diff --git a/opsec/anonaccess/index.html b/opsec/anonaccess/index.html index 83aab7f..2bbdbf5 100644 --- a/opsec/anonaccess/index.html +++ b/opsec/anonaccess/index.html @@ -61,7 +61,9 @@
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
[ mainpc ] [ /dev/pts/7 ] [~]
→ cat .ssh/config
-Host web-gw2024-dedi
- User root
- hostname 37.27.32.233
- IdentityFile ~/.ssh/torified
-
Host tortura
User root
hostname daturab6drmkhyeia4ch5gvfc2f3wgo6bhjrv3pz6n7kxmvoznlkq4yd.onion
IdentityFile ~/.ssh/torified
- proxyCommand ncat --proxy 127.0.0.1:9050 --proxy-type socks5 %h %p
Host datura
User root
@@ -105,13 +101,13 @@ Host datura
IdentityFile ~/.ssh/torified
-Then connect to the host via SSH:
+Then connect to the host by forcing SSH to go through tor, thanks to torsocks:
[ mainpc ] [ /dev/pts/5 ] [~]
→ systemctl restart tor@default
[ mainpc ] [ /dev/pts/5 ] [~]
-→ ssh tortura
+→ torsocks ssh tortura
The authenticity of host 'daturab6drmkhyeia4ch5gvfc2f3wgo6bhjrv3pz6n7kxmvoznlkq4yd.onion (<no hostip for proxy command>)' can't be established.
ED25519 key fingerprint is SHA256:A0CFTeUixGoK96VenBQ7Z2U8kX5olDCqBvBNeJUfs6I.
This host key is known by the following other names/addresses:
@@ -128,39 +124,18 @@ individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
Last login: Thu May 2 14:47:23 2024 from 178.255.149.178
-
-[ Datura ] [ /dev/pts/11 ] [~]
-→
-So that's how you do it if you cannot access the server via a public IP directly, but keep in mind that the latency is most likely unbearable due to the 6 hops circuit (since we're doing it via the .onion link, rather than connecting to the IP directly)
-so you're probably better off just connecting to the IP directly but forcing the SSH connection through tor using torsocks, which greatly reduces the latency (3 hops instead of 6):
-
-[ mainpc ] [ /dev/pts/7 ] [~]
-→ torsocks ssh datura
-Enter passphrase for key '/home/nihilist/.ssh/torified':
-Linux Datura 6.1.0-18-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.76-1 (2024-02-01) x86_64
+For instance, this is how you can access a server that is in an isolated LAN (such as in your home network), without requiring to port-forward anything.
-The programs included with the Debian GNU/Linux system are free software;
-the exact distribution terms for each program are described in the
-individual files in /usr/share/doc/*/copyright.
-
-Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
-permitted by applicable law.
-Last login: Thu May 2 15:48:08 2024 from 127.0.0.1
-
-[ Datura ] [ /dev/pts/12 ] [~]
-→ id
-uid=0(root) gid=0(root) groups=0(root)
-
-
+But keep in mind that the latency is going to be higher due to the 6 hops circuit (since we're doing it via the .onion link, rather than connecting to the IP directly). The length of the circuit is due to requiring to use the rendez-vous mechanism, since we're using the .onion domain.
-In this tutorial we're going explain how you can have anonymous clearnet services, which can either remotely or self-hosted.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Every steps listed below are to be done via the Tor browser, in order to preserve our anonymity.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Hypervisor: libvirtd QEMU/KVM
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
+
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Hypervisor: libvirtd QEMU/KVM (Or Qubes OS's Xen)
Virtual Machine:Whonix (that must be dedicated to the (you -> Tor -> residential proxy -> website) setup
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
In this tutorial we're going to see how to setup a chat application for Anonymous use. This is especially important in a world where mass-surveillance is nearly-omnipresent. It has become the end users' responsibility to uphold their privacy and anonymity while communicating online.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
+
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
In this post we are going to see why Privacy is not enough for Anonymous Use, and what can be done about it.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
DISCLAIMER: That Someone remains Anonymous UNTIL THEY MAKE ONE OPSEC MISTAKE !
Keep in mind that maintaining Anonymity is a much stricter practice than that of maintaining Privacy, as you will see, more threat vectors come into the picture.
