home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.privacy      Discussing privacy, laws, tinfoil hats      112,125 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 110,386 of 112,125   
   D to Yamn Remailer   
   Fw: Question about Tor and it's 'onion'    
   13 Jul 24 15:28:26   
   
   From: noreply@mixmin.net   
      
   On Sat, 13 Jul 2024 00:20:38 -0400, Yamn Remailer    
   wrote:   
   snip   
   >This is a very simple guide to understanding Tor Hidden services.   
   >   
   >It's well written and easy to read.   
   >Hope this helps.   
   >Tor Hidden Services are the same as .onion routing.   
   >Examples of Tor Hidden Sevice hosts using QSL are:   
   >b42o7yhesx3fon7bzak4rkq7ax2yoanzapykqpzyznil6obcybe3zlyd.onion:25   
   >3fd6guyxldqnjaqtfzejnjvq6bj7ilv5u7g7ovbubhwoeqhc222zvrad.onion:25   
   >Also, if you're interested, you can join one of the Tor Project's email   
   >lists. You'll get some great support there.   
   >   
   >   
      
   (using Tor Browser 13.5.1)   
   https://torguide.org/   
   >Welcome to The Official Hidden Wiki   
   >Dive into the web's hidden mysteries with The Official Hidden Wiki, your   
   >portal to the secretive side of the internet. Explore obscure sites,   
   >underground communities, and encrypted knowledge. Whether you seek   
   >alternative networks, privacy tools, or unconventional resources, we've   
   >got you covered. Discover hidden gems and navigate the digital underground   
   >with us.   
   >Introduction Points   
   >Financial Services   
   >Commercial Services   
   >Anonymity & Security   
   >Blogs / Essays / Wikis   
   >Email / Messaging   
   >Social Networks   
   >Forums / Boards / Chans   
   >Whistleblowing   
   >H/P/A/W/V/C   
   >Hosting / VPS   
   >File Uploaders   
   >Audio / Music / Streams   
   >Video / Movies / TV   
   >Books   
   >Drugs   
   >Uncategorized   
   >Verified Links   
   >Name        Description                        Status  Legitimacy  Link   
   >DuckDuckGo  A Hidden Service that searches...  Online  Verified    Explore Now   
   >https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion/   
   >OnionLinks  Onion link directory               Online  Verified    Explore Now   
   >http://s4k4ceiapwwgcm3mkb6e4diqecpo7kvdnfr5gg7sph7jjppqkvwwqtyd.onion/   
   >...   
   [end quoted excerpt]   
      
   (using Tor Browser 13.5.1)   
   https://duckduckgo.com/?q=torguide.org   
   >https://torguide.org   
   >TorGuide - Secure Access to Tor   
   >A collection of chemistry, drugs, explosives, fireworks, pyrotechnics,   
   science, and   
   >weapons related documents. 1100 books (and counting...) Beautifully prepared   
   in   
   >E-Pub format, with a focus on publishing politically incorrect books.   
   Collection of   
   >comic books, largely independent. A collection of hard to find books.   
   >TorGuide - FAQ   
   > Tor, short for "The Onion Router," is a free and open-source software that   
   helps   
   > protect your online privacy by routing your internet traffic through a   
   network of   
   > volunteer-run servers.   
   >Navigating the Shadows: Tor Best Practices for Maximum Anonymity   
   > TorGuide . 2024-01-30 . Navigating the Shadows: Tor Best Practices for   
   Maximum...   
   [end quoted excerpt]   
      
   (using Tor Browser 13.5.1)   
   https://torguide.org/blog/post?id=62   
   >Unveiling the Dark Corners: A Guide to Tor Hidden Services   
   >https://torguide.org/assets/images/blog/posts/65b7cfa7e6edb.jpg   
   >Categories   
   > Tor Network Security (4)   
   > Tor Anonymity Tips (3)   
   > Dark Web Exploration (4)   
   > Tor Browser Updates (2)   
   > Tor Privacy Guides (3)   
   > Tor Hidden Services (3)   
   > Cybersecurity & Tor (2)   
   > Tor News & Updates (3)   
   > Tor Best Practices (3)   
   > Tor Troubleshooting (2)   
   >TorGuide  2023-12-19   
   >Unveiling the Dark Corners: A Guide to Tor Hidden Services   
   >The Tor network, celebrated for its ability to provide online anonymity and   
   >privacy, also offers a unique feature known as "Hidden Services." These   
   services,   
   >often associated with the dark web, enable websites and online platforms to   
   >operate while concealing their true location and IP addresses. In this guide,   
   >we'll unveil the world of Tor Hidden Services, exploring what they are, how   
   they   
   >work, and their implications for privacy and security.   
   >Understanding Tor Hidden Services   
   > 1. What Are Hidden Services?: Tor Hidden Services, also known as onion   
   services,   
   >    are websites and online platforms that are only accessible through the Tor   
   >    network. They have addresses ending in .onion.   
   > 2. How Do They Work?: Hidden Services use the Tor network's unique routing   
   and   
   >    encryption to provide a high level of privacy and anonymity to both the   
   >    service operator and the users. The location of the server hosting the   
   >    service remains concealed.   
   > 3. Accessing Hidden Services: To access a Tor Hidden Service, you need to use   
   >    the Tor Browser and enter the .onion address in the browser's address bar.   
   >    This ensures that your connection is routed through the Tor network.   
   >Implications for Privacy and Security   
   > 1. Enhanced Anonymity: Hidden Services are designed to provide a high degree   
   of   
   >    anonymity for both the service operator and users. This makes them   
   attractive   
   >    for those seeking privacy.   
   > 2. Protection from DDoS Attacks: The decentralized nature of the Tor network   
   >    makes Hidden Services resilient against distributed denial-of-service   
   (DDoS)   
   >    attacks.   
   > 3. Reduced Risk of IP Exposure: Since the true location of the server remains   
   >    hidden, operators of Hidden Services are less vulnerable to potential   
   threats.   
   >Common Uses of Tor Hidden Services   
   > 1. Secure Communication: Hidden Services are used for secure communication   
   >    platforms, such as encrypted email services and messaging apps.   
   > 2. Whistleblowing: Whistleblowers and journalists often use Hidden Services   
   to   
   >    securely receive and share sensitive information.   
   > 3. Privacy-Focused Forums: Hidden Services host privacy-focused forums and   
   >    communities where users can discuss sensitive topics.   
   > 4. File Sharing: Some Hidden Services offer secure file-sharing platforms,   
   >    allowing users to exchange files without revealing their identities.   
   >Risks and Considerations   
   > 1. Illicit Activities: While many Hidden Services are legitimate, it's   
   >    important to be aware that some may host illegal content or services.   
   >    Exercise caution and adhere to the law when exploring the dark web.   
   > 2. Opsec: If you plan to operate a Hidden Service, practice good operational   
   >    security (Opsec) to protect your identity and data.   
   >Conclusion   
   >Tor Hidden Services offer a unique and powerful way to enhance online privacy   
   >and security. By understanding what they are and how they work, users can make   
   >informed decisions about accessing or even operating Hidden Services. Whether   
   >you're seeking secure communication or exploring the hidden corners of the   
   >internet, Tor Hidden Services play a significant role in preserving online   
   >anonymity and privacy.   
   [end quote]   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca