local web server

First you have to install a web server on your computer. Configuring a web server may be not easy. We will not describe how to install a web server. If you are stuck or want to learn more, then find a friend who can help you. We recommend that you use a separate web server for your hidden site, because even if you already have a installed server, you may need it in the future for the usual site.

You will need to configure your web server so that it does not disclose information about you, your computer or your location. Be sure to configure the web server to answer only local queries (if people can access the web server directly, they will confirm that it is your computer that provides a hidden service). Make sure that the error messages issued by the web server do not specify the name of your computer or other personal information. Think about the version of the web server room in the sandbox (Sandbox) or in a virtual machine to limit damage from program code vulnerabilities.

After your web server is installed, check it out: Open the browser and try to contact Localhost: 8080 /, where "8080" is the port number that you have chosen during installation (you can choose any port, 8080 is just example). Then try placing any file in the root HTML folder and make sure it is available.

Step two: Configure your hidden service

Now you need to configure your hidden service and redirect it to the local web server.

First, open the file torrc.c. In your favorite text editor. (Read https://www.torproject.org/docs/faq.html.en#torrc to find out what it means). In about the middle of the file, find a line that looks like this:

### This Section Is Just for Location-Hidden Services ###
This section of the file consists of row groups, each of them represents one hidden service. Now they are all deactivated (lines begin with #), that is, hidden services are turned off. Each group of strings consists of one hiddenserviced row and one or more hiddenserviceport rows.

HiddenServicedir. - This is a folder where TOR will store information about this hidden service. In particular, Tor will create a file with the name HostName, which will show you .ONion address. You do not need to add other files to this folder, as it stores secret information!

HiddenServicePort. Allows you to configure the virtual port (i.e., the port to which will be received from the outside) and the IP address with the port to redirect to the virtual port.

Add the following instructions in your Torrc:

HiddenServicedir / Library / Tor / Var / Lib / Tor / Hidden_Service /

Change HiddenServicedir. So that it pointed to an existing folder with reading and changes for the user under which TOR will work. The above example should work if you are using TOR in OS X. In Unix, try "/ home / username / hidden_service /" and register your username instead of "username". You can use Windows in Windows:

HiddenServicedir C: \\ Users \\ Username \\ Documents \\ Tor \\ Hidden_Service
HiddenServicePort 80 127.0.0.1:8080
Save torrc.c. And restart Tor.

If Tor started - this is good. Otherwise, something went wrong. Check your log files on warnings or errors. Usually a problem in typing in the Torrc file or in the wrong folder access settings.

When Tor boots, it, if necessary, will automatically create the HiddenServicedir folder that you specified and create two files in it.

private_Key.

First of all, TOR will create a new pair of keys (open and closed) for your hidden service and save them in the "Private_Key" file. Do not transfer this key to anyone - otherwise another site can be represented as yours.

hostName.

Another file created by Tor`om is called "HostName". There is a shortened version of your open key, which will look like duskgxobans5g5jn.onion. This is a public name for your service and you can tell it to people, publish on the site, place on a business card, etc.

If the TOR works under a different username, for example, in OS X, Debian or Redhat, then you may have to switch to the root user to access the viewer of these files.

After you restart the TOR, the program is engaged in the selection of input nodes ("Introduction Points") on the TOR network and the generation of the Hidden Service descriptor ("Hidden Service Descriptor"). This is a signed list of introductory nodes along with the full open key of the hidden service. Tor Anonymously publishes this description on routing table servers. Other people anonymously copy this description from those servers while attempting to connect to your service.

Try copying the contents of the HostName file to the browser. If everything works, then you will receive that HTML page that was configured earlier. If it does not work, then check the log files and go to the settings until it works.

Step Three: Additional Tips

If you are going to keep the work of your hidden service for a long time, save somewhere a copy of the Private_Key file.

If you want to redirect multiple virtual ports to one hidden service, then simply add additional lines indicating HiddenServicePort. If you want to provide several hidden services through one TOR client, add HiddenServicedir lines. All subsequent species HiddenServicePort belong to the previous line with HiddenServicedir until you add another:

HiddenServicedir / Tor / Hidden_Service /
HiddenServicePort 80 127.0.0.1:8080

HiddenServicedir / usr / local / etc / tor / other_hidden_service /
HiddenServicePort 6667 127.0.0.1:6667
HiddenServicePort 22 127.0.0.1:22

Some aspects of anonymity, which you must remember:

Be careful and do not let your web server disclose personal information about you, your computer or location. Visitors may be able to determine the type of server - THTTPD or Apache, for example - and learn something about your operating system.

If the computer is not connected to the Internet constantly, then your service will not be constantly available. This provides additional information to your opponents.

If you have suggestions for improving this instruction, then we shock them