+ diff --git a/opsec/anonymousremoteserver/index.html b/opsec/anonymousremoteserver/index.html index 3e84460..987226c 100644 --- a/opsec/anonymousremoteserver/index.html +++ b/opsec/anonymousremoteserver/index.html @@ -65,6 +65,7 @@ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
zuluCrypt can be installed on multiple Linux distributions. For Debian-based distro's, simply use your favourite package manager or run the following apt command in the terminal:
diff --git a/opsec/chainalysisattempts/index.html b/opsec/chainalysisattempts/index.html index 3e3f8da..d3cb4aa 100644 --- a/opsec/chainalysisattempts/index.html +++ b/opsec/chainalysisattempts/index.html @@ -63,6 +63,9 @@ Previous Page
As of September 5, 2024 sech1 posted on monero.town the following post, which was a repost of the following reddit post talking about a leaked Chainalysis meeting video about what was their progress on tracing monero transactions back in August 2023. This is a great opportunity to highlight the opsec weaknesses they are targeting so let's dive into it.
+ + Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
In this tutorial we're going to explain the differences between the two, and explain why you should host your services on the Darknet rather than the Clearnet.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
In this tutorial we're going to look at how you can contribute to the opsec blog, we'll look into how the work is being organized, and how to contribute via gitea.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
After discussing with me what task you want to do, we'll confirm on the price for that tutorial and after i get your confirmation i'll assign it to you, and that's when you can start to work on it.
Disclaimer: if you're not used to writing technical stuff, please aim for the tutorials that are labeled as "Simple" and that you actually understand. Don't try to bite more than you can chew, otherwise i might refuse further contributions coming from you. You should be at least familliar with the topic you intend to talk about.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
In this tutorial we're going to take a look at what are the differences between the clearnet and the darknet, and how you can explore the darknet using the lantern project.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
In this tutorial we're going to first explain why the Darknet Lantern is important in the current Darknet context, we'll cover what it is made of, and then we'll cover how to spin up a Darknet Lantern instance, how to maintain one's list of onion links, and lastly we'll cover how to join the Darknet Webring.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
In this tutorial we're going to take a look at how to setup DNS servers using bind9.
Disclaimer: If you want this service to remain anonymous, make sure you at least keep TOR between you and the service from the VPS acquisition to actual service usage.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Now we'll first cover how to have a single Endgame V3 front, to redirect to 2 onion backends, but keep in mind that there is very high latency involved here. The ideal setup as we'll see later, is to have local redirection behind the Endgame front. And we'll also make use of the onionbalance technology to setup multiple Endgame fronts for the same Master Onion!
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
In this tutorial we'll look at the most fundamental part of both Disaster Recovery Planning and Business Continuity for home servers. We'll look at how to deal with power outages.
For the Electrical Outages, we'll setup a UPS in between our homeserver and the main electrical input, so that in case of a power outage the home server can keep running for a while before finally shutting down. The UPS will then send a message to the Network UPS Tools suite to tell the server to shutdown when the batteries run low.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Disclaimer: If you are a developer working on projects that aim to reduce governmental control, such as working on privacy-cryptocurrency projects (ie Monero, Haveno, Crypto Mixers, etc), take some time to consider stopping maintaing/contributing to those projects under your public identity, and rather shift to maintaining those projects under an anonymous identity (which is the aim of the following Forgejo setup).
You never know when your tyrannical government is going to snap and decide to make an example out of you, just like what happened to Tornado Cash. It is a matter of adapting your OPSEC to the intended internet use. Don't paint a target on your back and give any ammunition to the adversary, because they're going to shoot you with everything you give them (your IRL name, what you contributed on the project, taking things you said out of context, etc). Tyrants don't care, even if it they have to step on your freedom of speech (as that's what developing code is) to keep their control over the masses, they will do anything to keep their control intact.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Application: Haveno DEX Setup
I recommend using this setup into one of the above mentionned VMs, either for Private use, or Anonymous use, as per the 4 basic OPSEC levels. (Note that Deanonymization will happen during the Fiat transaction, but it is minimized as you're revealing your identity to an other peer, rather than to a centralised exchange)
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Application: Haveno DEX Setup
I recommend using this setup into one of the above mentionned VMs, either for Private use, or Anonymous use, as per the 4 basic OPSEC levels. (Note that Deanonymization will happen during the Fiat transaction, but it is minimized as you're revealing your identity to an other peer, rather than to a centralised exchange)
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
I recommend using this setup into one of the above mentionned VMs, either for Private use, or Anonymous use, as per the 4 basic OPSEC levels. (Note that Deanonymization will happen during the Fiat transaction, but it is minimized as you're revealing your identity to an other peer, rather than to a centralised exchange)
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
In this tutorial we're going to take a look at how you can contribute to an existing Haveno Network, by running a Seed Node, in order to make the Haveno Network of your choice more resillient to potential takedowns.
