Merge master
4
Makefile
@ -14,8 +14,8 @@
|
||||
# branch to your personal webwml repository, open a trac ticket in the
|
||||
# website component, and set it to needs_review.
|
||||
|
||||
export STABLETAG=tor-0.3.1.8
|
||||
export DEVTAG=tor-0.3.2.4-alpha
|
||||
export STABLETAG=tor-0.3.1.9
|
||||
export DEVTAG=tor-0.3.2.6-alpha
|
||||
|
||||
WMLBASE=.
|
||||
SUBDIRS=docs eff projects press about download getinvolved donate docs/torbutton
|
||||
|
@ -116,14 +116,14 @@
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<td class="beige">
|
||||
<div class="name">Ramy Raoof</div>
|
||||
<div class="caps">Director</div>
|
||||
<p>
|
||||
Ramy is a technologist and privacy and security researcher with a passion for free/open culture. He has provided and developed digital security plans and strategies for NGOs and members of the media, emergency response in cases of physical threats, support on publishing sensitive materials, secure systems for managing sensitive information, and operational plans for human rights emergency response teams, in Egypt and the MENA region. Most recently, Ramy has been volunteering with different NGOs and civil liberty groups in Central & South America, to enhance their privacy and security through means of behavioral change based on understanding surveillance and threat models in their own contexts and environments. Among different hats, Ramy is Senior Research Technologist at the Egyptian Initiative for Personal Rights (EIPR), Research Fellow with Citizen Lab, and currently a volunteer visitor with Fundación Acceso assisting collectives and networks in Central America around infosec and activism. He is also an Internet Freedom Festival Fellow on security and privacy best practices. Ramy has received multiple international awards for his important work. Most recently, Ramy received the 2017 Heroes of Human Rights and Communications Surveillance from Access Now earlier this month.
|
||||
Ramy is a technologist and privacy and security researcher with a passion for free/open culture. He has provided and developed digital security plans and strategies for NGOs and members of the media, emergency response in cases of physical threats, support on publishing sensitive materials, secure systems for managing sensitive information, and operational plans for human rights emergency response teams, in Egypt and the MENA region. Most recently, Ramy has been volunteering with different NGOs and civil liberty groups in Central & South America, to enhance their privacy and security through means of behavioral change based on understanding surveillance and threat models in their own contexts and environments. Among different hats, Ramy is Senior Research Technologist at the Egyptian Initiative for Personal Rights (EIPR), Research Fellow with Citizen Lab, and currently a volunteer visitor with Fundación Acceso assisting collectives and networks in Central America around infosec and activism. He is also an Internet Freedom Festival Fellow on security and privacy best practices. Ramy has received multiple international awards for his important work. Most recently, Ramy received the 2017 Heroes of Human Rights and Communications Surveillance from Access Now.
|
||||
</p>
|
||||
</td>
|
||||
<td class="beige">
|
||||
<td>
|
||||
<div class="name">Julius Mittenzwei</div>
|
||||
<div class="caps">Director</div>
|
||||
<p>
|
||||
|
@ -16,9 +16,11 @@
|
||||
<li><a href="#support">Support</a></li>
|
||||
<li><a href="#irc">IRC</a></li>
|
||||
<li><a href="#twitter">Twitter</a></li>
|
||||
<li><a href="#bugs">Bug Tracker</a></li>
|
||||
<li><a href="#security">Security Issues</a></li>
|
||||
<li><a href="#badrelays">Report Bad Relays</a></li>
|
||||
<li><a href="#email">Email</a></li>
|
||||
<li><a href="#mail">Mailing Address</a></li>
|
||||
<li><a href="#security">Security Issues</a></li>
|
||||
</ul>
|
||||
|
||||
<a id="support"></a>
|
||||
@ -88,7 +90,34 @@
|
||||
</ul>
|
||||
</p>
|
||||
|
||||
<a id="email"></a>
|
||||
<a id="bugs"></a>
|
||||
<h3><a class="anchor" href="#bugs">Bug Tracker</a></h3>
|
||||
<p>You can report bugs other than <a href="#security">security
|
||||
issues</a> using our <a href="https://trac.torproject.org/projects/tor"
|
||||
>bug tracker</a>. Our
|
||||
<a href="<page getinvolved/volunteer>">volunteer page</a> has
|
||||
convenient links to <a href="<page getinvolved/volunteer>#Projects">
|
||||
project-related queries</a>.</p>
|
||||
|
||||
<a id="security"></a>
|
||||
<h3><a class="anchor" href="#security">Security Issues</a></h3>
|
||||
<p>If you've found a security issue in one of our projects or our
|
||||
infrastructure, please email the respective maintainer. You can find
|
||||
their GPG fingerprint/key on our <a
|
||||
href="https://db.torproject.org">developer ldap search page</a>. Due
|
||||
to the many different projects we have, we do not offer a single
|
||||
list for security issues.</p>
|
||||
|
||||
<a id="badrelays"></a>
|
||||
<h3><a class="anchor" href="#badrelays">Report Bad Relays</a></h3>
|
||||
<p>If you find a relay that you think is malicious, misconfigured,
|
||||
or otherwise broken, please check out our
|
||||
<a href="https://trac.torproject.org/projects/tor/wiki/doc/ReportingBadRelays">
|
||||
wiki page</a> and <a href="https://blog.torproject.org/how-report-bad-relays"
|
||||
>blog post</a> on how to report it.</p>
|
||||
|
||||
|
||||
<a id="email"></a>
|
||||
<h3><a class="anchor" href="#email">Email</a></h3>
|
||||
<p>If you have Tor questions, please try to help yourself via the
|
||||
above support venues. Please don't use this contact address
|
||||
@ -116,15 +145,6 @@
|
||||
Seattle, WA 98194 USA<br><br>
|
||||
</address>
|
||||
|
||||
<a id="security"></a>
|
||||
<h3><a class="anchor" href="#security">Security Issues</a></h3>
|
||||
<p>If you've found a security issue in one of our projects or our
|
||||
infrastructure, please email the respective maintainer. You can find
|
||||
their GPG fingerprint/key on our <a
|
||||
href="https://db.torproject.org">developer ldap search page</a>. Due
|
||||
to the many different projects we have, we do not offer a single
|
||||
list for security issues.
|
||||
|
||||
</div>
|
||||
<!-- END MAINCOL -->
|
||||
<div id = "sidecol">
|
||||
|
@ -36,7 +36,7 @@ href="http://cryptocracy.net/">personal website</a>.</dd>
|
||||
management, travel, and other projects.</dd>
|
||||
|
||||
<dt>Domenik Bork</dt><dd> Worked on
|
||||
Configuration of Hidden Services with User Authorization in Vidalia as
|
||||
Configuration of Onion Services with User Authorization in Vidalia as
|
||||
part of Google Summer of Code 2008.</dd>
|
||||
<dt>Benedikt Boss</dt><dd>Worked during the 2007 Google Summer of Code on <a
|
||||
href="https://svn.torproject.org/svn/topf/trunk/README">TOPF</a>,
|
||||
@ -91,6 +91,8 @@ Builds</a>.</dd>
|
||||
<dd>Original developer for Vidalia,
|
||||
a cross-platform Tor Graphical User Interface included in the bundles.</dd>
|
||||
|
||||
<dt>Roya Ensafi</dt><dd>Detects and understands how to manipulate and circumvent Tor network censorship attempts.</dd>
|
||||
|
||||
<dt>Christian Fromme, Developer</dt>
|
||||
<dd>Helped with many Python projects, such as the
|
||||
get-tor email auto-responder, check.torproject.org, bridge db,
|
||||
@ -129,9 +131,6 @@ Arora fork</a>, the <a
|
||||
href="http://code.google.com/p/torsocks/">torsocks
|
||||
scripts</a>, and other useful peripheral tools.</dd>
|
||||
|
||||
<dt>Dr. Nick Hopper, Researcher</dt>
|
||||
<dd>Cryptographer, privacy expert, and professor.</dd>
|
||||
|
||||
<dt>Leiah Jansen, Graphic Designer</dt>
|
||||
<dd>Helped make our cool logos, designs, stickers, graphics, and so on.
|
||||
Invented the awesome "roots" Tor logo.</dd>
|
||||
@ -182,7 +181,7 @@ proxying approach for Tor clients on Windows.</dd>
|
||||
Tor is based on, so we didn't have to start from scratch.</dd>
|
||||
|
||||
<dt>Robert Ransom</dt><dd>Found and fixed a bunch of Tor bugs, mostly in
|
||||
Tor's hidden service code, and added several security and usability
|
||||
Tor's onion service code, and added several security and usability
|
||||
features to Tor and Tor Browser Bundle.</dd>
|
||||
|
||||
<dt>Johannes Renner</dt><dd> Worked during the 2007 Google Summer of
|
||||
@ -236,7 +235,7 @@ Bundle build process, especially on Windows.</dd>
|
||||
<dt>Kyle Williams</dt><dd>Developer for JanusVM, a VMWare-based
|
||||
transparent Tor proxy that makes Tor easier to set up and use.</dd>
|
||||
<dt>Christian Wilms</dt><dd> Worked on
|
||||
Performance Enhancing Measures for Tor Hidden Services (<a
|
||||
Performance Enhancing Measures for Tor Onion Services (<a
|
||||
href="https://svn.torproject.org/cgi-bin/viewvs.cgi/tor/branches/hidserv-perf/">svn</a>) as part of Google Summer of Code 2008.</dd>
|
||||
<dt>Jillian C. York</dt><dd><a href="http://jilliancyork.com/">Jillian C. York</a> is a writer, blogger, and activist.</dd>
|
||||
</dl>
|
||||
|
@ -2,6 +2,8 @@
|
||||
# Revision: $Revision$
|
||||
# Translation-Priority: 3-low
|
||||
#include "head.wmi" TITLE="Tor Project: Core People" CHARSET="UTF-8"
|
||||
<link href="$(DOCROOT)/css/people-table.css" rel="stylesheet">
|
||||
|
||||
<div id="content" class="clearfix">
|
||||
<div id="breadcrumbs">
|
||||
<a href="<page index>">Home » </a>
|
||||
@ -10,48 +12,6 @@
|
||||
</div>
|
||||
<div id="maincol">
|
||||
|
||||
<style>
|
||||
table.people td {
|
||||
vertical-align: top;
|
||||
padding: 0px;
|
||||
padding-bottom: 15px;
|
||||
width: 50%;
|
||||
}
|
||||
|
||||
table.people tr td:first-child {
|
||||
padding-right: 10px;
|
||||
}
|
||||
|
||||
.photo {
|
||||
width: 145px;
|
||||
float: left;
|
||||
}
|
||||
|
||||
.icon {
|
||||
width: 20px;
|
||||
margin-right: 4px;
|
||||
padding: 0px;
|
||||
float: right;
|
||||
}
|
||||
|
||||
.field {
|
||||
font-family: "Montserrat";
|
||||
font-size: 0.8rem;
|
||||
color: rgb(50, 50, 50);
|
||||
}
|
||||
|
||||
.description {
|
||||
font-family: "Montserrat";
|
||||
font-size: 0.9rem;
|
||||
padding-top: 15px;
|
||||
}
|
||||
|
||||
.description a, .field a, .name a {
|
||||
font-weight: bold;
|
||||
text-decoration: none;
|
||||
}
|
||||
</style>
|
||||
|
||||
<table class="people">
|
||||
<tr>
|
||||
<td>
|
||||
@ -142,8 +102,8 @@ table.people tr td:first-child {
|
||||
<td>
|
||||
<a id="hellais"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/hellais.png" alt="hellais" /></div>
|
||||
<div class="icon"><a href="https://db.torproject.org/fetchkey.cgi?fingerprint=67EF3966509986E96ACEE84E5D67CD18702287F4"><img src="$(IMGROOT)/pgp-key.png" alt="pgp key" /></a></div>
|
||||
<div class="icon"><a href="https://twitter.com/hellais"><img src="$(IMGROOT)/twitter-small.png" alt="twitter" /></a></div>
|
||||
<div class="icon"><a href="https://db.torproject.org/fetchkey.cgi?fingerprint=67EF3966509986E96ACEE84E5D67CD18702287F4"><img src="$(IMGROOT)/pgp-key.png" alt="pgp key" /></a></div>
|
||||
<div class="name"><a href="#hellais">Arturo Filastò</a></div>
|
||||
<div class="field"><b>IRC:</b> hellais</div>
|
||||
<div class="description">Project leader for <a href="https://ooni.torproject.org/">OONI</a>, has helped with <a href="http://tor2web.org/">tor2web</a>, wrote <a href="https://atlas.torproject.org/">Atlas</a>, and helps improve security.</div>
|
||||
@ -373,6 +333,18 @@ table.people tr td:first-child {
|
||||
<div class="description">Speaks Java and other languages, streamlines build processes, and scrutinizes mathematical concepts behind aggregating tons of Tor network data.</div>
|
||||
</td>
|
||||
|
||||
<td>
|
||||
<a id="redshiftzero"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/redshiftzero.png" alt="redshiftzero" /></div>
|
||||
<div class="icon"><a href="https://twitter.com/redshiftzero"><img src="$(IMGROOT)/twitter-small.png" alt="twitter" /></a></div>
|
||||
<div class="icon"><a href="../keys/redshiftzero.txt"><img src="$(IMGROOT)/pgp-key.png" alt="pgp key" /></a></div>
|
||||
<div class="name"><a href="#redshiftzero">Jennifer Helsby</a></div>
|
||||
<div class="field"><b>IRC:</b> redshiftzero</div>
|
||||
<div class="description">Lead developer of the <a href="https://securedrop.org/">SecureDrop</a> whistleblower platform based at the <a href="https://freedom.press/">Freedom of the Press Foundation</a>.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="qbi"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
|
||||
@ -382,9 +354,7 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> qbi</div>
|
||||
<div class="description">Volunteer that helped translate the website, is part of TorServers.net, and Tor's sysadmin team.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="jselon"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/jselon.png" alt="jselon" /></div>
|
||||
@ -393,7 +363,9 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> jselon</div>
|
||||
<div class="description">Event Coordination, donor management, general office operations.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="julius"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
|
||||
@ -402,9 +374,7 @@ table.people tr td:first-child {
|
||||
<div class="name"><a href="#julius">Julius Mittenzwei</a></div>
|
||||
<div class="description">Germany-based lawyer and Internet activist.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="juris"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
|
||||
@ -413,7 +383,9 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> juris</div>
|
||||
<div class="description">Board member of torservers.net.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="karsten"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/karsten.png" alt="karsten" /></div>
|
||||
@ -422,9 +394,7 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> karsten</div>
|
||||
<div class="description">Primary researcher and developer into <a href="https://metrics.torproject.org/">anonymous metrics</a> which started as a National Science Foundation grant.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="kat5"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/kat5.png" alt="kat5" /></div>
|
||||
@ -432,7 +402,9 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> kat5</div>
|
||||
<div class="description">Volunteer on the Community Team. Helps with t-shirts for relay operators and other odds and ends.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="ailanthus"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/ailanthus.png" alt="ailanthus" /></div>
|
||||
@ -442,16 +414,16 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> ailanthus</div>
|
||||
<div class="description">Writes about Tor in mainstream and technical publications and conducts community workshops to teach people about Tor.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="leif"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
|
||||
<div class="name"><a href="#leif">Leif Ryge</a></div>
|
||||
<div class="description">Works on security analysis, designer of "bananaphone" transport.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="linda"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/linda.png" alt="linda" /></div>
|
||||
@ -460,9 +432,7 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> linda</div>
|
||||
<div class="description">UX team lead.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="ln5"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/ln5.png" alt="ln5" /></div>
|
||||
@ -472,7 +442,9 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> ln5</div>
|
||||
<div class="description">Swedish advocate and Tor Board member. Works on implementing IPv6 in Tor, build automation, and runs a directory authority.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="agrabeli"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/agrabeli.png" alt="agrabeli" /></div>
|
||||
@ -482,9 +454,7 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> agrabeli</div>
|
||||
<div class="description">Maria manages OONI's Partnership Program and writes research reports on internet censorship around the world.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="mcs"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/mcs.png" alt="mcs" /></div>
|
||||
@ -493,7 +463,9 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> mcs</div>
|
||||
<div class="description">Developer on the Tor Browser team.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="matt"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
|
||||
@ -501,9 +473,7 @@ table.people tr td:first-child {
|
||||
<div class="name"><a href="#matt">Matt Blaze</a></div>
|
||||
<div class="description">Chairs the Tor Board of Directors. Professor at the University of Pennsylvania where he researches security, privacy, and anonymity.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="pastly"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/pastly.png" alt="pastly" /></div>
|
||||
@ -512,7 +482,9 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> pastly</div>
|
||||
<div class="description"><a href="http://mattttttssi4lhud.onion/">Implemented</a> the <a href="http://www.robgjansen.com/publications/kist-sec2014.pdf">KIST scheduler</a> into Tor. Helps safely measure Tor. Says helpful things on IRC.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="sysrqb"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
|
||||
@ -522,9 +494,7 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> sysrqb</div>
|
||||
<div class="description">Worked on tor, torsocks, and many other projects. Helped maintain and develop BridgeDB.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="meejah"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/meejah.png" alt="meejah" /></div>
