diff --git a/servers/anon.html b/servers/anon.html index 1802306..8361c12 100644 --- a/servers/anon.html +++ b/servers/anon.html @@ -210,6 +210,7 @@

🧅 Serverside - Self-Hosting Hidden Services (⚠️ Self-Hosting = Non-Sensitive!)

    +
  1. ✅ Introduction to Self-Hosting Hidden Services
  2. 🟠 .onion website with custom .onion Vanity V3 address
  3. ❌ Basic Webserver setup (NGINX / PHP / MYSQL)
  4. ❌ Minimalistic MoneroSSO .onion setup
  5. diff --git a/servers/anonymousremoteserver/index.html b/servers/anonymousremoteserver/index.html index 45980d3..67b4d34 100644 --- a/servers/anonymousremoteserver/index.html +++ b/servers/anonymousremoteserver/index.html @@ -62,6 +62,8 @@
    Previous Page

    nihilist@mainpc - 2024-05-02

    Acquiring remote servers anonymously (non-KYC providers)

    + +
    diff --git a/servers/hiddenservices/0.png b/servers/hiddenservices/0.png new file mode 100644 index 0000000..959e8b7 Binary files /dev/null and b/servers/hiddenservices/0.png differ diff --git a/servers/hiddenservices/1.png b/servers/hiddenservices/1.png new file mode 100644 index 0000000..75fd843 Binary files /dev/null and b/servers/hiddenservices/1.png differ diff --git a/servers/hiddenservices/2.png b/servers/hiddenservices/2.png new file mode 100644 index 0000000..39677ab Binary files /dev/null and b/servers/hiddenservices/2.png differ diff --git a/servers/hiddenservices/3.png b/servers/hiddenservices/3.png new file mode 100644 index 0000000..131deef Binary files /dev/null and b/servers/hiddenservices/3.png differ diff --git a/servers/hiddenservices/index.html b/servers/hiddenservices/index.html new file mode 100644 index 0000000..2aecd17 --- /dev/null +++ b/servers/hiddenservices/index.html @@ -0,0 +1,157 @@ + + + + + + + + + + + Introduction to Self-Hosting Hidden Services + + + + + + + + + + + + + + + + + + + + + + + +
    +
    +
    +
    + Previous Page

    nihilist@mainpc - 2024-08-03

    +

    Introduction to Self-Hosting Hidden Services

    +

    + +
    +
    +
    +
    + + +
    +
    +
    +
    +

    Clearnet Services: Centralized, but can be used anonymously

    + +

    Today's clearnet web is hugely centralised, you have businesses out there (meaning potential and very likely governmental proxies) that are letting you rent servers (VPSes / dedicated servers / etc) and domain names to be able to have a clearnet service.

    +

    If you want to have clearnet services but to keep your anonymity regardless, you'll need to go through KYC-free resellers (you can find them here)

    +

    To find out how to run Anonymous Clearnet Services, you can check out this tutorial.

    + +

    If you don't want to give in to that centralization, but remain on the clearnet, you'd have to run a service from home, using only the public IP you're getting from your ISP.

    +

    Problem is that your ISP knows who you are, is actively spying on what you do with your internet connection, and from there he knows that you are running the website. No anonymity whatsoever.

    +
    +
    +
    +
    + +
    +
    +
    +
    +

    Tor Hidden Services: Decentralized and Anonymous



    +

    One solution to that situation if your goal is to have a website hosted at home, as a Tor hidden service. Meaning your service can only be accessed through the Tor network, anonymous by default. Like so, your ISP can only see that you are using the tor network, but he can't tell what you're doing with it.

    + +

    if your ISP does not allow Tor traffic, you'll need to run a VPN on the server that's running the Tor hidden service, that way, you'll be able hide to your ISP that there is tor traffic at your house, while still being able to have a Hidden service reachable.

    +

    To find out how to run Hidden Services, you can check out this tutorial.

    + +
    +
    +
    +
    + + + +
    +
    +
    +
    +

    Warning, do not host anything sensitive at Home!



