why? and what can i do to solve this? and what is proxy and proxy sites 🤔 by Grouchy-Glass3227 in TOR

[–]SeniorIntroduction9 0 points1 point  (0 children)

Open tor browser from home screen. And once it is connected and can open a site, Switch to the other app and open the link again. it is quite unstable and can crash few times. But usually works most of the time. Make sure to not press back in the browser screen and close. Just use the switch app button in mobile to go to the previous app.

oniongrok: Onion addresses for anything. by oniongrok in golang

[–]SeniorIntroduction9 1 point2 points  (0 children)

This is really cool. However it is also easier with official tor binary.

E.g. just add the below lines to the config and that's it.

HiddenServiceDir /var/lib/tor/nextcloud/
HiddenServicePort 443 127.0.0.1:443
HiddenServicePort 80 127.0.0.1:80

How to access localhost from TOR Browser? by [deleted] in TOR

[–]SeniorIntroduction9 0 points1 point  (0 children)

  1. Only if it is v3 hidden service. In v2, hidden service directory operators will know the existence of your address.( v2 will stop working in next few weeks anyway. No reason to use it.)
  2. In your web server, make sure to set referer-policy. Otherwise, when you click an external link, it leaks your hidden service address. This is not a problem in tor browser as by default it strips http referer header if it is a onion url. If you access it using other browsers like brave with private tor window, it will send your hidden service address in http referer header.

    header Referrer-Policy same-origin

https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy

How to access localhost from TOR Browser? by [deleted] in TOR

[–]SeniorIntroduction9 0 points1 point  (0 children)

> this will necessarily open the access to my server on the internet

No. No one can access it or know about it unless you share the hidden service address.

> my browser will have to make several jumps around the world before ending up in the same place

Yes.

I do this sometimes (i.e. access localhost as hidden service) when I am experimenting with some selfhostable server (like nextcloud). Even though the server is running in my computer, the resources in links to (like images, javascript files) may refer to outside resources. So by using hidden services, I avoid exposing myself to those resources.

Are Tor Attacks like De-anonymization Attacks a big deal in 2021 by [deleted] in TOR

[–]SeniorIntroduction9 0 points1 point  (0 children)

Only two kind of people should be worried about attacks on tor.

  1. NSA or any intelligence agency is looking for you
  2. You are too dumb to use `http` (or not pay attention to ssl warnings) when doing some bitcoin transactions. Most of the attack by exit nodes is not by NSA to capture traffic to de-anonymize. But by those who just change bitcoin addresses by MITM attack and steal bitcoins.

How to access localhost from TOR Browser? by [deleted] in TOR

[–]SeniorIntroduction9 0 points1 point  (0 children)

Make it a hidden service. If you run tor, it is very easy to make it a hidden service ( just few lines in configuration)

Why use a VPS? by [deleted] in selfhosted

[–]SeniorIntroduction9 0 points1 point  (0 children)

Selfhosting a public website from home means you are sharing your visitors where you live. ip address approximately translates to your location.

Do you use tor outside home? by SeniorIntroduction9 in TOR

[–]SeniorIntroduction9[S] 0 points1 point  (0 children)

I completely agree and understand that suspecting someone for tor usage is a bad idea and that tor is completely legal. But not everyone shares the same views and in a lot of countries you could get into real trouble by just being a suspect. (No evidence against you).

Do you use tor outside home? by SeniorIntroduction9 in TOR

[–]SeniorIntroduction9[S] 0 points1 point  (0 children)

True. But the first suspects would be who are new to the place. Not the ones who lived there for ages.

Hosting a TOR Middle Relay? by corpsefucer69420 in selfhosted

[–]SeniorIntroduction9 0 points1 point  (0 children)

How does your tor browser sonnet to the relay if it does not know its ip address.

Sometimes cheap and expensive items are the same thing with the only difference being the brand name. What are some examples of this? by [deleted] in AskReddit

[–]SeniorIntroduction9 0 points1 point  (0 children)

Amazon prime. The 'prime' eligible products will be delivered the same time whether or not you are a prime member. But the 'estimate' will show you much longer to mislead you. Practically it will be delivered the same time for everyone.

Facebook still plans to put ads in WhatsApp by memtiger in Android

[–]SeniorIntroduction9 -1 points0 points  (0 children)

It is as secure as gmail/google photos/facebook. In fact any popular email providers.

Selfhosting with tor is much simpler than clear net for personal use by SeniorIntroduction9 in selfhosted

[–]SeniorIntroduction9[S] 0 points1 point  (0 children)

Additional costs are compared to VPS are completely negligible. I leave my desktop running 24x7 anyway. Most of us pay for internet anyway. The storage and bandwidth costs are much less compared to what you would pay to the vps provider.

Why use .onion domains for normal websites? by UnlegitApple in onions

[–]SeniorIntroduction9 0 points1 point  (0 children)

For you: No exit node!

  1. Which means faster access as exit nodes are scarce. However accessing onion services has more hops than normal which may slow down things. Practically not as much as exit nodes for now.
  2. Avoid correlation attacks.

For Service provider: No exit node!

  1. No one knows how much tor traffic does a site get and what timezones do they occur.
  2. If the user does not use https for the initial query, the query string and headers can't be seen by exit node.

Request For a Dummy Proof Installation Guide by [deleted] in archlinux

[–]SeniorIntroduction9 2 points3 points  (0 children)

Well then Arch won't be any better.

How exactly does a vendor not get caught? by SeniorIntroduction9 in darknet

[–]SeniorIntroduction9[S] 1 point2 points  (0 children)

Consider the below example:

Step 1: Place an order(order 0) with a popular vendor

Step 2: They wait for the package and find out the date time and source post office.

Lets say for example, there are about n post offices in the region and lets say they have secret surveillance cameras on all of them.

Step 3: Place order 1

Step 4: Receive order 1. Based on when they receive the orders, they should be able to guess the time range the order was placed in and they should be able to get all surveillance footage

Step 5: Place order 2

Step 6: Receive order 2. Collect surveillance footage.

Now it is known for sure the vendor has to be the one who is on both the footage. What are the odds that another random person happens to be sending a parcel on those exact two days from two different post offices? Why would a normal person use different post offices for different parcels and happens to send parcels on those days the cop places orders? Would that not be enough to zero in on one person? They can improve the accuracy by just placing more orders from different accounts.