<h1>Introduction to Self-Hosting Hidden Services </h1>
<p></p>
</div>
</div><!-- /row -->
</div><!-- /container -->
</div><!-- /grey -->
<!-- +++++ Second Post +++++ -->
<divid="anon3">
<divclass="container">
<divclass="row">
<divclass="col-lg-8 col-lg-offset-2">
<h2><b>Clearnet Services: Centralized, but can be used anonymously</b></h2>
<imgsrc="1.png"class="imgRz">
<p>Today's clearnet web is hugely centralised, you have businesses out there (meaning potential and very likely governmental proxies) that are letting you rent servers (VPSes / dedicated servers / etc) and domain names to be able to have a clearnet service. </p>
<p>If you want to have clearnet services but to keep your anonymity regardless, you'll need to go through KYC-free resellers (you can find them <ahref="https://kycnot.me/?t=service&q=vps">here</a>)</p>
<p><u>Sidenote:</u> These non-KYC service providers are willing to put up with some abuse to provide you anonymity online, so don't abuse their goodwill by running sensitive services as they are the ones that have to deal with the consequences.<b> In short, Don't bite the hand that feeds you.</b></p>
<p>To find out how to run Anonymous Clearnet Services, you can check out <ahref="../anonymousremoteserver/index.html">this</a> tutorial.</p>
<imgsrc="3.png"class="imgRz">
<p>If you don't want to give in to that centralization, but remain on the clearnet, you'd have to run a service from home, using only the public IP you're getting from your ISP.</p>
<p>Problem is that your ISP knows who you are, is actively spying on what you do with your internet connection, and from there he knows that you are running the website. No anonymity whatsoever. </p>
</div>
</div><!-- /row -->
</div><!-- /container -->
</div><!-- /white -->
<divid="anon2">
<divclass="container">
<divclass="row">
<divclass="col-lg-8 col-lg-offset-2">
<h2><b>Tor Hidden Services: Decentralized and Anonymous</b></h2></br></br>
<p>One solution to that situation if your goal is to have a website hosted at home, as a Tor hidden service. Meaning your service can only be accessed through the Tor network, anonymous by default. Like so, your ISP can only see that you are using the tor network, but he can't tell what you're doing with it.</p>
<imgsrc="2.png"class="imgRz">
<p>if your ISP does not allow Tor traffic, you'll need to run a VPN on the server that's running the Tor hidden service, that way, you'll be able hide to your ISP that there is tor traffic at your house, while still being able to have a Hidden service reachable.</p>
<p>To find out how to run Hidden Services, you can check out <ahref="../torwebsite/index.html">this</a> tutorial.</p>
</div>
</div><!-- /row -->
</div><!-- /container -->
</div><!-- /white -->
<!-- +++++ Second Post +++++ -->
<divid="anon1">
<divclass="container">
<divclass="row">
<divclass="col-lg-8 col-lg-offset-2">
<h2><b>Warning, do not host anything sensitive at Home!</b></h2></br></br>
<p>Note that Tor has had 0days in the past, and it could still have some. <b>Therefore be aware hosting Anonymous services at home is not suitable for Sensitive use.</b> As all it takes is for Tor to have one 0day for an adversary to be able to find out where the service truly is. Therefore keep in mind that <b>you should only self-host services that are not going to get you in trouble if an adversary ever finds out that it is you who's the administrator.</b></p>