Tor onion site
There is a lot of misconception around the dark web, and most of the people think that it is not possible to create their website on Dark web (The Onion network). Today we will set up a website in the Onion/Tor network for free (With our own home server).As you can see above, I have created my website in the Tor network, and I've accessed it using the Tor Browser.This tutorial consists of three stepsPreparing your computer (Not a real step)Installing & Configuring nginxInstalling TorConfiguring the Tor serverIngredientsAn old computer (You can try on AWS EC2, but I've not tried it there) 💻A stable internet connection 🌐2 hours ⌚Comfort using terminal ⌨InstructionsTo begin with, find a spare computer that can be used as a server (If you don't have one, you can try following the tutorial on an AWS EC2 or similar service). Also, you do not need a static IP for your dark web website.To follow the tutorial, You will need to install a Linux based OS on the server (we will refer your spare computer/cloud computer as a server from now), I have tested the below steps on Ubuntu 18.04 Server LTS and I recommend that you also use the same. Ubuntu 20.04 doesn't seem to work well with Tor.It is also recommended to use SSH to connect to your server since there will be no GUI, you will not be able to open this article on the server and copy-paste the commands. Typing the commands out will be time taking & also very error-prone.In this article, I will not explain how to use & configure SSH but you can refer the below link to understand & use SSH.How To Use SSH To Connect To A Remote Server In Linux Or WindowsImportant: Make sure you are running as root throughout the tutorial.sudo suLet's get our hands dark 😎Installing & Configuring nginxThe role of nginx is to serve the HTML files and assets (act as a web server).apt updateapt install nginxThe above commands will update the server & install nginx. To start the nginx serverservice nginx startTo check the status of the nginx serverservice nginx statusTo confirm if the nginx server is working. We will make a GET request to the server using curl. Before that, you'll need to know what is your IP address.ifconfigThe output will be similar to thislo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536 inet 127.0.0.1 netmask 255.0.0.0 inet6 ::1 prefixlen ссылка 128 scopeid 0x10<host> loop txqueuelen 1000 (Local Loopback) RX packets 134 bytes 21230 (21.2 KB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 134 bytes 21230 (21.2 KB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0wlp9s0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet your-ip-address netmask 255.255.255.0 broadcast ###.###.#.### inet6 ####::####:####:####:#### prefixlen 64 scopeid 0x20<link> ether ##:##:##:##:##:## txqueuelen 1000 (Ethernet) RX packets 6379 bytes 8574482 (8.5 MB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 3518 bytes 506008 (506.0 KB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0Find your IP address in inet your-IP-address. Note it down, using that now make a curl request.curl your-IP-address:80The console should print out the HTML code of the default nginx page. You can also check if nginx is working by typing the IP address of the server in your browser.To add your custom page, follow the steps from their official documentation. Beginner's guide - nginxInstalling TorInstalling Tor (not just the browser) allows your computer to communicate with the Tor network. Before installing Tor, we will have to install apt-transport-https, so that we can use source lines with https://apt install apt-transport-httpsImportant: The below commands are for Ubuntu 18.04 onlyIf you are running other OS, please find the commands here, from Tor's official, site. We will now open the sources file to add the Tor sources.touch /etc/apt/sources.list.d/nano /etc/apt/sources.list.d/Once the editor is open, add the following sources to the filedeb https://deb.torproject.org/torproject.org bionic maindeb-src https://deb.torproject.org/torproject.org bionic mainAfter exit & saving, type the following in the terminal. This is to add the gpg key used to sign the Tor packages.curl https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc | gpg --importgpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | apt-key add -Finally, now we install Tor and also a package which will help to keep the signing key current.apt updateapt install tor deb.torproject.org-keyringSimilar to nginx, Tor can be started & checked by the following commandsservice nginx startservice nginx statusSetting up the tor serverNow that we have nginx & Tor up and running, we will have to configure Tor so that our server acts as a Tor server (Your server will not be used as a relay node)For this, we will have to edit the torrc file. The torrc is the configuration file for your Tor, the power of the file is such that, you can alter Tor to act as a proxy server & contribute to the Tor network (Not in this tutorial). In this tutorial, the torrc will be configured to act as a tor webserver (onion service).nano /etc/tor/torrcIn the torrc file, Go to the middle section and look for the line############### This section is just for location-hidden services ###And uncomment the following lines.HiddenServiceDir /var/lib/tor/hidden_service/HiddenServicePort 80 127.0.0.1:80In these lines,HiddenServiceDir will tell Tor where to save the private_key & hostname of your Tor website (They are information about your dark website). The private key stored is very important & could be used to impersonate you. In case you change your server, you just need to copy-paste your private key into the new server.HiddenServicePort lets you specify a virtual port (that is, what port people accessing the website will think they're using) and an IP address and port for redirecting connections to this virtual port.To