|
||||
@ -534,7 +504,9 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> meejah</div>
|
||||
<div class="description"><a href="https://meejah.ca">Author</a> of <a href="https://github.com/meejah/txtorcon">txtorcon</a>, <a href="https://github.com/meejah/carml">carml</a> and other Tor Python tools including some for bad-relay hunting.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="mtigas"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/mtigas.png" alt="mtigas" /></div>
|
||||
@ -544,9 +516,7 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> mtigas</div>
|
||||
<div class="description">Works on <a href="https://mike.tig.as/onionbrowser/">Onion Browser</a>, iOS, and hacker-journalist at <a href="https://www.propublica.org/">ProPublica</a> running their <a href="https://www.propub3r6espa33w.onion/">onion service</a>.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="moritz"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/moritz.png" alt="moritz" /></div>
|
||||
@ -555,7 +525,9 @@ table.people tr td:first-child {
|
||||
<div class="name"><a href="#moritz">Moritz Bartl</a></div>
|
||||
<div class="description">Co-founder of <a href="https://www.torservers.net/">torservers.net</a>, a network of non-profit organizations that run Tor exit relays.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="n8fr8"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/n8fr8.png" alt="n8fr8" /></div>
|
||||
@ -564,9 +536,7 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> n8fr8</div>
|
||||
<div class="description">Founder of the <a href="https://guardianproject.info/">Guardian Project</a>. Orbot lead developer and contributor to Orfox, Onion Browser and NetCipher SDK. Director of Technology at Tibet Action Institute.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="nickhopper"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/nickhopper.png" alt="nickhopper" /></div>
|
||||
@ -574,7 +544,9 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> nickhopper</div>
|
||||
<div class="description"><a href="https://www-users.cs.umn.edu/~hopper/">Researcher</a> interested in improving Tor's performance and resistance to traffic analysis. Some of my work is described <a href="https://www-users.cs.umn.edu/~hopper/research.html">here</a>.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="nickm"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/nickm.png" alt="nickm" /></div>
|
||||
@ -584,9 +556,7 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> nickm</div>
|
||||
<div class="description">One of the three original designers of Tor - does a lot of the ongoing design work, and coordinates and leads ongoing development.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="boklm"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
|
||||
@ -595,7 +565,9 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> boklm</div>
|
||||
<div class="description">Works on Tor Browser.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="mrphs"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
|
||||
@ -605,9 +577,7 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> mrphs</div>
|
||||
<div class="description">His main area of interests are End-users Accessibility/Security, UX, Censorship, Advocacy and Onion Services.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="syverson"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/syverson.png" alt="syverson" /></div>
|
||||
@ -615,7 +585,9 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> syverson</div>
|
||||
<div class="description"><a href="https://www.nrl.navy.mil">NRL</a> researcher on most things Tor. Inventor of <a href="https://www.onion-router.net/">onion routing</a>, and one of the three original designers of Tor.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="pepijn"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/pepijn.png" alt="pepijn" /></div>
|
||||
@ -624,16 +596,16 @@ table.people tr td:first-child {
|
||||
<div class="name"><a href="#pepijn">Pepijn Le Heux</a></div>
|
||||
<div class="description">Lawyer based in The Netherlands and co-founder of Hart voor Internetvrijheid.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="peter"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
|
||||
<div class="name"><a href="#peter">Peter Palfrader</a></div>
|
||||
<div class="description">Manages the Debian packages, runs one of the directory authorities, and generally helps out a lot.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="phw"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
|
||||
@ -643,9 +615,7 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> phw</div>
|
||||
<div class="description">Maintains <a href="https://gitweb.torproject.org/user/phw/exitmap.git/">exitmap</a> and <a href="https://gitweb.torproject.org/user/phw/sybilhunter.git/">sybilhunter</a>, works on <a href="https://trac.torproject.org/projects/tor/wiki/doc/ReportingBadRelays">bad relay detection</a>, and does <a href="https://nymity.ch/papers.html">security and privacy research</a>.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="robt"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/robt.png" alt="robt" /></div>
|
||||
@ -653,7 +623,9 @@ table.people tr td:first-child {
|
||||
<div class="name"><a href="#robt">Rabbi Rob Thomas</a></div>
|
||||
<div class="description">CEO of Team Cymru, which supports Tor through hosting, research, and infosec assistance.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="ramy"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/ramy.png" alt="ramy" /></div>
|
||||
@ -662,9 +634,7 @@ table.people tr td:first-child {
|
||||
<div class="name"><a href="#ramy">Ramy Raoof</a></div>
|
||||
<div class="description">Tor Board member, technologist, and privacy and security researcher.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="pospeselr"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
|
||||
@ -674,7 +644,9 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> pospeselr</div>
|
||||
<div class="description">Tor Browser developer.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="robgjansen"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/robgjansen.png" alt="robgjansen" /></div>
|
||||
@ -684,9 +656,7 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> robgjansen</div>
|
||||
<div class="description"><a href="https://www.nrl.navy.mil">NRL</a> research scientist, <a href="http://www.robgjansen.com/">leading expert in Tor network performance</a>, and author of <a href="https://shadow.github.io/">Shadow</a>.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
<td>
|
||||
<a id="arma"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/arma.png" alt="arma" /></div>
|
||||
@ -696,13 +666,6 @@ table.people tr td:first-child {
|
||||
<div class="field"><b>IRC:</b> arma</div>
|
||||
<div class="description">Original developer of Tor along with Nick and Paul. Leading privacy researcher, coordinating developers and researchers.</div>
|
||||
</td>
|
||||
|
||||
<td>
|
||||
<a id="roya"></a>
|
||||
<div class="photo"><img src="$(IMGROOT)/people/roya.png" alt="roya" /></div>
|
||||
<div class="name"><a href="#roya">Roya Ensafi</a></div>
|
||||
<div class="description">Detects and understands how to manipulate and circumvent Tor network censorship attempts.</div>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
<tr>
|
||||
|
@ -204,7 +204,7 @@
|
||||
</p>
|
||||
|
||||
<ul>
|
||||
<li><h4><a href="https://ahmia.fi/gsoc/">Ahmia.fi - Search Engine for Hidden Services</a> by Juha Nurmi</h4></li>
|
||||
<li><h4><a href="https://ahmia.fi/gsoc/">Ahmia.fi - Search Engine for Onion Services</a> by Juha Nurmi</h4></li>
|
||||
<li><h4><a href="http://ilv.github.io/gettor_proposal.html">Revamp GetTor</a> by Israel Leiva</h4></li>
|
||||
<li><h4><a href="https://sites.google.com/site/sreenathadev/gsoc-2014-weather-rewrite">Weather Rewrite</a> by Sreenatha Bhatlapenumarthi</h4></li>
|
||||
<li><h4><a href="http://kostas.mkj.lt/gsoc2014/gsoc2014.html">BridgeDB Distributor</a> by Kostas Jakeliunas</h4></li>
|
||||
|
@ -46,7 +46,7 @@
|
||||
Individuals use Tor to keep websites from tracking them and their family
|
||||
members, or to connect to news sites, instant messaging services, or the
|
||||
like when these are blocked by their local Internet providers. Tor's <a
|
||||
href="<page docs/hidden-services>">hidden services</a>
|
||||
href="<page docs/onion-services>">onion services</a>
|
||||
let users publish web sites and other services without needing to reveal
|
||||
the location of the site. Individuals also use Tor for socially sensitive
|
||||
communication: chat rooms and web forums for rape and abuse survivors,
|
||||
|
@ -57,7 +57,7 @@
|
||||
</li>
|
||||
<li><strong>They research sensitive topics.</strong>
|
||||
There's a wealth of information available online. But perhaps in your country, access to information on AIDS, birth control,
|
||||
<a href="http://www.theepochtimes.com/n2/china-news/tibetan-culture-website-shut-down-in-china-53327.html">Tibetan culture</a>,
|
||||
<a href="https://web.archive.org/web/20120107130815/http://www.theepochtimes.com/n2/china-news/tibetan-culture-website-shut-down-in-china-53327.html">Tibetan culture</a>,
|
||||
or world religions is behind a national firewall.
|
||||
</li>
|
||||
<li><strong>They skirt surveillance.</strong> Even harmless web browsing can sometimes raise red flags for suspicious observers. Using Tor protects your privacy by making it extremely dificult for an observer to correlate the sites you visit with your physical-world identity.
|
||||
@ -74,18 +74,15 @@
|
||||
tracks Internet prisoners of conscience and jailed or harmed journalists all over the world. They advise
|
||||
journalists, sources, bloggers, and dissidents to use Tor to ensure their privacy and safety.
|
||||
</li>
|
||||
<li><strong>The US <a href="http://www.ibb.gov/">International Broadcasting Bureau</a></strong>
|
||||
(Voice of America/Radio Free Europe/Radio Free Asia) supports Tor development to help Internet users in countries without
|
||||
safe access to free media. Tor preserves the ability of persons behind national firewalls or under
|
||||
the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy,
|
||||
economics and religion.
|
||||
</li>
|
||||
<li>Tor is part of <strong><a href="https://securedrop.org/">SecureDrop</a></strong>, an open-source whistleblower submission system that media organizations can use to securely accept documents from and communicate with anonymous sources. <a href="https://securedrop.org/directory">Many news organizations</a> use SecureDrop, including the Associated Press, The Washington Post, The New York Times, The CBC, ProPublica, Dagbladet, and more.
|
||||
</li>
|
||||
<li>Tor preserves the ability of people behind national firewalls or under the surveillance of repressive regimes to obtain a global perspective on controversial topics including democracy, economics and religion.
|
||||
</li>
|
||||
<li><strong>Citizen journalists in China</strong> use Tor to write about
|
||||
local events to encourage social change and political reform.
|
||||
</li>
|
||||
<li><strong>Citizens and journalists in <a
|
||||
href="http://www.rsf.org/rubrique.php3?id_rubrique=554">Internet black
|
||||
holes</a></strong> use Tor to research state propaganda and opposing
|
||||
<li><strong>Citizens and journalists in Internet black
|
||||
holes</strong> use Tor to research state propaganda and opposing
|
||||
viewpoints, to file stories with non-State controlled media, and to
|
||||
avoid risking the personal consequences of intellectual curiosity.
|
||||
</li>
|
||||
@ -180,7 +177,7 @@
|
||||
<li>
|
||||
Tor can help activists avoid government or corporate censorship that hinders organization.
|
||||
In one such case, a
|
||||
<a href="http://www.cbc.ca/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a>
|
||||
<a href="https://web.archive.org/web/20071015142759/http://www.cbc.ca:80/canada/story/2005/07/24/telus-sites050724.html">Canadian ISP blocked access to a union website used by their own employees</a>
|
||||
to help organize a strike.
|
||||
</li>
|
||||
</ul>
|
||||
@ -257,7 +254,7 @@
|
||||
<hr>
|
||||
<ul>
|
||||
<li>Frequently we hear about bloggers who are
|
||||
<a href="http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
|
||||
<a href="https://web.archive.org/web/20060910122231/http://online.wsj.com/public/article/SB112541909221726743-Kl4kLxv0wSbjqrkXg_DieY3c8lg_20050930.html">sued</a> or
|
||||
<a href="http://www.usatoday.com/money/workplace/2005-06-14-worker-blogs-usat_x.htm">fired</a>
|
||||
for saying perfectly legal things online, in their blog.</li>
|
||||
<li>We recommend the <a href="http://www.eff.org/issues/bloggers/legal">EFF Legal Guide for Bloggers</a>.</li>
|
||||
@ -280,17 +277,17 @@
|
||||
operations, as well as protecting themselves from physical harm.
|
||||
</li>
|
||||
|
||||
<li><strong>Hidden services:</strong>
|
||||
When the Internet was designed by DARPA, its primary purpose was to be able to facilitate distributed, robust communications in case of
|
||||
local strikes. However, some functions must be centralized, such as command and control sites. It's the nature of the Internet protocols to
|
||||
reveal the geographic location of any server that is reachable online. Tor's hidden services capacity allows military command and
|
||||
control to be physically secure from discovery and takedown.
|
||||
</li>
|
||||
<li><strong>Intelligence gathering:</strong>
|
||||
Military personnel need to use electronic resources run and monitored by insurgents. They do not want the webserver logs on an insurgent website
|
||||
to record a military address, thereby revealing the surveillance.
|
||||
</li>
|
||||
</ul>
|
||||
<li><strong>Onion services:</strong>
|
||||
When the Internet was designed by DARPA, its primary purpose was to be able
|
||||
to facilitate distributed, robust communications in case of local strikes.
|
||||
However, some functions must be centralized, such as command and control
|
||||
sites. It's the nature of the Internet protocols to reveal the geographic
|
||||
location of any server that is reachable online. Tor's onion services
|
||||
capacity allows military command and control to be physically secure from
|
||||
discovery and takedown. </li> <li><strong>Intelligence gathering:</strong>
|
||||
Military personnel need to use electronic resources run and monitored by
|
||||
insurgents. They do not want the webserver logs on an insurgent website to
|
||||
record a military address, thereby revealing the surveillance. </li> </ul>
|
||||
|
||||
<a name="itprofessionals"></a>
|
||||
<h2><a class="anchor" href="#itprofessionals">IT Professionals use Tor</a></h2>
|
||||
@ -318,8 +315,8 @@
|
||||
<a href="http://www.edge.org/q2006/q06_4.html#kelly">con</a>, and <a
|
||||
href="http://web.mit.edu/gtmarx/www/anon.html">academic</a>) over anonymity. The Tor project is based on the belief that anonymity is not
|
||||
just a good idea some of the time — it is a requirement for a free and functioning society. The <a href="http://www.eff.org/issues/anonymity">EFF maintains a good overview</a> of how anonymity was crucial to the founding of the United States. Anonymity is recognized by US courts as a fundamental and important right. In fact, governments mandate anonymity in many cases themselves:
|
||||
<a href="https://www.crimeline.co.za/">police tip lines</a>,
|
||||
<a href="http://www.texasbar.com/Content/ContentGroups/Public_Information1/Legal_Resources_Consumer_Information/Family_Law1/Adoption_Options.htm#sect2">adoption services</a>,
|
||||
<a href="https://www.crimeline.co.za/">police tip lines</a>,
|
||||
<a href="https://en.wikipedia.org/wiki/Closed_adoption">some adoption services</a>,
|
||||
<a href="http://writ.news.findlaw.com/aronson/20020827.html">police officer identities</a>,
|
||||
and so forth. It would be impossible to rehash the entire anonymity debate here — it is too large an issue with too many nuances, and there
|
||||
are plenty of other places where this information can be found. We do have a <a href="<page docs/faq-abuse>">Tor abuse</a> page describing some of
|
||||
|
40
css/people-table.css
Normal file
@ -0,0 +1,40 @@
|
||||
table.people td {
|
||||
vertical-align: top;
|
||||
padding: 0px;
|
||||
padding-bottom: 15px;
|
||||
width: 50%;
|
||||
}
|
||||
|
||||
table.people tr td:first-child {
|
||||
padding-right: 10px;
|
||||
}
|
||||
|
||||
.photo {
|
||||
width: 145px;
|
||||
float: left;
|
||||
}
|
||||
|
||||
.icon {
|
||||
width: 20px;
|
||||
margin-right: 4px;
|
||||
padding: 0px;
|
||||
float: right;
|
||||
}
|
||||
|
||||
.field {
|
||||
font-family: "Montserrat";
|
||||
font-size: 0.8rem;
|
||||
color: rgb(50, 50, 50);
|
||||
}
|
||||
|
||||
.description {
|
||||
font-family: "Montserrat";
|
||||
font-size: 0.9rem;
|
||||
padding-top: 15px;
|
||||
}
|
||||
|
||||
.description a, .field a, .name a {
|
||||
font-weight: bold;
|
||||
text-decoration: none;
|
||||
}
|
||||
|
@ -353,14 +353,14 @@ using technology?</a></li>
|
||||
<h3><a class="anchor" href="#RemoveContent">I want some content removed from a .onion address.</a></h3>
|
||||
<p>The Tor Project does not host, control, nor have the ability to
|
||||
discover the owner or location of a .onion address. The .onion address is
|
||||
an address from <a href="<page docs/hidden-services>">a hidden
|
||||
service</a>. The name you see ending in .onion is a hidden service descriptor.
