Actions

Onion Services Guides

From Whonix

(Redirected from Hidden Services Guides)



About this Onion Services Guides Page
Support Status stable
Difficulty medium
Contributor HulaHoop [archive]
Support Support
Onionservice.jpg

Ambox warning pn.svg.png Documentation for this is incomplete. Contributions are happily considered!

Ambox warning pn.svg.png None of the following guides are adjusted to work with Whonix. [1]

Introduction[edit]

To make your service better known it can be listed on ahmia.fi [archive] - a public directory of Onion sites that works closely with The Tor Project.

General Tips[edit]

Some very useful information on scaling onion sites was published in an article series on the Tor blog, see: Cooking with Onions: Finding the Onionbalance [archive].

For creating a production level onion mirror of your clearnet site, refer to some tips in this tor-talk forum discussion: New Document: Building a "Proof of Concept" Onion Site [archive].

Onion Services Guides[edit]

GlobaLeaks[edit]

Project main site [archive]

warning Security warning: Adding a third party repository allows the vendor to replace any package on your system. Proceed at your own risk! See Foreign Sources for further information. For greater safety, users adding third party repositories should always use Multiple Whonix-Workstation ™ to compartmentalize VMs with additional software.

Installation Guide from GlobaLeaks third party repository [archive]

This is a guide to help you set up your own secure and anonymous whistle blowing platform. Note that this is a standalone node and not part of a network, although you can optionally list yourself in the Leaks Directory [archive].

To decide between GlobaLeaks and SecureDrop read this [archive] detailed comparison written by a Tor Project developer.

Multiplayer Onion Gaming[edit]

See: Onion Gaming.

SecureDrop[edit]

SecureDrop is another widely used whistle-blowing platform installed at many news organizations. To set it up please refer to the official guide [archive]. To use SecureDrop as a source, refer to this documentation [archive] and for using SecureDrop as a journalist go here [archive]. For general information and project code go to their main GitHub page [archive].

If you are a news or whistle-blowing site operator you may be interested in having your Onion Service address listed at the Freedom of The Press Foundation [archive].

Sparkleshare[edit]

For a private and anonymous DropBox alternative you can run Sparkleshare as a Onion Service [archive]. To ensure that only you and the intended parties can access the service you need to set up Onion Service Authentication, see instructions.

SSH[edit]

Secure Shell is the dominant protocol for secure remote login and system administration. It is a critical component of server and internet infrastructure. Revelations from the Snowden documents and further analysis [2] has uncovered weaknesses in some of the included cipher-suites, allowing abuses by resourceful nation-state adversaries. If you run SSH in this day and age, it should be done from behind a Tor Onion Service.

Advantages:

  • protection by Tor
  • robust access control provided by Onion Services authentication [3]
  • NAT traversal
  • no need for services like DynDNS [archive]
  1. Setup Onion Service Authentication.
  2. Run SSH like normal or follow this guide [archive] if you are a beginner.

Stormy[edit]

Stormy is a simple Onion Service blog setup script. The developer hopes to have it packaged for Debian at some point, but it is under heavy development at the time of writing (only suitable for developers). To learn more, see: GitHub [archive].

See Also[edit]

References[edit]



Search engines: YaCy | Qwant | ecosia | MetaGer | peekier


Follow: Twitter.png Facebook.png 1280px-Gab text logo.svg.png Iconfinder news 18421.png Rss.png Matrix logo.svg.png 1024px-Telegram 2019 Logo.svg.png Discourse logo.svg Reddit.jpg Diaspora.png Gnusocial.png Mewe.png 500px-Tumblr Wordmark.svg.png Iconfinder youtube 317714.png 200px-Minds logo.svg.png 200px-Mastodon Logotype (Simple).svg.png 200px-LinkedIn Logo 2013.svg.png

Donate: Donate Bank Wire Paypal Bitcoin accepted here Monero accepted here Contriute

Whonix donate bitcoin.png Monero donate whonix.png United Federation of Planets 1000px.png

Share: Twitter | Facebook

Join us in testing our new AppArmor profiles [archive] for improved security! (forum discussion [archive])

https link onion link

This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to Conditions for Contributions to Whonix ™, then Edit! Edits are held for moderation. Policy of Whonix Website and Whonix Chat applies.

Copyright (C) 2012 - 2020 ENCRYPTED SUPPORT LP. Whonix ™ is a trademark. Whonix ™ is a licensee [archive] of the Open Invention Network [archive]. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Freedom Software license as Whonix ™ itself. (Why?)

Whonix ™ is a derivative of and not affiliated with Debian [archive]. Debian is a registered trademark [archive] owned by Software in the Public Interest, Inc [archive].

Whonix ™ is produced independently from the Tor® [archive] anonymity software and carries no guarantee from The Tor Project [archive] about quality, suitability or anything else.

By using our website, you acknowledge that you have read, understood and agreed to our Privacy Policy, Cookie Policy, Terms of Service, and E-Sign Consent. Whonix ™ is provided by ENCRYPTED SUPPORT LP. See Imprint, Contact.