apply this new configuration, Stop the Tor service and start it again by typing the following commands.service tor stopservice tor startNow check the status of the tor service to see if the changes are working & valid.service tor statusIf things are looking good, proceed to the next step, otherwise, you might have made a mistake in editing the.torrc file.At this point, your dark website must be running. But we don't know what is the URL, to get it, run the following commandcat /var/lib/tor/hidden_service/hostnameThe URL to your all-new dark website will be printed in the console. To test if it's workingcurl -v --socks5-hostname localhost:9050 http://your-onion-domain.onionThe URL is actually your-public-RSA-key.onion. Tor has a different way of identifying websites, i.e. via their public RSA key.You might notice that the URL generated, is very long and you might be wondering how to create custom hostname (i.e. Custom RSA public key). I will be creating an article on this topic very soon.Now let's celebrate on your first dark website 🎉. Also please share your thoughts in the comments 😁 (For example, you can ask me to add instructions on "how to add your custom page in nginx")
Tor onion site - Krmp.cc onion сайт kraken krmp.cc
in a normal web browser like Chrome, Firefox, Safari, or Edge, you make a connection over the internet directly from your house (or wherever you happen to be) to the web server you’re loading. The website can see where you are coming from (and track you), and your internet service provider can see which website you’re loading (and track what you’re doing and sell advertising based on your activity).But if you open Tor Browser and load the same website, none of those parties can spy on you. Even Tor itself won’t know what you’re up to. Within the network, consisting of thousands of nodes run by volunteers across the internet, you do not connect from your house directly to the web server. Instead, your connection first bounces between three Tor nodes and then finally exits the Tor network and goes to the website. The website can’t see where you’re coming from, only that you’re using Tor. Your ISP can’t see what website you’re visiting, only that you’re using Tor. And the Tor nodes themselves can’t fully track you either. The first node can see your home IP address, because you connect directly to it, but can’t see what site you’re loading, and the last node (also called the exit node) can see what site you’re loading but doesn’t know your IP address.In short, Tor Browser makes it so people can load websites anonymously. Tor onion services do the same thing, except for websites themselves.Tor Onion Services Let Websites Themselves Be AnonymousSo what exactly is an onion service? Just like when people use Tor Browser to be anonymous, web servers can use Tor to host anonymous websites as well. Instead of using normal domain names, these websites end with “.onion”.If you load an onion site in Tor Browser, both you and the web server bounce encrypted data packets through the Tor network until you complete an anonymous connection, and no one can track anyone involved: Your ISP can only see that you’re using Tor, and the website’s ISP can only see that it’s using Tor. You can’t learn the website’s real IP address, and the website can’t learn yours either. And the Tor nodes themselves can’t spy on anything. All they can see is that two IP addresses are both using Tor.Onion services have another cool property: The connection never exits the Tor network, so there are no exit nodes involved. All the communication between Tor Browser and the web server happens in the dark.The Most Popular Site on the Dark WebWhen people hear about the “dark web,” they tend to think about shady things like drug markets and money laundering. That stuff is, in fact, facilitated by anonymous websites running Tor onion services, just as it’s facilitated by the normal, non-anonymous internet. But it’s not the only use of onion services by a long shot.The Intercept along with dozens of other newsrooms around the world, including pretty much every major news organization, run Tor onion sites for SecureDrop, a whistleblower submission platform. With The Intercept’s new onion service for readers of our website, we’ll also join the ranks of the New York Times, ProPublica, BuzzFeed News, The Markup, and other news organizations in making their core websites available as onion services.I also develop an open source tool called OnionShare which makes it simple for anyone to use onion services to share files, set up an anonymous drop box, host a simple website, or launch a temporary chat room.But, by far, the most popular website on the dark web is Facebook. Yup, Facebook has an onion service. For when you want some — but not too much — anonymity.
BLOCK TRACKERSTor Browser isolates each website you visit so third-party trackers and ads can't follow you. Any cookies automatically clear when you're done browsing. So will your browsing history.DEFEND AGAINST SURVEILLANCETor Browser prevents someone watching your connection from knowing what websites you visit. All anyone monitoring your browsing habits can see is that you're using Tor.RESIST FINGERPRINTINGTor Browser aims to make all users look the same, making it difficult for you to be fingerprinted based on your browser and device information.MULTI-LAYERED ENCRYPTIONYour traffic is relayed and encrypted three times as it passes over the Tor network. The network is comprised of thousands of volunteer-run servers known as Tor relays.BROWSE FREELYWith Tor Browser, you are free to access sites your home network may have blocked.We believe everyone should be able to explore the internet with privacy.We are the Tor Project, a 501(c)(3) US nonprofit.We advance human rights and defend your privacy online through free software and open networks. Meet our team.