Disclaimer: I am not running any seednodes for any Haveno Network, this is only to showcase how it works for whoever wants to run a seednode. Obviously you don't want to get the TornadoCash treatment by publicly announcing that you are helping with the infrastructure for an exchange with your public identity since this is potentially sensitive use. Therefore make sure you remain Anonymous (meaning you use a disposable identity) when saying that you are running a haveno seed node (see how to properly segment your internet uses here). See the explanation on where to host sensitive hidden services here.
+ + Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Application: Haveno DEX Setup
I recommend using this setup into one of the above mentionned VMs, either for Private use, or Anonymous use, as per the 4 basic OPSEC levels. (Note that Deanonymization will happen during the Fiat transaction, but it is minimized as you're revealing your identity to an other peer, rather than to a centralised exchange)
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
In this tutorial we're going to look at how to host Anonymous Hidden Services.
+In this tutorial we're going to look at where exactly you can host Hidden Services Anonymously.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
+
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
📝 Explaining Anonymity
💻 Clientside - Censorship Evasion
💻 Clientside - Fingerprinting Protection
💻 File Sharing
💻 Clientside - Decentralized Finances ⭐
🧅 Serverside - Contributing to Anonymity
🧅 Serverside - Anonymous Hidden Services
🧅 Serverside - Anonymous Clearnet Services
⚠️ Miscellaneous - In real life
📝 Explaining Plausible Deniability
💻 Clientside - Getting Started
💻 Steganography - Hiding secrets in plain sight
💻 Decentralised Finances
@@ -335,14 +334,14 @@🧅 Serverside - Plausible Deniability at Home (⚠️ Self Hosting = Risky!)
🧅 Serverside - Remote Plausible Deniability (⚠️ Remote Hosting = Safer!)
🧅 Serverside - High Availability for Deniability (⚠️ Remote Hosting = Safer!)
Host OS: Linux
Hypervisor: QEMU/KVM
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
In this tutorial we will setup a local mail server (to be able to keep control of our data), we will make it available publicly (so that it can communicate with other mail servers), but we'll make it go through TOR to guarantee Anonymity.
Note that this setup involves self-hosting, which I do not recommend if the service is supposed to be sensitive. If this is an issue for you, just install it on a non-KYC remote VPS and skip the port-forwarding part if you don't want to host it at your house.