|
||||
an address from <a href="<page docs/onion-services>">an onion
|
||||
service</a>. The name you see ending in .onion is an onion service descriptor.
|
||||
It's an automatically generated name which can be located on any Tor
|
||||
relay or client anywhere on the Internet. Hidden services are designed
|
||||
relay or client anywhere on the Internet. Onion services are designed
|
||||
to protect both the user and service provider from discovering who they
|
||||
are and where they are from. The design of hidden services means the
|
||||
are and where they are from. The design of onion services means the
|
||||
owner and location of the .onion site is hidden even from us.</p>
|
||||
<p>But remember that this doesn't mean that hidden services are
|
||||
<p>But remember that this doesn't mean that onion services are
|
||||
invulnerable. Traditional police techniques can still be very effective
|
||||
against them, such as interviewing suspects, writing style analysis,
|
||||
technical analysis of the content itself, sting operations, keyboard taps,
|
||||
|
@ -191,11 +191,11 @@ relay.</a></li>
|
||||
run my own?</a></li>
|
||||
</ul>
|
||||
|
||||
<p>Tor hidden services:</p>
|
||||
<p>Tor onion services:</p>
|
||||
|
||||
<ul>
|
||||
<li><a href="#AccessHiddenServices">How do I access hidden services?</a></li>
|
||||
<li><a href="#ProvideAHiddenService">How do I provide a hidden service?</a></li>
|
||||
<li><a href="#AccessOnionServices">How do I access onion services?</a></li>
|
||||
<li><a href="#ProvideAnOnionService">How do I provide an onion service?</a></li>
|
||||
</ul>
|
||||
|
||||
<p>Development:</p>
|
||||
@ -682,15 +682,12 @@ with more funding?</a></h3>
|
||||
|
||||
<p>
|
||||
The Tor network's <a
|
||||
|
||||
href="https://metrics.torproject.org/network.html#networksize">several
|
||||
thousand</a> relays push <a
|
||||
href="https://metrics.torproject.org/network.html#bandwidth">over
|
||||
7.5GB per second on average</a>. We have <a
|
||||
|
||||
href="https://metrics.torproject.org/users.html#direct-users">millions of
|
||||
daily users</a>. But the Tor network is not yet
|
||||
self-sustaining.
|
||||
href="https://metrics.torproject.org/networksize.html">several thousand</a>
|
||||
relays push <a
|
||||
href="https://metrics.torproject.org/bandwidth.html">around 100 Gbps on
|
||||
average</a>. We have <a
|
||||
href="https://metrics.torproject.org/userstats-relay-country.html">millions of
|
||||
daily users</a>. But the Tor network is not yet self-sustaining.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
@ -1817,7 +1814,7 @@ versions.
|
||||
<p>
|
||||
Note also that not every circuit is used to deliver traffic outside of
|
||||
the Tor network. It is normal to see non-exit circuits (such as those
|
||||
used to connect to hidden services, those that do directory fetches,
|
||||
used to connect to onion services, those that do directory fetches,
|
||||
those used for relay reachability self-tests, and so on) that end at
|
||||
a non-exit node. To keep a node from being used entirely, see
|
||||
<tt>ExcludeNodes</tt> and <tt>StrictNodes</tt> in the
|
||||
@ -3001,15 +2998,16 @@ diversity,
|
||||
|
||||
<hr>
|
||||
|
||||
<a id="TorHiddenServices"></a>
|
||||
<h2><a class="anchor">Tor hidden services:</a></h2>
|
||||
# Leaving in old ids to accomodate incoming links.
|
||||
<a id="TorOnionServices"></a><a id="TorHiddenServices"></a>
|
||||
<h2><a class="anchor">Tor onion services:</a></h2>
|
||||
|
||||
<a id="AccessHiddenServices"></a>
|
||||
<h3><a class="anchor" href="#AccessHiddenServices">How do I access
|
||||
hidden services?</a></h3>
|
||||
<a id="AccessOnionServices"></a><a id="AccessHiddenServices"></a>
|
||||
<h3><a class="anchor" href="#AccessOnionServices">How do I access
|
||||
onion services?</a></h3>
|
||||
|
||||
<p>
|
||||
Tor hidden services are named with a special top-level domain (TLD)
|
||||
Tor onion services are named with a special top-level domain (TLD)
|
||||
name in DNS: .onion. Since the .onion TLD is not recognized by the
|
||||
official root DNS servers on the Internet, your application will not
|
||||
get the response it needs to locate the service. Currently, the Tor
|
||||
@ -3020,7 +3018,7 @@ diversity,
|
||||
<p>
|
||||
Therefore, your application <b>needs</b> to pass the .onion hostname to
|
||||
Tor directly. You can't try to resolve it to an IP address, since there
|
||||
<i>is</i> no corresponding IP address: the server is hidden, after all!
|
||||
<i>is</i> no corresponding IP address.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
@ -3044,10 +3042,10 @@ diversity,
|
||||
<p>
|
||||
For applications that do not support HTTP proxy, and so cannot use
|
||||
Polipo, <a href="http://www.freecap.ru/eng/">FreeCap</a> is an
|
||||
alternative. When using FreeCap set proxy protocol to SOCKS 5 and under
|
||||
alternative. When using FreeCap set proxy protocol to SOCKS 5 and under
|
||||
settings set DNS name resolving to remote. This
|
||||
will allow you to use almost any program with Tor without leaking DNS
|
||||
lookups and allow those same programs to access hidden services.
|
||||
lookups and allow those same programs to access onion services.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
@ -3056,13 +3054,13 @@ diversity,
|
||||
|
||||
<hr>
|
||||
|
||||
<a id="ProvideAHiddenService"></a>
|
||||
<h3><a class="anchor" href="#ProvideAHiddenService">How do I provide a
|
||||
hidden service?</a></h3>
|
||||
<a id="ProvideAnOnionService"></a><a id="ProvideAHiddenService"></a>
|
||||
<h3><a class="anchor" href="#ProvideAnOnionService">How do I provide an
|
||||
onion service?</a></h3>
|
||||
|
||||
<p>
|
||||
See the <a href="<page docs/tor-hidden-service>">
|
||||
official hidden service configuration instructions</a>.
|
||||
See the <a href="<page docs/tor-onion-service>">
|
||||
official onion service configuration instructions</a>.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
@ -3951,7 +3949,7 @@ and clients need to predict all the packets they will want to send in
|
||||
a session before picking their exit node!
|
||||
</li>
|
||||
<li>The Tor-internal name spaces would need to be redesigned. We support
|
||||
hidden service ".onion" addresses by intercepting the addresses when
|
||||
onion service ".onion" addresses by intercepting the addresses when
|
||||
they are passed to the Tor client. Doing so at the IP level will require
|
||||
a more complex interface between Tor and the local DNS resolver.
|
||||
</li>
|
||||
@ -4002,7 +4000,7 @@ their path length.</a></h3>
|
||||
<p>
|
||||
Right now the path length is hard-coded at 3 plus the number of nodes in
|
||||
your path that are sensitive. That is, in normal cases it's 3, but for
|
||||
example if you're accessing a hidden service or a ".exit" address it could be 4.
|
||||
example if you're accessing an onion service or a ".exit" address it could be 4.
|
||||
</p>
|
||||
<p>
|
||||
We don't want to encourage people to use paths longer than this — it
|
||||
|
@ -1,165 +1,7 @@
|
||||
## translation metadata
|
||||
# Revision: $Revision$
|
||||
# Translation-Priority: 3-low
|
||||
# Status: obsolete
|
||||
|
||||
#include "head.wmi" TITLE="Tor: Hidden Service Protocol" CHARSET="UTF-8"
|
||||
<div id="content" class="clearfix">
|
||||
<div id="breadcrumbs">
|
||||
<a href="<page index>">Home » </a>
|
||||
<a href="<page docs/documentation>">Documentation » </a>
|
||||
<a href="<page docs/hidden-services>">Hidden Services</a>
|
||||
</div>
|
||||
<div id="maincol">
|
||||
<h2>Tor: Hidden Service Protocol</h2>
|
||||
<hr>
|
||||
#include "head.wmi" TITLE="Redirecting" REDIRECT="docs/onion-services"
|
||||
|
||||
<p>
|
||||
Tor makes it possible for users to hide their locations while offering
|
||||
various kinds of services, such as web publishing or an instant
|
||||
messaging server. Using Tor "rendezvous points," other Tor users can
|
||||
connect to these hidden services, each without knowing the other's
|
||||
network identity. This page describes the technical details of how
|
||||
this rendezvous protocol works. For a more direct how-to, see our <a
|
||||
href="<page docs/tor-hidden-service>">configuring hidden services</a>
|
||||
page.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
A hidden service needs to advertise its existence in the Tor network before
|
||||
clients will be able to contact it. Therefore, the service randomly picks
|
||||
some relays, builds circuits to them, and asks them to act as
|
||||
<em>introduction points</em> by telling them its public key. Note
|
||||
that in the following figures the green links are circuits rather
|
||||
than direct connections. By using a full Tor circuit, it's hard for
|
||||
anyone to associate an introduction point with the hidden server's IP
|
||||
address. While the introduction points and others are told the hidden
|
||||
service's identity (public key), we don't want them to learn about the
|
||||
hidden server's location (IP address).
|
||||
</p>
|
||||
|
||||
<img alt="Tor hidden service step one" src="$(IMGROOT)/THS-1.png">
|
||||
# maybe add a speech bubble containing "PK" to Bob, because that's what
|
||||
# Bob tells to his introduction points
|
||||
|
||||
<p>
|
||||
Step two: the hidden service assembles a <em>hidden service
|
||||
descriptor</em>, containing its public key and a summary of each
|
||||
introduction point, and signs this descriptor with its private key.
|
||||
It uploads that descriptor to a distributed hash table. The descriptor will be
|
||||
found by clients requesting XYZ.onion where XYZ is a 16 character
|
||||
name derived from the service's public key. After
|
||||
this step, the hidden service is set up.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
Although it might seem impractical to use an automatically-generated
|
||||
service name, it serves an important goal: Everyone – including
|
||||
the introduction points, the distributed hash table directory, and of course the
|
||||
clients – can verify that they are talking to the right hidden
|
||||
service. See also <a href="https://en.wikipedia.org/wiki/Zooko%27s_triangle">Zooko's
|
||||
conjecture</a> that out of Decentralized, Secure, and Human-Meaningful,
|
||||
you can achieve at most two. Perhaps one day somebody will implement a <a
|
||||
href="http://www.skyhunter.com/marcs/petnames/IntroPetNames.html">Petname</a>
|
||||
design for hidden service names?
|
||||
</p>
|
||||
|
||||
<img alt="Tor hidden service step two" src="$(IMGROOT)/THS-2.png">
|
||||
# maybe replace "database" with "DHT"; further: how incorrect
|
||||
# is it to *not* add DB to the Tor cloud, now that begin dir cells are in
|
||||
# use?
|
||||
|
||||
<p>
|
||||
Step three: A client that wants to contact a hidden service needs
|
||||
to learn about its onion address first. After that, the client can
|
||||
initiate connection establishment by downloading the descriptor from
|
||||
the distributed hash table. If there is a descriptor for XYZ.onion
|
||||
(the hidden service could also be offline or have left long ago,
|
||||
or there could be a typo in the onion address), the client now
|
||||
knows the set of introduction points and the right public key to
|
||||
use. Around this time, the client also creates a circuit to another
|
||||
randomly picked relay and asks it to act as <em>rendezvous point</em>
|
||||
by telling it a one-time secret.
|
||||
</p>
|
||||
|
||||
<img alt="Tor hidden service step three" src="$(IMGROOT)/THS-3.png">
|
||||
# maybe add "cookie" to speech bubble, separated from the surrounded
|
||||
# "IP1-3" and "PK"
|
||||
|
||||
<p>
|
||||
Step four: When the descriptor is present and the rendezvous
|
||||
point is ready, the client assembles an <em>introduce</em> message
|
||||
(encrypted to the hidden service's public key) including the address
|
||||
of the rendezvous point and the one-time secret. The client sends
|
||||
this message to one of the introduction points, requesting it be
|
||||
delivered to the hidden service. Again, communication takes place
|
||||
via a Tor circuit: nobody can relate sending the introduce message
|
||||
to the client's IP address, so the client remains anonymous.
|
||||
</p>
|
||||
|
||||
<img alt="Tor hidden service step four" src="$(IMGROOT)/THS-4.png">
|
||||
|
||||
<p>
|
||||
Step five: The hidden service decrypts the client's introduce message
|
||||
and finds the address of the rendezvous point and the one-time secret
|
||||
in it. The service creates a circuit to the rendezvous point and
|
||||
sends the one-time secret to it in a rendezvous message.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
At this point it is of special importance that the hidden service sticks to
|
||||
the same set of <a
|
||||
href="<wikifaq>#Whatsthisaboutentryguardformerlyknownashelpernodes">entry
|
||||
guards</a> when creating new circuits. Otherwise an attacker
|
||||
could run his own relay and force a hidden service to create an arbitrary
|
||||
number of circuits in the hope that the corrupt relay is picked as entry
|
||||
node and he learns the hidden server's IP address via timing analysis. This
|
||||
attack was described by Øverlier and Syverson in their paper titled
|
||||
<a href="http://freehaven.net/anonbib/#hs-attack06">Locating Hidden
|
||||
Servers</a>.
|
||||
</p>
|
||||
|
||||
<img alt="Tor hidden service step five" src="$(IMGROOT)/THS-5.png">
|
||||
# it should say "Bob connects to Alice's ..."
|
||||
|
||||
<p>
|
||||
In the last step, the rendezvous point notifies the client about successful
|
||||
connection establishment. After that, both client and hidden service can
|
||||
use their circuits to the rendezvous point for communicating with each
|
||||
other. The rendezvous point simply relays (end-to-end encrypted) messages
|
||||
from client to service and vice versa.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
One of the reasons for not using the introduction circuit
|
||||
for actual communication is that no single relay should
|
||||
appear to be responsible for a given hidden service. This is why the
|
||||
rendezvous point never learns about the hidden service's identity.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
In general, the complete connection between client and hidden service
|
||||
consists of 6 relays: 3 of them were picked by the client with the third
|
||||
being the rendezvous point and the other 3 were picked by the hidden
|
||||
service.
|
||||
</p>
|
||||
|
||||
<img alt="Tor hidden service step six" src="$(IMGROOT)/THS-6.png">
|
||||
|
||||
<p>
|
||||
There are more detailed descriptions about the hidden service protocol than
|
||||
this one. See the
|
||||
<a href="<svnprojects>design-paper/tor-design.pdf">Tor design paper</a>
|
||||
for an in-depth design description and the
|
||||
<a href="<specblob>rend-spec.txt">rendezvous specification</a>
|
||||
for the message formats.
|
||||
</p>
|
||||
</div>
|
||||
<!-- END MAINCOL -->
|
||||
<div id = "sidecol">
|
||||
#include "side.wmi"
|
||||
#include "info.wmi"
|
||||
</div>
|
||||
<!-- END SIDECOL -->
|
||||
</div>
|
||||
<!-- END CONTENT -->
|
||||
#include <foot.wmi>
|
||||
|
162
docs/en/onion-services.wml
Normal file
@ -0,0 +1,162 @@
|
||||
## translation metadata
|
||||
# Revision: $Revision$
|
||||
# Translation-Priority: 3-low
|
||||
|
||||
#include "head.wmi" TITLE="Tor: Onion Service Protocol" CHARSET="UTF-8"
|
||||
<div id="content" class="clearfix">
|
||||
<div id="breadcrumbs">
|
||||
<a href="<page index>">Home » </a>
|
||||
<a href="<page docs/documentation>">Documentation » </a>
|
||||
<a href="<page docs/onion-services>">Onion Services</a>
|
||||
</div>
|
||||
<div id="maincol">
|
||||
<h2>Tor: Onion Service Protocol</h2>
|
||||
<hr>
|
||||
|
||||
<p>
|
||||
Tor makes it possible for users to hide their locations while offering
|
||||
various kinds of services, such as web publishing or an instant
|
||||
messaging server. Using Tor "rendezvous points," other Tor users can
|
||||
connect to these onion services, formerly known as hidden services, each
|
||||
without knowing the other's network identity. This page describes the
|
||||
technical details of how this rendezvous protocol works. For a more direct
|
||||
how-to, see our <a href="<page docs/tor-onion-service>">configuring onion
|
||||
services</a> page. </p>
|
||||
|
||||
<p>
|
||||
An onion service needs to advertise its existence in the Tor network before
|
||||
clients will be able to contact it. Therefore, the service randomly picks
|
||||
some relays, builds circuits to them, and asks them to act as
|
||||
<em>introduction points</em> by telling them its public key. Note
|
||||
that in the following figures the green links are circuits rather
|
||||
than direct connections. By using a full Tor circuit, it's hard for
|
||||
anyone to associate an introduction point with the onion server's IP
|
||||
address. While the introduction points and others are told the onion
|
||||
service's identity (public key), we don't want them to learn about the
|
||||
onion server's location (IP address).