    +

    Note that Tor has had 0days in the past, and it could still have some. Therefore be aware hosting Anonymous services at home is not suitable for Sensitive use. As all it takes is for Tor to have one 0day for an adversary to be able to find out where the service truly is. Therefore keep in mind that you should only self-host services that are not going to get you in trouble if an adversary ever finds out that it is you who's the administrator.

    + +
    +
    +
    +
    + + + +
    +
    +
    +
    +

    Nihilism

    +

    + Until there is Nothing left. + +

    +
    + +
    +

    My Links

    +

    + + RSS Feed
    Matrix Chat
    + +

    +
    + +
    +

    About nihilist

    +

    Donate XMR: 8AUYjhQeG3D5aodJDtqG499N5jXXM71gYKD8LgSsFB9BUV1o7muLv3DXHoydRTK4SZaaUBq4EAUqpZHLrX2VZLH71Jrd9k8


    Contact: nihilist@nihilism.network (PGP)

    +
    + +
    + +
    +
    + + + + + + + diff --git a/servers/torwebsite/index.html b/servers/torwebsite/index.html index f5402f2..fef5808 100644 --- a/servers/torwebsite/index.html +++ b/servers/torwebsite/index.html @@ -62,9 +62,8 @@
    Previous Page

    nihilist@mainpc - 2024-02-01

    Tor Website Setup

    - +

    In this tutorial we'll setup a TOR website, which can be accessed via a .onion link. We'll set it up using nginx and Tor.

    -

    TODO: setups where 1) isp doesnt allow tor traffic 2) isp doesnt allow tor, nor vpns

    @@ -77,9 +76,35 @@

    Initial Setup

    -

    First compute your tor domain:

    +

    Before starting, check if your ISP allows tor use or not. And if it does not, make sure you install a VPN to hide the fact that you're using Tor as we did previously here:

    
    +# Download the Mullvad signing key
    +sudo curl -fsSLo /usr/share/keyrings/mullvad-keyring.asc https://repository.mullvad.net/deb/mullvad-keyring.asc
     
    +# Add the Mullvad repository server to apt
    +echo "deb [signed-by=/usr/share/keyrings/mullvad-keyring.asc arch=$( dpkg --print-architecture )] https://repository.mullvad.net/deb/stable $(lsb_release -cs) main" | sudo tee /etc/apt/sources.list.d/mullvad.list
    +# Or add the Mullvad BETA repository server to apt
    +echo "deb [signed-by=/usr/share/keyrings/mullvad-keyring.asc arch=$( dpkg --print-architecture )] https://repository.mullvad.net/deb/beta $(lsb_release -cs) main" | sudo tee /etc/apt/sources.list.d/mullvad.list
    +
    +# Install the package
    +sudo apt update
    +sudo apt install mullvad-vpn
    +
    +# Connect to Mullvad VPN
    +mullvad account login
    +Enter an account number: 91320912809328832
    +Mullvad account "91320912809328832" set
    +
    +# Connect to the VPN:
    +mullvad lockdown-mode set on
    +mullvad connect
    +
    +curl ifconfig.me
    +194.127.199.92
    +
    +
    +

    Once done, install tor and compute your Tor domain:

    +
    
     [ Datura-Network ] [ /dev/pts/11 ] [/srv]
     → apt install gcc libc6-dev libsodium-dev make autoconf tor
     
    diff --git a/servers/vpn/index.html b/servers/vpn/index.html
    index c8cfea8..21fb2bc 100644
    --- a/servers/vpn/index.html
    +++ b/servers/vpn/index.html
    @@ -122,6 +122,17 @@ echo "deb [signed-by=/usr/share/keyrings/mullvad-keyring.asc arch=$( dpkg --prin
     sudo apt update
     sudo apt install mullvad-vpn
     	
    +# Connect to Mullvad VPN
    +mullvad account login
    +Enter an account number: 91320912809328832
    +Mullvad account "91320912809328832" set
    +
    +# Connect to the VPN:
    +mullvad lockdown-mode set on
    +mullvad connect
    +
    +curl ifconfig.me
    +194.127.199.92
     

    From there, Bob can launch the VPN from his desktop: