【为什么 Hetzner 不适合Tor🧅出口节点】
https://www.reddit.com/r/TOR/comments/1m9yssc/why_hetzner_is_not_suitable_for_exit_nodes

Hetzner禁止扫描外网——Tor 出口流量来自运行出口节点的服务器——用户活动包括端口扫描和探测——违反条款——收到滥用报告

所以办法是只运行中继和网桥,而不运行出口节点:
✅ Middle Relay ✅ obfs4 Bridge ✅ Snowflake ✅ WebTunnel
❌ Exit Node

#tor #hetzner #exitnode #OnionServices #onionnetwork #洋葱网络

One reason to use BashLab OS? Browsing.
Out of the box you get:

🧩 Firefox ESR — usable, tweakable
🛡️ Mullvad Browser — fingerprint-hardened
👻 Tor Browser — secure access to the onion network

No installs. No tweaks. Just boot and choose your level.

👉🏻Download:
https://www.bashcore.org/downloads/BashLabOS2509-Paul.iso

#BashLabOS #TorBrowser #OnionNetwork #PrivacyTech #LiveDistro #Linux #StealthMode #NoFingerprint #Mullvad

Many people have never heard of P2P file-sharing networks like DarkMX even though DarkMX and its predecessor, WinMX, have over two decades of continued development. P2P file-sharing networks are more stable than torrents. DarkMX has a very slick retro interface. It is almost identical to the old WinMX from 20+ years ago, except it brokers all connections via TOR for preserving privacy.

I figured out several ways to run DarkMX on a headless server without GUI. This allows me to install it on a remote server without any desktop environment and run the software as a daemon without the GUI.

First I used the X forwarding feature of SSH to pipe the GUI to a local machine. On that machine I did all the configuration inside the GUI. Then I closed the program.

Then on the remote machine I used 'xvfb' to run DarkMX as a nohup'd daemon with a dummy GUI buffer. That way I don't need to be connected to the GUI from a local machine and the application will still run. It also uses less RAM without the GUI.

There are other ways to do this, such as VNC and xpra. I just chose the quickest, dirtiest method in this case.

Why would I go to all that trouble? Well, I don't need to, but there are some people who might need to publish while maintaining strict anonymity. So they would need tools like DarkMX and TOR. For me it's just fun.

DarkMX operates over the TOR privacy preserving network. As a result the location of my peer is hidden and extremely hard to impossible for an adversary to locate. So when I publish something, such as a letter, or paper, or opinion, anyone can download it since censoring it is not viable. It ensures that my speech remains free and available to the general public. Now when I author essays, papers, homiles and such, I can publish them as file shares, and I can publish them simultaneously as a TOR hidden website with the built-in webserver feature. So readers don't need DarkMX to read my files--they can just fire up TOR Browser or use a TOR proxy with their web browser. If they want to snarf a whole directory they can install DarkMX, or use a script to snarf them via TOR.

If you are inclined to fiddle around with installing this software on a headless server, please share the techniques and tools used that suit you.

(DarkMX download site: https://darkmx.app)

#DarkMX #P2P #FileSharing #Anonymous #SelfHosting #TOR #OnionNetwork #Censorship

@[email protected] @[email protected] @[email protected] [email protected]
TORSERV: Host a Static Website on the Dark Web in Under 1 Minute
"Hosting a Tor hidden service — also known as an onion site — typically requires in-depth technical skills and manual configuration. With TorServ, you can host a static website anonymously in seconds, without touching any config files."
This software deserves some attention. It could be useful for at-risk people who need to publish while protecting identity.

#TorServ #TOR #Onions #OnionNetwork #Privacy #Anonymity

@[email protected]
@[email protected]
@[email protected]
@[email protected]
@[email protected]
@[email protected]
@[email protected]
@[email protected]

We look after servers for a few web agencies, not just our own, so I spend half of my time fighting off malicious bots and I'm noticing a huge increase in content scrapers coming from TOR exit IPs so I'm considering throwing together a cron to pull in and firewall all TOR exit IPs every morning, across all of the servers we manage.

I can't decide though, if any legitimate website visits would be blocked by this?

Do people actually use #TOR for web browsing? Emailing? Anything?

#OnionNetwork

It does not need any cooling - https://gyptazy.ch/snac/gyptazy/p/1708263688.872999
It's also the probably first ever #RISCV64 based #Tor node for the #Torproject in the #OnionNetwork: https://gyptazy.ch/snac/gyptazy/p/1707572174.673811
gyptazy (@[email protected])

I guess I shouldn't run this way for production, should I? System load: 1.08 Usage of /: 2.7% of 115.22GB Memory usage: 4% Swap usage: 0% Temperature: 56.0 C Processes: 131

gyptazy.ch

Twitter’s privacy-preserving #Tor service goes dark | TechCrunch

Twitter’s Tor service, a version of the site that could be accessed even in countries where the social network is banned, has gone dark after the company failed to renew its certificate.
#twitter #privacy #security #encryption #vpn #OnionNetwork #onion

https://techcrunch.com/2023/03/08/twitter-tor-service-goes-dark/

TechCrunch is part of the Yahoo family of brands

Feds Shut Down Largest Dark Web Child Abuse Site; South Korean Admin Arrested

Feds Shut Down Largest Dark Web Child Abuse Site and Arrested South Korean Admin and 337 Site Users.