|
||||
</p>
|
||||
|
||||
<img alt="Tor onion service step one" src="$(IMGROOT)/tor-onion-services-1.png">
|
||||
# maybe add a speech bubble containing "PK" to Bob, because that's what
|
||||
# Bob tells to his introduction points
|
||||
|
||||
<p>
|
||||
Step two: the onion service assembles an <em>onion service descriptor</em>,
|
||||
containing its public key and a summary of each introduction point, and
|
||||
signs this descriptor with its private key. It uploads that descriptor to
|
||||
a distributed hash table. The descriptor will be found by clients
|
||||
requesting XYZ.onion where XYZ is a 16 character name derived from the
|
||||
service's public key. After this step, the onion service is set up. </p>
|
||||
|
||||
<p>
|
||||
Although it might seem impractical to use an automatically-generated
|
||||
service name, it serves an important goal: Everyone – including
|
||||
the introduction points, the distributed hash table directory, and of
|
||||
course the clients – can verify that they are talking to the right
|
||||
onion service. See also <a
|
||||
href="https://en.wikipedia.org/wiki/Zooko%27s_triangle">Zooko's
|
||||
conjecture</a> that out of Decentralized, Secure, and Human-Meaningful, you
|
||||
can achieve at most two. Perhaps one day somebody will implement a <a
|
||||
href="http://www.skyhunter.com/marcs/petnames/IntroPetNames.html">Petname</a>
|
||||
design for onion service names? </p>
|
||||
|
||||
<img alt="Tor onion service step two" src="$(IMGROOT)/tor-onion-services-2.png">
|
||||
# maybe replace "database" with "DHT"; further: how incorrect
|
||||
# is it to *not* add DB to the Tor cloud, now that begin dir cells are in
|
||||
# use?
|
||||
|
||||
<p>
|
||||
Step three: A client that wants to contact an onion service needs
|
||||
to learn about its onion address first. After that, the client can
|
||||
initiate connection establishment by downloading the descriptor from
|
||||
the distributed hash table. If there is a descriptor for XYZ.onion
|
||||
(the onion service could also be offline or have left long ago,
|
||||
or there could be a typo in the onion address), the client now
|
||||
knows the set of introduction points and the right public key to
|
||||
use. Around this time, the client also creates a circuit to another
|
||||
randomly picked relay and asks it to act as <em>rendezvous point</em>
|
||||
by telling it a one-time secret.
|
||||
</p>
|
||||
|
||||
<img alt="Tor onion service step three" src="$(IMGROOT)/tor-onion-services-3.png">
|
||||
# maybe add "cookie" to speech bubble, separated from the surrounded
|
||||
# "IP1-3" and "PK"
|
||||
|
||||
<p>
|
||||
Step four: When the descriptor is present and the rendezvous
|
||||
point is ready, the client assembles an <em>introduce</em> message
|
||||
(encrypted to the onion service's public key) including the address
|
||||
of the rendezvous point and the one-time secret. The client sends
|
||||
this message to one of the introduction points, requesting it be
|
||||
delivered to the onion service. Again, communication takes place
|
||||
via a Tor circuit: nobody can relate sending the introduce message
|
||||
to the client's IP address, so the client remains anonymous.
|
||||
</p>
|
||||
|
||||
<img alt="Tor onion service step four" src="$(IMGROOT)/tor-onion-services-4.png">
|
||||
|
||||
<p>
|
||||
Step five: The onion service decrypts the client's introduce message
|
||||
and finds the address of the rendezvous point and the one-time secret
|
||||
in it. The service creates a circuit to the rendezvous point and
|
||||
sends the one-time secret to it in a rendezvous message.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
At this point it is of special importance that the onion service sticks to
|
||||
the same set of <a
|
||||
href="<wikifaq>#Whatsthisaboutentryguardformerlyknownashelpernodes">entry
|
||||
guards</a> when creating new circuits. Otherwise an attacker
|
||||
could run his own relay and force an onion service to create an arbitrary
|
||||
number of circuits in the hope that the corrupt relay is picked as entry
|
||||
node and he learns the onion server's IP address via timing analysis. This
|
||||
attack was described by Øverlier and Syverson in their paper titled
|
||||
<a href="http://freehaven.net/anonbib/#hs-attack06">Locating Hidden
|
||||
Servers</a>.
|
||||
</p>
|
||||
|
||||
<img alt="Tor onion service step five" src="$(IMGROOT)/tor-onion-services-5.png">
|
||||
# it should say "Bob connects to Alice's ..."
|
||||
|
||||
<p>
|
||||
In the last step, the rendezvous point notifies the client about successful
|
||||
connection establishment. After that, both client and onion service can
|
||||
use their circuits to the rendezvous point for communicating with each
|
||||
other. The rendezvous point simply relays (end-to-end encrypted) messages
|
||||
from client to service and vice versa.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
One of the reasons for not using the introduction circuit
|
||||
for actual communication is that no single relay should
|
||||
appear to be responsible for a given onion service. This is why the
|
||||
rendezvous point never learns about the onion service's identity.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
In general, the complete connection between client and onion service
|
||||
consists of 6 relays: 3 of them were picked by the client with the third
|
||||
being the rendezvous point and the other 3 were picked by the onion
|
||||
service.
|
||||
</p>
|
||||
|
||||
<img alt="Tor onion service step six" src="$(IMGROOT)/tor-onion-services-6.png">
|
||||
|
||||
<p>
|
||||
There are more detailed descriptions about the onion service protocol than
|
||||
this one. See the
|
||||
<a href="<svnprojects>design-paper/tor-design.pdf">Tor design paper</a>
|
||||
for an in-depth design description and the
|
||||
<a href="<specblob>rend-spec.txt">rendezvous specification</a>
|
||||
for the message formats.
|
||||
</p>
|
||||
</div>
|
||||
<!-- END MAINCOL -->
|
||||
<div id = "sidecol">
|
||||
#include "side.wmi"
|
||||
#include "info.wmi"
|
||||
</div>
|
||||
<!-- END SIDECOL -->
|
||||
</div>
|
||||
<!-- END CONTENT -->
|
||||
#include <foot.wmi>
|
@ -51,8 +51,8 @@
|
||||
{'url' => 'docs/tor-doc-relay',
|
||||
'txt' => 'Configuring a Relay graphically',
|
||||
},
|
||||
{'url' => 'docs/tor-hidden-service',
|
||||
'txt' => 'Configuring a Hidden Service',
|
||||
{'url' => 'docs/tor-onion-service',
|
||||
'txt' => 'Configuring an Onion Service',
|
||||
},
|
||||
{'url' => 'docs/bridges',
|
||||
'txt' => 'Understanding bridges',
|
||||
|
@ -22,7 +22,7 @@
|
||||
<p>Even though Tor Browser comes with a regular Tor, it will only run
|
||||
as long as you keep Tor Browser open. The following instructions will
|
||||
set up Tor without graphical interface or a browser. Many people prefer
|
||||
this over TBB when they host hidden services or relay traffic for other Tor
|
||||
this over TBB when they host onion services or relay traffic for other Tor
|
||||
users. <hr>
|
||||
<a id="installing"></a>
|
||||
<h2><a class="anchor" href="#installing">Step One: Install a package manager</a></h2>
|
||||
|
@ -1,261 +1,7 @@
|
||||
## translation metadata
|
||||
# Revision: $Revision$
|
||||
# Translation-Priority: 3-low
|
||||
# Status: obsolete
|
||||
|
||||
#include "head.wmi" TITLE="Tor Project: Hidden Service Configuration Instructions" CHARSET="UTF-8"
|
||||
<div id="content" class="clearfix">
|
||||
<div id="breadcrumbs">
|
||||
<a href="<page index>">Home » </a>
|
||||
<a href="<page docs/documentation>">Documentation » </a>
|
||||
<a href="<page docs/tor-hidden-service>">Tor Hidden Service</a>
|
||||
</div>
|
||||
<div id="maincol">
|
||||
<h1>Configuring Hidden Services for <a href="<page index>">Tor</a></h1>
|
||||
<hr>
|
||||
#include "head.wmi" TITLE="Redirecting" REDIRECT="docs/tor-onion-service"
|
||||
|
||||
<p>Tor allows clients and relays to offer hidden services. That is,
|
||||
you can offer a web server, SSH server, etc., without revealing your
|
||||
IP address to its users. In fact, because you don't use any public address,
|
||||
you can run a hidden service from behind your firewall.
|
||||
</p>
|
||||
|
||||
<p>If you have Tor installed, you can see hidden services in action
|
||||
by visiting this <a href="http://duskgytldkxiuqc6.onion/">sample
|
||||
site</a>.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
This page describes the steps for setting up your own hidden service
|
||||
website. For the technical details of how the hidden service protocol
|
||||
works, see our <a href="<page docs/hidden-services>">hidden service
|
||||
protocol</a> page.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<a id="zero"></a>
|
||||
<h2><a class="anchor" href="#zero">Step Zero: Get Tor working</a></h2>
|
||||
<br>
|
||||
|
||||
<p>Before you start, you need to make sure:</p>
|
||||
<ol>
|
||||
<li>Tor is up and running,</li>
|
||||
<li>You actually set it up correctly.</li>
|
||||
</ol>
|
||||
|
||||
<p>Windows users should follow the <a
|
||||
href="<page docs/tor-doc-windows>">Windows
|
||||
howto</a>, OS X users should follow the <a
|
||||
href="<page docs/tor-doc-osx>">OS
|
||||
X howto</a>, and Linux/BSD/Unix users should follow the <a
|
||||
href="<page docs/tor-doc-unix>">Unix howto</a>.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<a id="one"></a>
|
||||
<h2><a class="anchor" href="#one">Step One: Install a web server locally</a></h2>
|
||||
<br>
|
||||
|
||||
<p>
|
||||
First, you need to set up a web server locally. Setting up a web
|
||||
server can be complex. We're not going to cover how to setup a web
|
||||
server here. If you get stuck or want to do more, find a friend who
|
||||
can help you. We recommend you install a new separate web server for
|
||||
your hidden service, since even if you already have one installed,
|
||||
you may be using it (or want to use it later) for a normal website.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
You need to configure your web server so it doesn't give away any
|
||||
information about you, your computer, or your location. Be sure to
|
||||
bind the web server only to localhost (if people could get to it
|
||||
directly, they could confirm that your computer is the one offering
|
||||
the hidden service). Be sure that its error messages don't list
|
||||
your hostname or other hints. Consider putting the web server in a
|
||||
sandbox or VM to limit the damage from code vulnerabilities.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
Once your web server is set up, make
|
||||
sure it works: open your browser and go to <a
|
||||
href="http://localhost:8080/">http://localhost:8080/</a>, where
|
||||
8080 is the webserver port you chose during setup (you can choose any
|
||||
port, 8080 is just an example). Then try putting a file in the main
|
||||
html directory, and make sure it shows up when you access the site.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<a id="two"></a>
|
||||
<h2><a class="anchor" href="#two">Step Two: Configure your hidden service</a></h2>
|
||||
<br>
|
||||
|
||||
<p>Next, you need to configure your hidden service to point to your
|
||||
local web server.
|
||||
</p>
|
||||
|
||||
<p>First, open your torrc file in your favorite text editor. (See
|
||||
<a href="<page docs/faq>#torrc">the torrc FAQ entry</a> to learn
|
||||
what this means.) Go to the middle section and look for the line</p>
|
||||
|
||||
<pre>
|
||||
\############### This section is just for location-hidden services ###
|
||||
</pre>
|
||||
|
||||
<p>
|
||||
This section of the file consists of groups of lines, each representing
|
||||
one hidden service. Right now they are all commented out (the lines
|
||||
start with #), so hidden services are disabled. Each group of lines
|
||||
consists of one <var>HiddenServiceDir</var> line, and one or more
|
||||
<var>HiddenServicePort</var> lines:</p>
|
||||
<ul>
|
||||
<li><var>HiddenServiceDir</var> is a directory where Tor will store information
|
||||
about that hidden service. In particular, Tor will create a file here named
|
||||
<var>hostname</var> which will tell you the onion URL. You don't need to
|
||||
add any files to this directory. Make sure this is not the same directory
|
||||
as the hidserv directory you created when setting up thttpd, as your
|
||||
HiddenServiceDir contains secret information!</li>
|
||||
<li><var>HiddenServicePort</var> lets you specify a virtual port (that is, what
|
||||
port people accessing the hidden service will think they're using) and an
|
||||
IP address and port for redirecting connections to this virtual port.</li>
|
||||
</ul>
|
||||
|
||||
<p>Add the following lines to your torrc:
|
||||
</p>
|
||||
|
||||
<pre>
|
||||
HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
|
||||
HiddenServicePort 80 127.0.0.1:8080
|
||||
</pre>
|
||||
|
||||
<p>You're going to want to change the <var>HiddenServiceDir</var> line, so it points
|
||||
to an actual directory that is readable/writeable by the user that will
|
||||
be running Tor. The above line should work if you're using the OS X Tor
|
||||
package. On Unix, try "/home/username/hidden_service/" and fill in your own
|
||||
username in place of "username". On Windows you might pick:</p>
|
||||
<pre>
|
||||
HiddenServiceDir C:\Users\username\Documents\tor\hidden_service
|
||||
HiddenServicePort 80 127.0.0.1:8080
|
||||
</pre>
|
||||
|
||||
<p>Note that since 0.2.6, both <var>SocksPort</var> and <var>HiddenServicePort</var> support Unix socket.
|
||||
This means that you can point the <var>HiddenServicePort</var> to a Unix socket:</p>
|
||||
<pre>
|
||||
HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
|
||||
HiddenServicePort 80 unix:/path/to/socket
|
||||
</pre>
|
||||
|
||||
<p>Now save the torrc and restart your tor.</p>
|
||||
|
||||
<p>If Tor starts up again, great. Otherwise, something is wrong. First look at
|
||||
your logfiles for hints. It will print some warnings or error messages. That
|
||||
should give you an idea what went wrong. Typically there are typos in the torrc
|
||||
or wrong directory permissions (See <a href="<page docs/faq>#Logs">the
|
||||
logging FAQ entry</a> if you don't know how to enable or find your
|
||||
log file.)
|
||||
</p>
|
||||
|
||||
<p>When Tor starts, it will automatically create the <var>HiddenServiceDir</var>
|
||||
that you specified (if necessary), and it will create two files there.</p>
|
||||
|
||||
<dl>
|
||||
<dt><var>private_key</var></dt>
|
||||
<dd>First, Tor will generate a new public/private keypair for your hidden
|
||||
service. It is written into a file called "private_key". Don't share this key
|
||||
with others -- if you do they will be able to impersonate your hidden
|
||||
service.</dd>
|
||||
<dt><var>hostname</var></dt>
|
||||
<dd>The other file Tor will create is called "hostname". This contains
|
||||
a short summary of your public key -- it will look something like
|
||||
<tt>duskgytldkxiuqc6.onion</tt>. This is the public name for your service,
|
||||
and you can tell it to people, publish it on websites, put it on business
|
||||
cards, etc.</dd>
|
||||
</dl>
|
||||
|
||||
<p>If Tor runs as a different user than you, for example on
|
||||
OS X, Debian, or Red Hat, then you may need to become root to be able
|
||||
to view these files.</p>
|
||||
|
||||
<p>Now that you've restarted Tor, it is busy picking introduction points
|
||||
in the Tor network, and generating a <em>hidden service
|
||||
descriptor</em>. This is a signed list of introduction points along with
|
||||
the service's full public key. It anonymously publishes this descriptor
|
||||
to the directory servers, and other people anonymously fetch it from the
|
||||
directory servers when they're trying to access your service.
|
||||
</p>
|
||||
|
||||
<p>Try it now: paste the contents of the hostname file into your web
|
||||
browser. If it works, you'll get the html page you set up in step one.
|
||||
If it doesn't work, look in your logs for some hints, and keep playing
|
||||
with it until it works.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<a id="three"></a>
|
||||
<h2><a class="anchor" href="#three">Step Three: More advanced tips</a></h2>
|
||||
<br>
|
||||
|
||||
<p>If you plan to keep your service available for a long time, you might
|
||||
want to make a backup copy of the <var>private_key</var> file somewhere.
|
||||
</p>
|
||||
|
||||
<p>If you want to forward multiple virtual ports for a single hidden
|
||||
service, just add more <var>HiddenServicePort</var> lines.
|
||||
If you want to run multiple hidden services from the same Tor
|
||||
client, just add another <var>HiddenServiceDir</var> line. All the following
|
||||
<var>HiddenServicePort</var> lines refer to this <var>HiddenServiceDir</var> line, until
|
||||
you add another <var>HiddenServiceDir</var> line:
|
||||
</p>
|
||||
|
||||
<pre>
|
||||
HiddenServiceDir /usr/local/etc/tor/hidden_service/
|
||||
HiddenServicePort 80 127.0.0.1:8080
|
||||
|
||||
HiddenServiceDir /usr/local/etc/tor/other_hidden_service/
|
||||
HiddenServicePort 6667 127.0.0.1:6667
|
||||
HiddenServicePort 22 127.0.0.1:22
|
||||
</pre>
|
||||
|
||||
<p>Hidden services operators need to practice proper operational security
|
||||
and system administration to maintain security. For some security
|
||||
suggestions please make sure you read over Riseup's <a
|
||||
href="https://help.riseup.net/en/security/network-security/tor/onionservices-best-practices">"Tor
|
||||
hidden services best practices" document</a>. Also, here are some more
|
||||
anonymity issues you should keep in mind:
|
||||
|
||||
</p>
|
||||
<ul>
|
||||
<li>As mentioned above, be careful of letting your web server reveal
|
||||
identifying information about you, your computer, or your location.
|
||||
For example, readers can probably determine whether it's thttpd or
|
||||
Apache, and learn something about your operating system.</li>
|
||||
<li>If your computer isn't online all the time, your hidden service
|
||||
won't be either. This leaks information to an observant adversary.</li>
|
||||
<li>It is generally a better idea to host hidden services on a Tor client
|
||||
rather than a Tor relay, since relay uptime and other properties are
|
||||
publicly visible.</li>
|
||||
<li>The longer a hidden is online, the higher the risk that its
|
||||
location is discovered. The most prominent attacks are building a
|
||||
profile of the hidden service's availability and matching induced
|
||||
traffic patterns.</li>
|
||||
</ul>
|
||||
|
||||
<p>Another common issue is whether to use HTTPS on your relay or
|
||||
not. Have a look at this <a
|
||||
href="https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs">post</a>
|
||||
on the Tor Blog to learn more about these issues.
|
||||
</p>
|
||||
|
||||
<p>Finally, feel free to use the <a
|
||||
href="https://lists.torproject.org/pipermail/tor-onions/">[tor-onions]
|
||||
mailing list</a> to discuss the secure administration and operation of
|
||||
Tor hidden services.</p>
|
||||
|
||||
</div>
|
||||
<!-- END MAINCOL -->
|
||||
<div id = "sidecol">
|
||||
#include "side.wmi"
|
||||
#include "info.wmi"
|
||||
</div>
|
||||
<!-- END SIDECOL -->
|
||||
</div>
|
||||
<!-- END CONTENT -->
|
||||
#include <foot.wmi>
|
||||
|
258
docs/en/tor-onion-service.wml
Normal file
@ -0,0 +1,258 @@
|
||||
## translation metadata
|
||||
# Revision: $Revision$
|
||||
# Translation-Priority: 3-low
|
||||
|
||||
#include "head.wmi" TITLE="Tor Project: Onion Service Configuration Instructions" CHARSET="UTF-8"
|
||||
<div id="content" class="clearfix">
|
||||
<div id="breadcrumbs">
|
||||
<a href="<page index>">Home » </a>
|
||||
<a href="<page docs/documentation>">Documentation » </a>
|
||||
<a href="<page docs/tor-onion-service>">Tor Onion Service</a>
|
||||
</div>
|
||||
<div id="maincol">
|
||||
<h1>Configuring Onion Services for <a href="<page index>">Tor</a></h1>
|
||||
<hr>
|
||||
|
||||
<p>Tor allows clients and relays to offer onion services. That is,
|
||||
you can offer a web server, SSH server, etc., without revealing your
|
||||
IP address to its users. In fact, because you don't use any public address,
|
||||
you can run an onion service from behind your firewall.
|
||||
</p>
|
||||
|
||||
<p>If you have Tor installed, you can see onion services in action
|
||||
by visiting this <a href="http://duskgytldkxiuqc6.onion/">sample
|
||||
site</a>.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
This page describes the steps for setting up your own onion service
|
||||
website. For the technical details of how the onion service protocol
|
||||
works, see our <a href="<page docs/onion-services>">onion service
|
||||
protocol</a> page.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<a id="zero"></a>
|
||||
<h2><a class="anchor" href="#zero">Step Zero: Get Tor working</a></h2>
|
||||
<br>
|
||||
|
||||
<p>Before you start, you need to make sure:</p>
|
||||
<ol>
|
||||
<li>Tor is up and running,</li>
|
||||
<li>You actually set it up correctly.</li>
|
||||
</ol>
|
||||
|
||||
<p>Windows users should follow the <a
|
||||
href="<page docs/tor-doc-windows>">Windows
|
||||
howto</a>, OS X users should follow the <a
|
||||
href="<page docs/tor-doc-osx>">OS
|
||||
X howto</a>, and Linux/BSD/Unix users should follow the <a
|
||||
href="<page docs/tor-doc-unix>">Unix howto</a>.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<a id="one"></a>
|
||||
<h2><a class="anchor" href="#one">Step One: Install a web server locally</a></h2>
|
||||
<br>
|
||||
|
||||
<p>
|
||||
First, you need to set up a web server locally. Setting up a web
|
||||
server can be complex. We're not going to cover how to set up a web
|
||||
server here. If you get stuck or want to do more, find a friend who
|
||||
can help you. We recommend you install a new separate web server for
|
||||
your onion service, since even if you already have one installed,
|
||||
you may be using it (or want to use it later) for a normal website.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
You need to configure your web server so it doesn't give away any
|
||||
information about you, your computer, or your location. Be sure to
|
||||
bind the web server only to localhost (if people could get to it
|
||||
directly, they could confirm that your computer is the one offering
|
||||
the onion service). Be sure that its error messages don't list
|
||||
your hostname or other hints. Consider putting the web server in a
|
||||
sandbox or VM to limit the damage from code vulnerabilities.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
Once your web server is set up, make
|
||||
sure it works: open your browser and go to <a
|
||||
href="http://localhost:8080/">http://localhost:8080/</a>, where
|
||||
8080 is the webserver port you chose during setup (you can choose any
|
||||
port, 8080 is just an example). Then try putting a file in the main
|
||||
html directory, and make sure it shows up when you access the site.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<a id="two"></a>
|
||||
<h2><a class="anchor" href="#two">Step Two: Configure your onion service</a></h2>
|
||||
<br>
|
||||
|
||||
<p>Next, you need to configure your onion service to point to your
|
||||
local web server.
|
||||
</p>
|
||||
|
||||
<p>First, open your torrc file in your favorite text editor. (See
|
||||
<a href="<page docs/faq>#torrc">the torrc FAQ entry</a> to learn
|
||||
what this means.) Go to the middle section and look for the line</p>
|
||||
|
||||
<pre>
|
||||
\############### This section is just for location-hidden services ###
|
||||
</pre>
|
||||
|
||||
<p>
|
||||
This section of the file consists of groups of lines, each representing
|
||||
one onion service. Right now they are all commented out (the lines
|
||||
start with #), so onion services are disabled. Each group of lines
|
||||
consists of one <var>HiddenServiceDir</var> line, and one or more
|
||||
<var>HiddenServicePort</var> lines:</p>
|
||||
<ul>
|
||||
<li><var>HiddenServiceDir</var> is a directory where Tor will store
|
||||
information about that onion service. In particular, Tor will create a
|
||||
file here named <var>hostname</var> which will tell you the onion URL. You
|
||||
don't need to add any files to this directory. Make sure this is not the
|
||||
same directory as the hidserv directory you created when setting up thttpd,
|
||||
as your HiddenServiceDir contains secret information!</li>
|
||||
<li><var>HiddenServicePort</var> lets you specify a virtual port (that is,
|
||||
what port people accessing the onion service will think they're using) and
|
||||
an IP address and port for redirecting connections to this virtual
|
||||
port.</li> </ul>
|
||||
|
||||
<p>Add the following lines to your torrc:
|
||||
</p>
|
||||
|
||||
<pre>
|
||||
HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
|
||||
HiddenServicePort 80 127.0.0.1:8080
|
||||
</pre>
|
||||
|
||||
<p>You're going to want to change the <var>HiddenServiceDir</var> line, so
|
||||
it points to an actual directory that is readable/writeable by the user
|
||||
that will be running Tor. The above line should work if you're using the OS
|
||||
X Tor package. On Unix, try "/home/username/hidden_service/" and fill in
|
||||
your own username in place of "username". On Windows you might pick:</p>
|
||||
<pre> HiddenServiceDir C:\Users\username\Documents\tor\hidden_service
|
||||
HiddenServicePort 80 127.0.0.1:8080 </pre>
|
||||
|
||||
<p>Note that since 0.2.6, both <var>SocksPort</var> and <var>HiddenServicePort</var> support Unix sockets.
|
||||
This means that you can point the <var>HiddenServicePort</var> to a Unix socket:</p>
|
||||
<pre>
|
||||
HiddenServiceDir /Library/Tor/var/lib/tor/hidden_service/
|
||||
HiddenServicePort 80 unix:/path/to/socket
|
||||
</pre>
|
||||
|
||||
<p>Now save the torrc and restart your tor.</p>
|
||||
|
||||
<p>If Tor starts up again, great. Otherwise, something is wrong. First look
|
||||
at your logfiles for hints. It will print some warnings or error messages.
|
||||
That should give you an idea what went wrong. Typically there are typos in
|
||||
the torrc or wrong directory permissions (See <a href="<page
|
||||
docs/faq>#Logs">the logging FAQ entry</a> if you don't know how to enable
|
||||
or find your log file.) </p>
|
||||
|
||||
<p>When Tor starts, it will automatically create the
|
||||
<var>HiddenServiceDir</var> that you specified (if necessary), and it will
|
||||
create two files there.</p>
|
||||
|
||||
<dl>
|
||||
<dt><var>private_key</var></dt>
|
||||
<dd>First, Tor will generate a new public/private keypair for your onion
|
||||
service. It is written into a file called "private_key". Don't share this key
|
||||
with others -- if you do they will be able to impersonate your onion
|
||||
service.</dd>
|
||||
<dt><var>hostname</var></dt>
|
||||
<dd>The other file Tor will create is called "hostname". This contains
|
||||
a short summary of your public key -- it will look something like
|
||||
<tt>duskgytldkxiuqc6.onion</tt>. This is the public name for your service,
|
||||
and you can tell it to people, publish it on websites, put it on business
|
||||
cards, etc.</dd>
|
||||
</dl>
|
||||
|
||||
<p>If Tor runs as a different user than you, for example on
|
||||
OS X, Debian, or Red Hat, then you may need to become root to be able
|
||||
to view these files.</p>
|
||||
|
||||
<p>Now that you've restarted Tor, it is busy picking introduction points
|
||||
in the Tor network, and generating an <em>onion service
|
||||
descriptor</em>. This is a signed list of introduction points along with
|
||||
the service's full public key. It anonymously publishes this descriptor
|
||||
to the directory servers, and other people anonymously fetch it from the
|
||||
directory servers when they're trying to access your service.
|
||||
</p>
|
||||
|
||||
<p>Try it now: paste the contents of the hostname file into your web
|
||||
browser. If it works, you'll get the html page you set up in step one.
|
||||
If it doesn't work, look in your logs for some hints, and keep playing
|
||||
with it until it works.
|
||||
</p>
|
||||
|
||||
<hr>
|
||||
<a id="three"></a>
|
||||
<h2><a class="anchor" href="#three">Step Three: More advanced tips</a></h2>
|
||||
<br>
|
||||
|
||||
<p>If you plan to keep your service available for a long time, you might
|
||||
want to make a backup copy of the <var>private_key</var> file somewhere.
|
||||
</p>
|
||||
|
||||
<p>If you want to forward multiple virtual ports for a single onion
|
||||
service, just add more <var>HiddenServicePort</var> lines.
|
||||
If you want to run multiple onion services from the same Tor
|
||||
client, just add another <var>HiddenServiceDir</var> line. All the following
|
||||
<var>HiddenServicePort</var> lines refer to this <var>HiddenServiceDir</var> line, until
|
||||
you add another <var>HiddenServiceDir</var> line:
|
||||
</p>
|
||||
|
||||
<pre>
|
||||
HiddenServiceDir /usr/local/etc/tor/hidden_service/
|
||||
HiddenServicePort 80 127.0.0.1:8080
|
||||
|
||||
HiddenServiceDir /usr/local/etc/tor/other_hidden_service/
|
||||
HiddenServicePort 6667 127.0.0.1:6667
|
||||
HiddenServicePort 22 127.0.0.1:22
|
||||
</pre>
|
||||
|
||||
<p>Onion services operators need to practice proper operational security
|
||||
and system administration to maintain security. For some security
|
||||
suggestions please make sure you read over Riseup's <a
|
||||
href="https://help.riseup.net/en/security/network-security/tor/onionservices-best-practices">"Tor
|
||||
Hidden (Onion) Services Best Practices" document</a>. Also, here are some
|
||||
more anonymity issues you should keep in mind:
|
||||
|
||||
</p>
|
||||
<ul>
|
||||
<li>As mentioned above, be careful of letting your web server reveal
|
||||
identifying information about you, your computer, or your location.
|
||||
For example, readers can probably determine whether it's thttpd or
|
||||
Apache, and learn something about your operating system.</li>
|
||||
<li>If your computer isn't online all the time, your onion service
|
||||
won't be either. This leaks information to an observant adversary.</li>
|
||||
<li>It is generally a better idea to host onion services on a Tor client
|
||||
rather than a Tor relay, since relay uptime and other properties are
|
||||
publicly visible.</li>
|
||||
<li>The longer an onion service is online, the higher the risk that its
|
||||
location is discovered. The most prominent attacks are building a
|
||||
profile of the onion service's availability and matching induced
|
||||
traffic patterns.</li>
|
||||
</ul>
|
||||
|
||||
<p>Another common issue is whether to use HTTPS on your relay or
|
||||
not. Have a look at this <a
|
||||
href="https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs">post</a> on the Tor Blog to learn more about these issues.
|
||||
</p>
|
||||
|
||||
<p>Finally, feel free to use the <a
|
||||
href="https://lists.torproject.org/pipermail/tor-onions/">[tor-onions]
|
||||
mailing list</a> to discuss the secure administration and operation of
|
||||
Tor onion services.</p>
|
||||
|
||||
</div>
|
||||
<!-- END MAINCOL -->
|
||||
<div id = "sidecol">
|
||||
#include "side.wmi"
|
||||
#include "info.wmi"
|
||||
</div>
|
||||
<!-- END SIDECOL -->
|
||||
</div>
|
||||
<!-- END CONTENT -->
|
||||
#include <foot.wmi>
|
@ -52,8 +52,8 @@
|
||||
{'url' => 'docs/tor-doc-relay',
|
||||
'txt' => 'Configuring a Relay graphically',
|
||||
},
|
||||
{'url' => 'docs/tor-hidden-service',
|
||||
'txt' => 'Configuring a Hidden Service',
|
||||
{'url' => 'docs/tor-onion-service',
|
||||
'txt' => 'Configuring an Onion Service',
|
||||
},
|
||||
{'url' => 'docs/bridges',
|
||||
'txt' => 'Configuring a Bridge Relay',
|
||||
|
@ -0,0 +1,7 @@
|
||||
## translation metadata
|
||||
# Revision: $Revision$
|
||||
# Status: obsolete
|
||||
|
||||
#include "head.wmi" TITLE="Redirecting" REDIRECT="https://donate.torproject.org"
|
||||
|
||||
#include <foot.wmi>
|
@ -19,6 +19,7 @@ form#makeDonation {
|
||||
<li><a href="#bitcoin">Bitcoin</a></li>
|
||||
<li><a href="<page donate/donate-amazon>">Amazon Payments</a></li>
|
||||
<li><a href="https://smile.amazon.com/ch/20-8096820">Amazon Smile</a></li>
|
||||
<li><a href="https://givingassistant.org/np#tor-project-inc">Giving Assistant</a></li>
|
||||
<li><a href="#eubanks">EU Bank Transfer</a></li>
|
||||
<li><a href="#cash">Checks or Money Orders</a></li>
|
||||
<li><a href="#stock">Donate Stock</a></li>
|
||||
@ -112,13 +113,27 @@ form#makeDonation {
|
||||
</p>
|
||||
</div>
|
||||
<!-- END AMAZON -->
|
||||
<!-- BEGIN GIVING -->
|
||||
<a id="giving"></a>
|
||||
<div class="hundred toptwenty">
|
||||
<div class="dbox donate">
|
||||
<h3>Donate via Giving Assistant</h3>
|
||||
<p>Giving Assistant helps you donate a percentage of your cash back earnings to us with every purchase you make at 3,000+ popular online retailers.</p>
|
||||
<p>
|
||||
<strong>
|
||||
<a href="https://givingassistant.org/np#tor-project-inc">Use Giving Assistant to save money and support the Tor Project</a>
|
||||
</strong>
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- END GIVING -->
|
||||
<!-- BEGIN TRANSFER -->
|
||||
<a id="eubanks"></a>
|
||||
<div class="">
|
||||
<h3 style="margin-top:20px;">Donate via European Bank Transfer</h3>
|
||||
<p>For European bank transfers, we have an arrangement with
|
||||
the Renewable Freedom Foundation to provide
|
||||
<a href="http://www.solicitorsjournal.com/news/private-client/charities/gifts-foreign-charities-are-tax-deductible-ecj-rules">tax-deductible</a>
|
||||
the Renewable Freedom Foundation to provide tax-deductible
|
||||
donations for Europeans. They will issue a donation receipt <a
|
||||
href="https://renewablefreedom.org/contact/">upon request</a>. The
|
||||
account information is as follows:</p>
|
||||
|
7
donate/en/donate-pdr-hp.wml
Normal file
@ -0,0 +1,7 @@
|
||||
## translation metadata
|
||||
# Revision: $Revision$
|
||||
# Status: obsolete
|
||||
|
||||
#include "head.wmi" TITLE="Redirecting" REDIRECT="https://donate.torproject.org"
|
||||
|
||||
#include <foot.wmi>
|
@ -0,0 +1,7 @@
|
||||
## translation metadata
|
||||
# Revision: $Revision$
|
||||
# Status: obsolete
|
||||
|
||||
#include "head.wmi" TITLE="Redirecting" REDIRECT="https://donate.torproject.org"
|
||||
|
||||
#include <foot.wmi>
|
@ -88,7 +88,7 @@
|
||||
</li>
|
||||
<li>
|
||||
<p><strong>I would like to know more about how Tor works,
|
||||
what hidden services are, or how to run a relay.</strong></p>
|
||||
what onion services are, or how to run a relay.</strong></p>
|
||||
<p><a href="<page docs/faq>"
|
||||
target="_blank">This Tor Project FAQ</a> has answers to all
|
||||
those questions, and more.</p>
|
||||
|
@ -14,7 +14,7 @@
|
||||
<ol>
|
||||
<li>Please consider <a href="<page docs/tor-doc-relay>">running
|
||||
a relay</a> to help the Tor network grow.</li>
|
||||
<li>Tell your friends! Get them to run relays. Get them to run hidden
|
||||
<li>Tell your friends! Get them to run relays. Get them to run onion
|
||||
services. Get them to tell their friends.</li>
|
||||
<li>If you like Tor's goals, please <a href="<page donate/donate>">take a moment
|
||||
to donate to support further Tor development</a>. We're also looking
|
||||
@ -378,12 +378,12 @@ meetings around the world.</li>
|
||||
|
||||
<p>
|
||||
<b>Project Ideas:</b><br />
|
||||
<i><a href="#improveHiddenServices">Help improve Tor hidden services</a></i><br />
|
||||
<i><a href="#improveOnionServices">Help improve Tor onion services</a></i><br />
|
||||
<i><a href="#torFuzzing">Fuzzing coverage of Tor</a></i><br />
|
||||
<i><a href="#relayCryptoParallelism">Relay crypto parallelism</a></i><br />
|
||||
<i><a href="#anonymousLocalCountStatistics">Anonymous local count statistics</a></i><br />
|
||||
<i><a href="#improveSocks5Variant">Improved SOCKS5 variant</a></i><br />
|
||||
<i><a href="#hiddenServiceCryptoParallelism">Hidden service crypto parallelism</a></i><br />
|
||||
<i><a href="#onionServiceCryptoParallelism">Onion service crypto parallelism</a></i><br />
|
||||
<i><a href="#supportAllDNS">Support all kinds of DNS in Tor</a></i><br />
|
||||
<i><a href="#improveIpv6Support">Improve IPv6 support</a></i>
|
||||
</p>
|
||||
@ -765,28 +765,29 @@ meetings around the world.</li>
|
||||
|
||||
<ol>
|
||||
|
||||
<a id="improveHiddenServices"></a>
|
||||
#Keep old ids in case of incoming links.
|
||||
<a id="improveOnionServices"></a><a id="improveHiddenServices"></a>
|
||||
<li>
|
||||
<b>Help improve Tor hidden services</b>
|
||||
<b>Help improve Tor onion services</b>
|
||||
<br>
|
||||
Language: <i>C</i>
|
||||
<br>
|
||||
Likely Mentors: <i>George (asn), David Goulet (dgoulet)</i>
|
||||
<br><br>
|
||||
<p>
|
||||
The hidden services team is busy implementing <a
|
||||
The onion services team is busy implementing <a
|
||||
href="https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt">proposal
|
||||
224</a> but we are always open to mentoring fun and exciting hidden
|
||||
224</a> but we are always open to mentoring fun and exciting onion
|
||||
service projects.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
In the past, we've mentored a wide variety of projects related to hidden
|
||||
In the past, we've mentored a wide variety of projects related to onion
|
||||
services, ranging from <a
|
||||
href="https://lists.torproject.org/pipermail/tor-dev/2016-April/010832.html">onion
|
||||
search engines</a>, <a
|
||||
href="https://lists.torproject.org/pipermail/tor-talk/2015-May/037966.html">to
|
||||
scaling techniques for hidden services</a>,
|
||||
scaling techniques for onion services</a>,
|
||||
and also various approaches
|
||||
of making onion services more <a
|
||||
href="https://lists.torproject.org/pipermail/tor-dev/2012-June/003588.html">usable</a>
|
||||
@ -892,24 +893,25 @@ For more information <a href="https://trac.torproject.org/projects/tor/ticket/12
|
||||
</p>
|
||||
</li>
|
||||
|
||||
<a id="hiddenServiceCryptoParallelism"></a>
|
||||
#Keep old ids in case of incoming links.
|
||||
<a id="onionServiceCryptoParallelism"></a><a id="hiddenServiceCryptoParallelism"></a>
|
||||
<li>
|
||||
<b>Hidden service crypto parallelism</b>
|
||||
<b>Onion service crypto parallelism</b>
|
||||
<br>
|
||||
Likely Mentors: <i>Nick (nickm), David Goulet (dgoulet)</i>
|
||||
<br><br>
|
||||
<p>
|
||||
Hidden services, hidden service clients, hidden service directories,
|
||||
Onion services, onion service clients, onion service directories,
|
||||
and introduction points all need to do a few public-key operations as
|
||||
they operate. But right now, these operations are all done on the
|
||||
main thread. It would be good to have these run across multiple cores.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
This could probably be done in a way similar to how we currently hand
|
||||
This could probably be done in a way similar to how we currently handle
|
||||
circuit extension handshakes in onion.c and cpuworker.c, but we'd need
|
||||
to extend the state machine for hidden services to add an additional
|
||||
state. It could help hidden services operate much more efficiently.
|
||||
to extend the state machine for onion services to add an additional
|
||||
state. It could help onion services operate much more efficiently.
|
||||
</p>
|
||||
|
||||
<p>
|
||||
@ -1060,13 +1062,13 @@ For more information <a href="https://trac.torproject.org/projects/tor/ticket/17
|
||||
|
||||
<a id="ahmiaSearch"></a>
|
||||
<li>
|
||||
<b>Ahmia - Hidden Service Search</b>
|
||||
<b>Ahmia - Onion Service Search</b>
|
||||
<br>
|
||||
Language: <i>Python, Django</i>
|
||||
<br>
|
||||
Likely Mentors: <i>Juha Nurmi (numes), George (asn)</i>
|
||||
<p>
|
||||
Ahmia is open-source search engine software for Tor hidden service deep
|
||||
Ahmia is open-source search engine software for Tor onion service deep
|
||||
dark web sites. You can test the running search engine at ahmia.fi. For
|
||||
more information see our <a
|
||||
href="https://blog.torproject.org/category/tags/ahmiafi">blog post about
|
||||
@ -1075,7 +1077,7 @@ For more information <a href="https://trac.torproject.org/projects/tor/ticket/17
|
||||
|
||||
<p>
|
||||
Ahmia is a working search engine that indexes, searches, and catalogs
|
||||
content published on Tor Hidden Services. Furthermore, it is an environment
|
||||
content published on Tor Onion Services. Furthermore, it is an environment
|
||||
to share meaningful insights, statistics, insights, and news about the Tor
|
||||
network itself. In this context, there is a lot of work to do.
|
||||
</p>
|
||||
@ -1098,7 +1100,7 @@ For more information <a href="https://trac.torproject.org/projects/tor/ticket/17
|
||||
<li>Remove these sites from the search results</li>
|
||||
</ul>
|
||||
</li>
|
||||
<li>Add hidden services funtion (very important)<br />
|
||||
<li>Add onion services function (very important)<br />
|
||||
<ul>
|
||||
<li>You can add onions using HTML form</li>
|
||||
<li>Call the crawler immidiately when a new site is added</li>
|
||||
|
BIN
images/THS-1.png
Before Width: | Height: | Size: 55 KiB |
BIN
images/THS-2.png
Before Width: | Height: | Size: 62 KiB |
BIN
images/THS-3.png
Before Width: | Height: | Size: 71 KiB |
BIN
images/THS-4.png
Before Width: | Height: | Size: 70 KiB |
BIN
images/THS-5.png
Before Width: | Height: | Size: 72 KiB |
BIN
images/THS-6.png
Before Width: | Height: | Size: 59 KiB |
BIN
images/people/orig/redshiftzero.jpg
Normal file
After Width: | Height: | Size: 50 KiB |
BIN
images/people/redshiftzero.png
Normal file
After Width: | Height: | Size: 44 KiB |
Before Width: | Height: | Size: 36 KiB |
BIN
images/tor-onion-services-1.png
Normal file
After Width: | Height: | Size: 17 KiB |
BIN
images/tor-onion-services-2.png
Normal file
After Width: | Height: | Size: 19 KiB |
BIN
images/tor-onion-services-3.png
Normal file
After Width: | Height: | Size: 22 KiB |
BIN
images/tor-onion-services-4.png
Normal file
After Width: | Height: | Size: 21 KiB |
BIN
images/tor-onion-services-5.png
Normal file
After Width: | Height: | Size: 22 KiB |
BIN
images/tor-onion-services-6.png
Normal file
After Width: | Height: | Size: 18 KiB |
@ -34,9 +34,7 @@
|
||||
</div>
|
||||
<ul id="navbar" class="nav navbar-nav navbar-right">
|
||||
<li><a href="<page about/overview>">About</a></li>
|
||||
<:{
|
||||
printf '<li><a href="https://donate.torproject.org/donor-faq">Questions?</a></li>'
|
||||
}:>
|
||||
<:{ printf '<li><a href="https://donate.torproject.org/donor-faq">Questions?</a></li>' }:>
|
||||
</ul>
|
||||
</div>
|
||||
</nav>
|
||||
|
@ -45,7 +45,7 @@
|
||||
<ul>
|
||||
<li><a href="<page donate/donate-foot>">Donate</a></li>
|
||||
<li><a href="<page docs/documentation>#MailingLists">Mailing Lists</a></li>
|
||||
<li><a href="<page docs/hidden-services>">Hidden Services</a></li>
|
||||
<li><a href="<page docs/onion-services>">Onion Services</a></li>
|
||||
<li><a href="<page getinvolved/translation>">Translations</a></li>
|
||||
# <li><a href="<page getinvolved/open-positions>">Careers</a></li>
|
||||
</ul>
|
||||
|
@ -13,7 +13,7 @@
|
||||
<define-tag tbbrepo whitespace=delete>https://gitweb.torproject.org/torbrowser.git/blob_plain/HEAD:</define-tag>
|
||||
<define-tag specblob whitespace=delete>https://gitweb.torproject.org/torspec.git/tree/</define-tag>
|
||||
<define-tag doxygen whitespace=delete>https://doxygen.torproject.org/</define-tag>
|
||||
<define-tag donatefaq whitespace=delete>https://donate.torproject.org/donor-faq</define-tag>
|
||||
<define-tag donatefaq whitespace=delete>https://donate.torproject.org/donor-faq</define-tag>
|
||||
|
||||
|
||||
# Xinclude "locallinks.wmi"
|
||||
|
@ -1,5 +1,5 @@
|
||||
<define-tag version-stable whitespace=delete>0.3.1.8</define-tag>
|
||||
<define-tag version-alpha whitespace=delete>0.3.2.4-alpha</define-tag>
|
||||
<define-tag version-stable whitespace=delete>0.3.1.9</define-tag>
|
||||
<define-tag version-alpha whitespace=delete>0.3.2.6-alpha</define-tag>
|
||||
|
||||
<define-tag version-torbrowserdevelopbranch whitespace=delete>maint-7.0</define-tag>
|
||||
|
||||
|
191
keys/redshiftzero.txt
Normal file
@ -0,0 +1,191 @@
|
||||
-----BEGIN PGP PUBLIC KEY BLOCK-----
|
||||
Version: SKS 1.1.6
|
||||
Comment: Hostname: pgp.mit.edu
|
||||
|
||||
mQINBFeRulQBEADjusVDkRxz1fT3rYRfj0Ktlvh3SeqKC3OjUFDI9/morqPDXCxCVm9dWvRJ
|
||||
qQnGWix+7cBwp2d96CoJrchxXojNLPgZ57C0EtXNu1i3SMYrppSD6hT/ZdGlHUONgVO4rfV5
|
||||
gOvKHPhiWf+omD72VtfiTV3W2KG2l6v/IRP+kjcKj09A9PqlO49eK95cP3ErzbnGWR9UNA0r
|
||||
RDgf9nX0RlQXgTTY9dMCdD2HOUPXVUnetenokvuBC3B42l2LkTx76poKcyxf3LsAY6D7e4GU
|
||||
NXhsW65Maj0KM49dtDcMh7bP7fLYcxBj3mx+Y5xpzgzqUqYjEV6ytxLCTYdEgV3W3+9pPzDH
|
||||
UVk0FTZcfpRVJEF1a0yIkO9lZzxF3KojW8ZV1srLpeXiyhzaKqR326lx+ek9gKktfwiioWKb
|
||||
5IWbGGCgncXP9QS4xkIZqJufY4cVULTyDC4/AG4Rxlp1+10OzoMhI4CAyq0tVYXtfpN4Qagw
|
||||
ZJstqZWFu/1W7EVr1cU4TMYkMwh95mOZi5rkq8gr449SzGC8xYL57BBFss3PTwmY/RKVQcXo
|
||||
DByOe/uVhDj7KvuEUh/bh4NOhEGIs7m647PTaKrmm9l6wvADhUQrvIyE39Jw9WwE/vznr4s6
|
||||
kLjFv7zGE7jh9WHkC7mcf+9dqR80XjoKaOqHWtxGoxcNPa0VJQARAQABtCNKZW5uaWZlciBI
|
||||
ZWxzYnkgPGplbkBmcmVlZG9tLnByZXNzPokCHAQTAQIABgUCV8nNdQAKCRC83zXbkMwDENVm
|
||||
D/9MSso0zj4tWoPGYMwYtdJwEPvnhu4T6P++h2edJJXpQRD6Vy/vb6D0M7Rd5n0ZbW68Ta7S
|
||||
x/BMgGG3B0ax7a9PTgy3KeM8r3aAerFudi5lko/F6GCeIkkPfEHgTDevDiI+rFgnJpXS2bz1
|
||||
wohg9ACyFiuDs+U3rhlqeuMDG1wqfMAVnM9C0QA+E27l/87a2buj+nW0esSEHKW4VoXUDPM+
|
||||
DQFOngAAmphsEKtkYoUmBO5DSgaSc2P8Xd+U7epzBvSaM6E5gtWuQ4iqhHYkhtlL1dsnDSC+
|
||||
XLi/LWJvAfdhYe1XEFFbMHO6fTUvq6ZdzugP3eubfJjZYjUw4nb4oUTW5lzKd2ZUymBBtbGk
|
||||
my8xIIs/UPo72d6jrGfjOI2SajG3ikh1AHC0ZsoSgD9lQbr6z97iw4O9j5qFDD/yQd8kyfvR
|
||||
1If0ETZ1SAw1AO1pdYY6J08vKbX8f4w98WRMfpuAJSLJT+30bzqnhaNY1egUB6mFDDJuKxjy
|
||||
QcvUEr3dfWt/cUMSlFTpJiNFtI8utxeJ5i6ool+NUGxJIvpjhDlGrOnfn5zVsyo1UrFZqMNz
|
||||
OMdS4sZAzdlx7GDzk5DNy/zH9rIrNllKGwxBo3jcQ50IBqNTW7uau9MccYTYKqIiMHMZhCkA
|
||||
DUCQOFBupnxwn5EijOAG8hJPYaYDSWTEGAD+9IkCMwQTAQoAHRYhBAzsk2iIpgFxRhF0xcCi
|
||||
WG8J13yCBQJYYnaTAAoJEMCiWG8J13yCa50QALvyL1Q7S+LZ9bGEo4gR9ngfVvtgGe+eY1MF
|
||||
ZZquGoSkMUNs2xQa+W8ostxWgd96cqyT1xQtU+OdE7VD1aUesfQRHTClCVwYSmXxVB0VVMMt
|
||||
HfXhI7IyNqSCy5pj52mbxcvfEdLTVQXxFYWXaPjfbJRw9RI5qnDVeRM0CFAgGFmkLL2zsnA9
|
||||
2k3ZhrUCpDHGHrzmwf0//a1nW6yx62kkmyum08+Fhvoby6ueO5EzQeSs48X5GokKY1kUo5hG
|
||||
LcxJCnb1RS/e00KIKESWwLUbPNk2CWeCNur1vYTJ85O0bzcyLI5ZLJgtenvwq6agcqIH57jO
|
||||
Y5Rlw1xgCZXnL8gqnmYh7jTYmwDRf6mRuKF4/Zl7XeUnR+uWmJZ9DQl46GQ/KE6aTYQbTeeL
|
||||
Uz5kjImzA4JUO73MdCNloHV39+VsWW2I2LHY3xaX3euVxnqRC0WNyWOg7Rf6UpRmj4hw5KFy
|
||||
dxUgkhrd7Z+mHfzWrJuBYh+E3kAD9Xjx+hSNz7dZpF2nvraInTgy5AukdaTOe4k1dtAtFHky
|
||||
wvxBF92UsZNzazInTPXOSVWRrWdQfsaEFe0ER6VMGJ9YLhfWvLzHK+rLODNBx4+g2L29iqLg
|
||||
MeYNZ8iJ8NfF6t6h0f4PsdCGnaOPVnIndLyK4LGaIh2dl7zqhJcBDrgG28qh3MCAtjy1vKZq
|
||||
iQI3BBMBCgAhBQJXkbpUAhsBBQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJENoFt8UquvM0
|
||||
QpEP/27USayKtxDMLL3YXzVpfY+270gjjRnWlsDiqvI/y1BMzhuIzLVrKOmIWOi9hlr6+tnS
|
||||
FVNK6KfllDR0jve0EKLkVLJyyjBcAu8Qh4Cm5VckpoL/uCc7hA0WEMeJb4ziQ5GWUWC17Hoi
|
||||
5I7NxQhP6ioYdLx4HxyXU32Us4xTn88KjnQihT1auuYXR/0QqGWQPmycNDLbSBz4n66RSDtw
|
||||
2lI9VoUBdmz/QIi++4y/e2nb9WqUXnHXFbtDwjklQCc9LJDilY6Wd9sTCwiPJqAOJxX3jSI7
|
||||
FMvy+r3a8osU7D8SY1hSzz15sfdY1+FgBaIy04ujSGBzWo2wI92i8BJnSyQEYzOZP429+Bvh
|
||||
Vi4syXn+2b162Bx2/6Fvw6jrPFTBAsRMqI+JaRm3NQRzMwDDynPSPiHZjYrr6vJclNupzDBl
|
||||
jYOhjCsQ1aR35N08diC+Kc+mWaIcfvByXugqjLmgbDuSfCSAHuM7sXZHupSE+DUjQT5+JcLB
|
||||
K1MnTJ5eqg28rBdbbbjrROOze+XbWFmjqyvyEXzbFl19vOmvB6MnZPWklvJrphP6e/h8fWnX
|
||||
Bzyih46BYqNVa0KKDrCiNKIpDgCMprhFUv3/yBer7m7s1LFTE4yp9M1ZvFHcYMFmPEED+jVc
|
||||
sjGdECV/APxzdSuFELvs/oes/nBJhkX7+Llkl2w7tCZKZW5uaWZlciBIZWxzYnkgPGplbkBy
|
||||
ZWRzaGlmdHplcm8uY29tPokCHAQTAQIABgUCV8nNdQAKCRC83zXbkMwDEC4PD/9W1sxATMb1
|
||||
zMwSXxFuUZCh/rHSqNuHgdalWL4evyHzEE4fQ9G+zxvucjtzdtC8Bl5CzFRdos9Z57K4s96A
|
||||
wSFjkDsga2Cu/EtvXjmGDDB9+o4yl886FRgCZJXIF4AXI9IZt6HFKr8HFHDASBDTxXZkQCq6
|
||||
st71GcIxE1TxsDDkGOwqFNYP9QuASsV7oBF+sncTtBWE0XKWEVQMQxpA/N27TbS2OZPmfqJr
|
||||
UvWg5LWk73dMmQq3eW1f6gpcDbR9bhrQs/84JFDxzVil+Lx+6Q8QGsfZiACMA9ZgmJbh/KnR
|
||||
GKq5bvgTBOIyHFPAnY9I8nZ7fARGnLcr7py25Z2m+xbGBqk1i484mryPD+CyxwFv8W5PH65m
|
||||
VYQQNf7mvEm/Y1JGyLagyeB3zRJwjbHjxaEUWb1TZg0EgRBnct7oUGNWR94q2wwauNvzG/Jz
|
||||
R45mnSnpaaH7hQLu0Il8eSZqE6epGCgh2PpKDYgOoeCCmTT5Ni3HlieeABmmZZjMiaU0wRW1
|
||||
MHLhexPo+4nvkNnI5z40iYm3UIFekx5MNaUIlUas26zSb2GBxpo4Orfw602cbKAMEkbXV8Hg
|
||||
kbDJ8RuDnMx0LgPkCsmX4s/bopZgUhvyHyX4xnsOAijF27bR5zZ4hQUwH4XhurMVQuckaIB1
|
||||
8tbyXsyKQS38duPG7L7fmqfjUokCMwQTAQoAHRYhBAzsk2iIpgFxRhF0xcCiWG8J13yCBQJY
|
||||
YnaTAAoJEMCiWG8J13yCnzIP/RJrylCT1jgbXZWLMJl5P5n8CdyTSglYFKdnZ0OY0tzvwCei
|
||||
x0w6ee7aPQW1t+3yj3I97nlBCNOWVKCjqxwW/DFOPEQBK4OB1gHl6drZmUkmxZDSQCO9t9gm
|
||||
PuAgf+xPpYHhIgxzipZ/fSmGlzP2m+fmKRQblZQOi2IYf88VgnFeUbPYpMSLSBM1Pur4X2FD
|
||||
8KbyATDV/cWWem88Ar8cOybwjU+3XUKOaVv+WT4DxD4FUY3HD+MsH+zPMZwIBaXPSumjG1il
|
||||
PyP+Rn2pCRBQ5dNESnDKOMWUa9gdF9nGULpgfBm7m1TDfx0u/pUtVAMuOQh3eslo7ow5E/42
|
||||
BTyVhN2HsSHGUTnAzLuYORdjLQ6cr2Yd9rPR6/fUA6G8Ug5zTQeVTws7jDWau5CEFjUFs17a
|
||||
2HfWJpuXsIdZJkihXA6tnZujQQlRPdGlgzRxnWWDbyWwVnuCMfJ2zVteotvQOZPWhp+MPPI8
|
||||
0fAJD/AqZs68y/Ph+DDgE/LHhdHvZxHaXDtjSLy4fD5QUSD2wiLENmBAmCPgjjKqaMpTlHex
|
||||
AV5U3TSuszsYnbNCEHgQP/FKnyzCYETcLFWDHaFMIWZ578Q+zx84uZG71wqQbluYGgadZq2G
|
||||
SRW3wn1SfOXQHBwu9cTh9vX9nNEGUDCSMFq8cA/EvZR+PJUMCL9Bn7m2Y09YiQI3BBMBCgAh
|
||||
BQJXkbp8AhsBBQsJCAcDBRUKCQgLBRYCAwEAAh4BAheAAAoJENoFt8UquvM0IeYQAJtHSddV
|
||||
wFaSH1Bx7DZGaon9Fv/ivXsIoD5QXxJrla2u9z4/JXWy7RbAnoofNj2F2vPC7A4iqeALzVA6
|
||||
gCWTpjuZcFAhm3bAAZ0Is06PdkksTkUEOwQfEflSP4OMuGYzVeqdAtlkJA+k+xt+M/0NeR0I
|
||||
LIt1o7WVr8Aua6kelX2gZvsnUV3L4cqJ86MdbVj7hlZo+SjTmBdsaOb3HHriCvuJQCjqgCYM
|
||||
tyEG68uIcQiRc0Jy4pcBCe7WwV4aAtO3iAiNuIXvmX6+LvwiiY+vE5errwtiBAhtLL6gvY+M
|
||||
ZFxrYMmfkuTfTnjY3Rc1isY0tV2l4Ix3pireyWO64IUwtFk01m83KbhnBv9RWoMUErVTpoYJ
|
||||
HnJCwTL5Ftj7RUnvy/oyi3DAHb8rJJh6yTRFqvzNrUJtLuXl0DznwmG7pLIgikisOHdq9BM7
|
||||
EuLIYQrIRzDGbEnDKdYr7zmNcOvyS/0xKYZOejOGXgrZn7wrPRH1HXcF1kHgg1LNmqIUsM4P
|
||||
4l9rBOiEeySIIK5ZtEcAjs5RH1lNiOyYoZIMY9alv1CjS2gOa/vnRzf3gnppnmkxRi6RaBTz
|
||||
oN8aZ5IRwm3ouWRjYq+M1cBxAtRQJ10HEjwQomokKOOk5W+pSVECMA7NRg9GRVX+cx6w0TkW
|
||||
DHYxWC7Ce/gCmKYqRqjgrTr8ejwuuQINBFeRuqgBEAC+C5BCbLQPJk6Zld8Vg18yb3ls89k5
|
||||
Sm++MEBGuHYgY+UyXfG2x6s0yN6UViSRFGwAK3GpHGrdNNImkojS++k0sumo3qyHA1RDerPb
|
||||
IgC9b5oQpWLscs5a/vUlJBVuaWRmTdSCEY//SIh+6sHybxCY/3ug52xYGJFOv1anm1hSNTP9
|
||||
CU063ewhhMETbCe7Z/+K+nJFNSYu42vStu9KwK7+LUI+6X2+PTVg5cGkhR5CUIwrW7I7A+8Q
|
||||
5xpHF5ggI5WCKcRjpQNQw1Elm2Ezz68RUB1YKpsjUItYXo9tayGGHKpu5VeZlY49xXNB9buT
|
||||
5uzKxoC15O7xAUIlP1jnAbxAz4PQhL4jsKEqYo3ZWsCUeviKsrC/GFZU4hdohmvUYvDxsZZR
|
||||