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Becoming a Maintainer is the next step to contribute to the Opsec blog and Darknet Lantern projects, where you get to assist the other contributors contribute just like you did. The requirement is simple: You should have contributed at least 3 times, having submitted contributions that were already nearly finished (95%) in one go. If you are still submitting contributions that are 75% finished in one go, you are not ready to become a maintainer yet, maintainers are supposed to know the quality standard perfectly, to be able to enforce it when doing contribution reviews, therefore i expect that they show that they understand it.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
I recommend using this setup into one of the above mentioned VMs, either for Private use, or Anonymous use, as per the 4 basic OPSEC levels.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
In this tutorial we're going to take a look at how to setup a monero node
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
In this guide, we will configure MySQL Master-Master replication over Tor. In this configuration, each database acts as both Master and Slave, automatically replicating queries between them via a Tor connection.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Nextcloud is an indispensable tool for productivity, as you're going to see:
What we are trying to achieve here, is a setup where we can have a single folder synchronized on multiple devices, so that any change done from any of those devices, to that same folder, gets to be automatically shared and synchronized accross all of the other devices aswell. And of course, we're going to achieve that while maintaining our anonymity, by routing all traffic through Tor.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
+
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
OnionShare can easily be installed on various Linux distributions (by following the offical instructions at https://onionshare.org/#download). For Debian-based distro's (including Whonix), simply run the following apt command in a terminal:
diff --git a/opsec/phonenumbers/index.html b/opsec/phonenumbers/index.html
index 6f77d2d..02476b0 100644
--- a/opsec/phonenumbers/index.html
+++ b/opsec/phonenumbers/index.html
@@ -62,6 +62,8 @@
Previous Page
user@Whonix - 2024-05-26
Phone Numbers are incompatible with Anonymity
+
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
+
diff --git a/opsec/physicalsecurity/index.html b/opsec/physicalsecurity/index.html
index d77d856..f77b95f 100644
--- a/opsec/physicalsecurity/index.html
+++ b/opsec/physicalsecurity/index.html
@@ -76,6 +76,7 @@
Let's take all those threat vectors into account, and setup our homeserver with the following physical security setup:
+
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
diff --git a/opsec/plausiblydeniabledataprotection/index.html b/opsec/plausiblydeniabledataprotection/index.html
index f286ff4..e0439ca 100644
--- a/opsec/plausiblydeniabledataprotection/index.html
+++ b/opsec/plausiblydeniabledataprotection/index.html
@@ -72,6 +72,7 @@ regarding wear leveling:
"Also as mentioned earlier, disabling Trim will reduce the lifetime of your SSD drive and will significantly impact its performance over time (your laptop will become slower and slower over several months of use until it becomes almost unusable, you will then have to clean the drive and re-install everything). But you must do it to prevent data leaks that could allow forensics to defeat your plausible deniability. The only way around this at the moment is to have a laptop with a classic HDD drive instead."
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
In this tutorial we're going to look at what the quality standard is, to be able to submit good quality tutorials to the blog. We do not consider tutorials that don't follow that standard to be acceptable.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
The reason behind this stems from Sum Nihil, where i strongly believe that it doesn't matter who does the work, who gets the fame, who gets to profit off of it, what truly matters is that the work gets done, no matter who does it.
Here, the work is to make sure that everyone out there knows that when using the right technology in the right way, they cannot be oppressed, silenced, censored, controlled, and governed anymore. If you can help me reach that goal i'm definitely going to welcome it, even if it means to allow other people to run the blog.
The entire blog is meant to remain available for free, for everyone, over clearnet and over the Tor network. Ideally i'd like it to be resillient to takedowns in the case if something were to happen to me in the future. Therefore, the more people run the blog themselves, the more resillient it will become, and the farther the word will be able to go out there.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Making sure you can't be traced back as the owner/administrator of the server
Out of those requirements, we have 2 possibilities as to where you can run a sensitive service.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Harddrive (HDD): 500GB and encrypted with Veracrypt (with a 250Gb Hidden Volume)
Virtual Machine:Whonix
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Steganography is the craft of hiding messages. It is a close relative of cryptography, but where cryptography strives to conceal the contents of a messages, steganography attempts to conceal its presence. Therefore steganography helps avoiding suspicion and providing deniability.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
steghide is a mature GPL-licensed CLI tool for hiding arbitrary data inside of of image files (and some archaic audio formats). Its official web presence is located at https://steghide.sourceforge.net/. it conceals data inside a larger coverfile in a way that is indistinguishable to first-order statistical analysis. This means there is are anomalies in the file histogram, making most pictures innocuous without having the original image to compare it to.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
I recommend using this setup for Anonymous use if you store anything into the persistent storage, or for short-term Sensitive use if you are not storing anything sensitive in the persistent storage, as per the 4 basic OPSEC levels.
+ + Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Before we start, you will need a Debian VPS (you can get one on digitalocean for example), if you prefer to use your own self hosted server, make sure that port 80 and 443 are correctly port forwarded so that the public ip points to the server and not the router. Once that's done, go and ssh into your Debian server.
+ + Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Disclaimer: Do not host your Tor node in Germany, Netherlands or in the US, as there are already too many nodes in those countries. Try to run your own Tor nodes in countries that have the least nodes preferably, as this will help keeping the Tor network decentralized.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Now regarding the choice of location for the server, in order to make sure that Tor remains decentralised, make sure that you are picking a country that doesn't have many tor nodes (see the bubbles graph):
Disclaimer: Do not host your Tor node in Germany, Netherlands or in the US, as there are already too many nodes in those countries. Try to run your own Tor nodes in countries that have the least nodes preferably, as this will help keeping the Tor network decentralized.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Application: VPN (if your ISP doesn't allow Tor traffic)
I recommend using this setup into one of the above mentioned VMs, for Anonymous use, as per the 4 basic OPSEC levels.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
If you have a regular debian distribution, do as follows to install the tor browser:
[ mainpc ] [ /dev/pts/5 ] [~]
@@ -240,6 +242,87 @@ extraction percent done: 100 / 100
Hardware: Google Pixel
Host OS: Graphene OS
Configuration: Can be set in the Private or Anonymous Profile
You can download Tor Browser for Android from F-Droid (as we want to maintain the open source requirement), using the Guardian Repository, or the apk directly from the official Tor website. Please do not download it from any other source. There have been malicious versions passed around on social media in the past.
+ +Note: To download from F-Droid you will have to enable Guardian Project Repositories under settings → My Apps → Guardian Project (guardianproject.info/fdroid/repo)
+ +When you open the Tor app for the first time you will be greeted with this screen:
+We'll do some slight configuration changes, starting with the automatic connection and then open settings:
+toggle auto → settings
+
+
+
+
In settings, scroll down to Privacy and security. Open Security Level:
+ +Choose Safest for maximum security
+Additionally in settings you can choose the Default search engine and to use (.onion) sites if you prefer.
+And you are done, you should now be at the start page:
+If your connection is being censored or you are unable to connect to the Tor network then you may have to configure a bridge. Choose “Config Bridge” on the opening screen or under settings:
+Toggle “Use a Bridge” to open up three options: "obfs4", "meek-azure", and "snowflake".
+Obfs4 is a pluggable transport that makes Tor traffic look random and also prevents censors from finding bridges by Internet scanning.
Meek-Azure is a pluggable transport that makes it look like you are browsing a Microsoft web site instead of using Tor.
Snowflake involves a large number of volunteer proxies, which also makes them hard to pin point and prevents the blocking of proxy IP addresses.
Additionally you can provide a trusted bridge to use if you know one.
+Orfox is a sunsetted privacy focused web browser based on Tor. It is no longer maintained and is not recommended.
Orbot is a proxy app that allows other apps on your device to encrypt your internet traffic through Tor. After installing Orbot go to Choose apps under settings in order to route the apps of your choice through Tor.
Currently there is no official Tor browser available for iOS on iPhone. Using Orbot with the open source Onion Browser is better than nothing but does not have the same privacy protections as Tor Browser. Use at your own risk.
The main drawback of this approach is that website content can only be updated by reloading the page since each page is server-side rendered using a PHP interpreter.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Using Tor means you are employing Decentralisation, by using it you are placing your trust into 3 random entities (which can be individuals, companies or adversaries), in 3 different legislations (due to being in 3 different countries), rather than in one centralized entity, hence providing Anonymity on the IP layer.
There is always a low probability of risk, where if you are unlucky and tor circuits go through 3 nodes that are hosted by the same malicious entity, leading to deanonymization.
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
In this tutorial we'll setup a Hidden Service with custom .onion Vanity V3 address, we'll set it up using nginx and Tor.
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Packages: grub-live and ram-wipe
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
I recommend using this setup into one of the above mentioned VMs, for Anonymous use, as per the 4 basic OPSEC levels.
Sidenote: If your ISP does not allow Tor traffic, make sure that you route the QEMU VMs traffic through a VPN, to hide the tor traffic from your ISP (You -> VPN -> Tor) Setup
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!
I recommend using this setup into one of the above mentioned VMs, for Anonymous use, as per the 4 basic OPSEC levels.
Sidenote: If your ISP does not allow Tor traffic, make sure that you route the QEMU VMs traffic through a VPN, to hide the tor traffic from your ISP (You -> VPN -> Tor) Setup
+ Sidenote: Help us improve this tutorial by letting us know if there's anything missing or incorrect on this git issue directly!