PCNk6L9H7xX5YJELCVFxHvYqSWbwnIEIah4D0wv61L0AeX9z0kh2WxO8Yywxow9XjWuG1ryP
|
||||
HTP46WmfK1Ftya1QVit8sZ85Jyz6/YEWtivjkNlUHa++ihEFEX2o+rwSxIUdq7GiJtaNqZzS
|
||||
YcfgMQbTJXC4eHhskuLelQACXV36nxjImhCE+NGus1KNYkEnDthuAfvzkR5TYnAy0aiGEwM3
|
||||
EzC3rV9jFLs2PbKOPIP18Eks4FDknO3BPUB0CBYiOpEelo+3mvFZSPxC4IhusgrQHqwwt9ip
|
||||
AcDu/QARAQABiQRDBBgBCgAPAhsCBQJZc7h6BQkFpGTSAinBXSAEGQEKAAYFAleRuqgACgkQ
|
||||
sH6AZWrNlQEq+Q/9HFr01IiXD+Xq1F9rKY7aPKeol7znSBIZYFWfFVaI0bDw+GWp9K0l1E4j
|
||||
A5DvtrF2lFUPdvbxAvpfLWEUPZL1Cln7geec2sscq+RU57f737REE0Sk2meWh4ypPdCoSoQ/
|
||||
hTwQA5dNvMjqVlIA4mTiY78TyssgGr0zOseY67BuTpmDuq50c1a6EJPhpvTW57YJHm1Jl/R5
|
||||
DBWxGFXPRkhFFx4Uwe01/aFQc7Fnwe1oqdBepFNBdX4gDm8+cF/AWKH5m9EK+yo0U6sWT+hT
|
||||
cqFDZfLds7hPiiSIxd/prHX5wQ33aP2HxnkoUNaXsgS1ZgsNFk2/XQhak3tPRRIO2Gt4P1KU
|
||||
/qIr3VWJ75/baUXyjr+Ns8v4H+soi8ELB/PoCUo0aU7Iy8IJOTt0BlKKrnkI1IuChGH+vdbG
|
||||
B8AncDSK9NyXCcioW6yQd1EHzB5Ro91nR8QdvC4xbgrlKgPNFVpp1mrM5zCW6AJqyphDdmZB
|
||||
AGRRwjFzW0lafIObbnaUWI+bGYDcdkNsFnnx8hD9KQPIiMeKR9SFypWzFekUApHGQiw19PMK
|
||||
55aDVugEzWxyY4+u/udMXww0t4Pv8gPUipFeMvz55rRxOjSpXicIrdWuUp2/5yWKkfFdzZrv
|
||||
Ish6VWSvAwQWAP1wUC3e02zWPo4++zd0vKmqDuH2aJKuwEklg54JENoFt8UquvM0fPkP91mi
|
||||
1tFe/abmFWDFo3YtMNPIXeve+Mu4YfkvMfuvbJwze1i4RWrb2LvN+0SB6TkdxbUL0Isjjw0k
|
||||
uBsUC8SqAT5RMD4qKCJ7OGvXgT8yuZhhfxlgDCOj6JUjE+rK4qO7mtEj+fz4d4lKDYrB+Fm5
|
||||
y1fTJQ+XskQSmX+vaqgLktpIs6m39S97zjnHVx0IfxHL3PA28TYnjG2AbN8r6l6QHoY9cpGh
|
||||
Lrfv8SUg4nkWRyR82sIDHcAS5JWxMxGjg0gHB3P9zmd5UvRzUfS4Pnf1+u2rzXe6dp9F/xm0
|
||||
faLkuvY/SeguHnLtoFHWC9E91pdNyMP6EiAKF/phgMlmzfWxq26XeVdi+xI6xy6fqmE/X3y3
|
||||
FRXPujdEly1RyTBrwLPp4aVCq6ok+6Ob769TmCvt5cA5a+XXf3XxDe1wj/VkBNZIDsIUol1U
|
||||
l8n7Ngt+DFcXYa/qRoi1YVEADnqG23QVB8VPzcWnkVTEK5smXa31zKNn4GHyULQ4vKbAZJyS
|
||||
5J8MzvoON/Dxw23m0fYMSPGpBUqobScJol1KpMI9sPgfzgSGVEYcHLgahjP4l4neSfuYbsRs
|
||||
Omo0Hv7JAOfmfrH+HG+rOUsAegpzyNwugffj8mbtVOz0EZbQeXkBI3H+wrwB903MGpkTUXfw
|
||||
H7Uheue8hJxyheXIaEvpCJsjqX8I7naJBEQEGAEKAA8FAleRuqgCGwIFCQHhM4ACKQkQ2gW3
|
||||
xSq68zTBXSAEGQEKAAYFAleRuqgACgkQsH6AZWrNlQEq+Q/9HFr01IiXD+Xq1F9rKY7aPKeo
|
||||
l7znSBIZYFWfFVaI0bDw+GWp9K0l1E4jA5DvtrF2lFUPdvbxAvpfLWEUPZL1Cln7geec2ssc
|
||||
q+RU57f737REE0Sk2meWh4ypPdCoSoQ/hTwQA5dNvMjqVlIA4mTiY78TyssgGr0zOseY67Bu
|
||||
TpmDuq50c1a6EJPhpvTW57YJHm1Jl/R5DBWxGFXPRkhFFx4Uwe01/aFQc7Fnwe1oqdBepFNB
|
||||
dX4gDm8+cF/AWKH5m9EK+yo0U6sWT+hTcqFDZfLds7hPiiSIxd/prHX5wQ33aP2HxnkoUNaX
|
||||
sgS1ZgsNFk2/XQhak3tPRRIO2Gt4P1KU/qIr3VWJ75/baUXyjr+Ns8v4H+soi8ELB/PoCUo0
|
||||
aU7Iy8IJOTt0BlKKrnkI1IuChGH+vdbGB8AncDSK9NyXCcioW6yQd1EHzB5Ro91nR8QdvC4x
|
||||
bgrlKgPNFVpp1mrM5zCW6AJqyphDdmZBAGRRwjFzW0lafIObbnaUWI+bGYDcdkNsFnnx8hD9
|
||||
KQPIiMeKR9SFypWzFekUApHGQiw19PMK55aDVugEzWxyY4+u/udMXww0t4Pv8gPUipFeMvz5
|
||||
5rRxOjSpXicIrdWuUp2/5yWKkfFdzZrvIsh6VWSvAwQWAP1wUC3e02zWPo4++zd0vKmqDuH2
|
||||
aJKuwEklg55PdhAAin3qoP5f7akWEXgUC2BO4ngq21TZv3YHGsaSPD7W+M/OgqiLMOakglNS
|
||||
y5utQq3WHzpaJrTRcQBmu7/bCAiLTohVe0KOknvCEDCnk+n8sZWtX7O4CKVLsZ9Do7/NJqVO
|
||||
+M+ibma7pSPEHPq/UpsWEC/WVXfaoghhmg2IQIYxcIn8FaLweYGG5RgJ0yy8NlCZ22zfEbwN
|
||||
hTQmI2roJwJJqG7eA7c/xPWb6kKTfxx4Ib7kgirBpMEmOvHN1vYGNKe2heJRr4TiK0JRUVKf
|
||||
WTFMu5oVosLmr93sfPZME7Bx9fHg0xrMHG6+dbBwRQgw8C8EILqFzTMcXm1Xg70Rya2XfvkS
|
||||
oCctyOtOiCUA/aXvFkjnk3PRAnUNycV/tcVuHP8K+//tJRaYEkvz0QpDB52RbzFJVC+vjMDy
|
||||
XfYfUXqOT+kZk/OOXlI6QDeDfXK06eIPEyK+lKF1ud51uqb+gp4Py0HhXsgICL7CcfvR57FT
|
||||
+WpVEYPqL0iayYBHVVnBU1tV/ynoGF66U2JK92jnNRmmV0uOL6DLV3eF+exD6i1rJD/qP5Zi
|
||||
nzmQyQgRybTu2uuciUqqwTIpx9BQMNqYjw6CvKSPr+qyT4H2iPxBKnnTFTOWlWEH/lbcSQyW
|
||||
yHNN5bStqUMJalNDJR4t+T9fJk36cEQIzv2AYMcEga4RtXZos0G5Ag0EV5G6/wEQAJfkd1aR
|
||||
4d0Ob+gX/GT+sy0uvdwNALHiTz6OMMAjnwr0WViyFYK3ZB7it70o2ny0rC9ZuuxVG+gFx5hO
|
||||
GFhKf4K9Jo9uSUkjAnoF34fsG8oSs5s2S+rolCriboPLiAWUabg0wH1d+LLGdAi/Gh7J7W/0
|
||||
RcnQDYpjlfqi8Ffx0uDRD1YnJ5mJMjobydsWau1R4k5upcI8mSsXBXjr1iK6ypnOHx0GMohB
|
||||
MR+8WgUwzkppV02OQHucGgNf7UuUld1IsaEYh2+oIlLrCCbA1eDx58gGIrgZZO7Yz/cgB18r
|
||||
xjwOlzvUwVrsnEaoGdU5tOqaweOtEaTRHfRGOFa/AboLOmDG7pXcScDi+Z+OpdD3WjIawTci
|
||||
T8LeKeXMXJvH+JLfELy4f7fyYdqFNoGjbiKEF5dTVAXcHDKA26MLhCFBZNSHnELfL9/CDRR1
|
||||
idK+1ayc63htDlnFEsMRj3uBTpHZsDYJkQgiwu+E4RnoF1STcJ46pNxGp/Gz3DkTpjMhBxCf
|
||||
I/sMZEzH0LQnMOAkJRQ3DYzKxleogZ3CNMthY4OU75KQtK6kkKPj4H3EqaVyGPU3nX46YYVY
|
||||
oTO4rDIPYnIxLPvpEr2jOWo8x2zhGXtCd5QL+S/W8WUd/M8xex/KHxUETxus8yBPl/10QZea
|
||||
SEc/BEUGkrsMqrhOR5RVl41+0eS9ABEBAAGJAiUEGAEKAA8CGwwFAllzuK4FCQWkZK8ACgkQ
|
||||
2gW3xSq68zRLXw//WZnKyg2mj1dHItIhkMk9HHlgZt4uo4X++CySRlhrMmA3N3JKaV1U2lk+
|
||||
U1mFADbNlZcIQnkV1EOjMoKRv21sejHITOmSr4cIVT2FnoMg7B7pAzV4jU6gGhCEwk+UxnvG
|
||||
g+gtO+bprr40dCKOAOT4p5iLMDkopY/kGjb42wQxpbdCCjEg3pfqcZe4NB2Hs5r+zHUIStNk
|
||||
KTDqju2YgAbNoSDQ0mouIz14iS39WGDQJHhor2vLtwg8YyoykOnKPtvMhJSfiBR0h0MbaotN
|
||||
uDmU86VILfcTojAoMlSPGluGnAhvIK8BeFttLG/VNemPsNvuoQOezJTKzeD83cVyT1NgSYHz
|
||||
72E3NDLRQquC3agkj9VvW4psT82I55jcgi239cKxyH1+l4fiZODj78i45i/l0xqwzNZdKYjJ
|
||||
VZDdaQyl2jqRLOmug58olpOSzuSbEgm7/NzikZNsENzyjTM8qR4GCPoEwcXa3kqZC5uaN1dA
|
||||
/26nUqQZKtEYp93SsKxRMjwzapIEXWMNxzBY8KhWwKWFPTSKaD0zIzzhlsJicoHwPyJhxJak
|
||||
oFRMtixbrmvxC8dYp4n+tw4Ush+94u5QN0A5avPyGDKlLHdxYKwT5VThky3GPAVls2ycsvFu
|
||||
LjTWxiqvAx3rtZ2YxotI4d9m/IFzFvZ61Owwzgb8Fl+/xvlTzl+JAiUEGAEKAA8FAleRuv8C
|
||||
GwwFCQHhM4AACgkQ2gW3xSq68zQ6Hg/+LPYFhX3+BZ/i5FDmXzX/WKd3fY34lhDxfB2yfI5E
|
||||
JuulyhgFPqa2ll/zS94pi/2EBC1H+ksuVOzgznYDoqHaZbO1JeSUmqxetjiWnrB/xFAtNvoD
|
||||
rZZJIZaScOr02ZyhYLjvfUVDdQXJlfy5yOeenTZLXDaN9hPVERO6MrL1+Mbb8GwB5ljB11TV
|
||||
a0rz+k/yoKeWQNARl9yxoE8744Cek5AfYXZEhHHTn7A/J4wYDn1SBpzmpbHWhM3DLLjrQnYE
|
||||
Lo5FUCnFj3EvddaXP4Oe7MnBh+6b2Nb3gJEPhtAn4W5RursT5e7qfOltXWiNwPkskrnL3unY
|
||||
6L8Eent2nXROAkeO5+9boqajoUnztXtDOZhmsTBLpMZsCPYqBzzp9CmSNSvGrMCPx6uPLq06
|
||||
GMkawx616XFMNBESdMvX/aKKLw8tfCYQaFXLsMO5mdYbcfbPJOZeDAHeJRZtHWr/NUz1Dqbi
|
||||
j2CgfSVBCixdYM5m7qB8eZhajwA/qCjLis++6Wc5A3FeRzCcfraN3BWHefirpl7WAletIrqB
|
||||
2OXwbr7AWwdPu/+bEOcrIt3EHxX2F2HgQGb8fqjMf4Ni+c1hkBWJvTZbVkX0rk0BJo8nlaoh
|
||||
VSm70TaV5CB3KxWOXuXafBdDrtrVGnqcIZ/lkQPJrL048YpqWnHtcrht0H4G3FwPhEm5Ag0E
|
||||
V5G7FAEQAONsX5EHmUyLSYrpNfBVwVQ+yWl6Q6Ik6fSMoVTozOj1EvLht2bWHiAG1e/mFI8m
|
||||
vT4AdBaJ//OFIATmoO9/vdOqfraZmKhK2eENbqPtlcJ6VKNqcWvNpps4fuGSvj9xQrrLTBFP
|
||||
Q6ZgmPHwk1oCheQn4o7JHY3oLKrFipHt6iX2xC5LknF/BsJWWQ8/i+7inBm0CVm+CHY8QzLZ
|
||||
tWkrtjytsfw+mjn4f5LzC/lZc6yV7om3uve/LPHNbdKEbIoAKpP1Jd+gAVJMvakInpvyyyMr
|
||||
KAL1Ob+1kx0UAvZHHeWKx4r+Y3+i4LY7+kNcwY/hODittQSlMWjkp6CCGDs3CruEM51q2jBF
|
||||
bRNVvVuCSHlwtZMh6jMSxqLCPXDg0xJ+WXVDzOCbZ/4T71BV+yfWkKwbFWL0eR45HutMVsE6
|
||||
BYX8tDHnu/5y/xuwJ0xf8yfMPUtuvXaOXNZXm8xYpEYXMTZRkCQ9ygr30MjaV+DY6cV88DHv
|
||||
cQSkB4ZNvY5pqpeGghjDaRyDM4XAYIIXQ0RJYSqI0CdtXBrHrsCglS5sDUDCu5gfYKJmu+XU
|
||||
tWWQf6k/NjzcWvkwhRclNexHQKfOZIluOVHmoceRSEyIGVV5AFgdaMz4Gylv2BWLLVEGNumy
|
||||
CfWGgKNvNWZ7GC9P8FqHY1gZVYwjG4xfGlPteTani6TTABEBAAGJAiUEGAEKAA8CGyAFAllz
|
||||
uLsFCQWkZKcACgkQ2gW3xSq68zR9AQ//V3XyW1ArXGjTuDaFwVoEEOtkAu7n7uAYyFv6SEHK
|
||||
3RN8xAYabKDMfrIKAapvUFvYEkowUbZDQG1rwsHTi07cL7ff73bkaLJ4vvBgOV26X3a+qLs3
|
||||
r9WPURxomo16vsXlYUPJhwNSR/B41HYVOn9gaEpFNegu7Jew1j42kTJbQgF09nSoTwvIUj07
|
||||
NmitvNp+ia72gjOfdwVuttM94pXbP22wqARmrSPkja4XreCHRPj6RkDlmHx4YTy6fA/TE5fq
|
||||
O0X7Oy4nNAJi/bc58angRlg/u8tSSsI27+NrA131fl2s4KzVlbYCD0T6aNGs0jCTMQ1rJIi4
|
||||
BcjLBUdBpKhw15XnbSrxCTKVt8Z+LDsv3ywNvbKueSTFMN507Zyz82fDmUtO9vcuEdBsGhsY
|
||||
Q+khSO9ya/gpUy56ktJZFXh16c0PYjVa/JSRG/jdjbd48LSvKGzWgxG5PhC5nn/VngpTvOWK
|
||||
ZBDN9/TGir1KjBklkyFfXteWHTG8zZj300RaUA52x8+JCW46LJ/ZJaj//Tip82Xsr8rCBIg/
|
||||
EZDKycvS6RbE2rVTEPuta2gQ4E2EypiBLxm3zHeypafCEvqRLWFpmis41+iSFfOBlNrfphYm
|
||||
PXWPiOIVuqDQbGxTpyWPMlW429sqlfWjLhEpEMVcugSa+mDNZqgshuZgJwPviCdr2MqJAiUE
|
||||
GAEKAA8FAleRuxQCGyAFCQHhM4AACgkQ2gW3xSq68zTe3w/+J+m1sDUg336PLU2ILt3I7Y87
|
||||
s426w3XUoFM5ME6iXPYgAwGIB5CkU+oU+6K8UlHkMIHk0exu0M4yAruWpzemihY35w6cFMTE
|
||||
iXnvYHtJqDc50vNP1GnpdyLjB6mRtk//ogb6+C0u3J7K83uonbGYlmuloELPTrXVq5lWuTCB
|
||||
d/R8bvfQcVfX4fJCS31Ud1S6AMjY8JrelxRnziaJLALPU1VzE1EYR+QwlvdURKnyXFRtGksa
|
||||
tOmvqgeM+UyaZElQMhddVGanys9kyzHTqvI9tDbz9LvDZWDpMJCcbvVLqDluRHqRP1fg4+bb
|
||||
KpcoFi8dFRdFaL1CikN1091UJuVbUGuqphSWsErBoTvRUWmZ/jvTd0Bc2EvwipEt1XLA7/zq
|
||||
JfGmM0XNakBo8tyfc65iJOMs6dbjydx9TwMvwRGEGOQ7zs8jApKv1VGaY5bkduG/UNHf3xlE
|
||||
/hGSeP/TUvLvmToxiJOykBWKQsqnA7NIGgOxpCZ8szfjRJAghmt1g8iVjiAo8/oT47PMFmZ8
|
||||
tTU3Fj8/rF9ITTXHUzFSy7e6BFNv889GDwpa+s27abySI2WBQa9RZy4Ghx0xUUGpknceyNK3
|
||||
6TBM8ysplN7sZZqQlGoAVU7SaKuAgHoT+areHt31stHUNjBPT+GBSSg4rwbxe/OMHQG4JmdZ
|
||||
UesO2jUcqeg=
|
||||
=27Y5
|
||||
-----END PGP PUBLIC KEY BLOCK-----
|
@ -50,6 +50,36 @@ some of the significant Tor-related stories that have popped up.</p>
|
||||
</tr>
|
||||
</thead>
|
||||
|
||||
<tr style="background-color: #e5e5e5;">
|
||||
<td>2017 Nov 20</td>
|
||||
<td>Bleeping Computer</td>
|
||||
<td><a href="https://www.bleepingcomputer.com/news/software/another-tor-browser-feature-makes-it-into-firefox-first-party-isolation/">Another Tor Browser Feature Makes It Into Firefox: First-Party Isolation</a></td>
|
||||
</tr>
|
||||
|
||||
<tr style="">
|
||||
<td>2017 Nov 15</td>
|
||||
<td>Motherboard</td>
|
||||
<td><a href="https://motherboard.vice.com/en_us/article/d3devm/motherboard-guide-to-not-getting-hacked-online-safety-guide">The Motherboard Guide to Not Getting Hacked</a></td>
|
||||
</tr>
|
||||
|
||||
<tr style="background-color: #e5e5e5;">
|
||||
<td>2017 Oct 30</td>
|
||||
<td>NakedSecurity</td>
|
||||
<td><a href="https://nakedsecurity.sophos.com/2017/10/30/firefox-takes-a-bite-out-of-the-canvas-super-cookie/">Firefox takes a bite out of the canvas 'super cookie'</a></td>
|
||||
</tr>
|
||||
|
||||
<tr style="">
|
||||
<td>2017 Oct 30</td>
|
||||
<td>BleepingComputer</td>
|
||||
<td><a href="https://www.bleepingcomputer.com/news/software/firefox-implements-another-privacy-preserving-feature-taken-from-the-tor-browser/">Firefox Implements Another Privacy-Preserving Feature Taken From the Tor Browser</a></td>
|
||||
</tr>
|
||||
|
||||
<tr style="background-color: #e5e5e5;">
|
||||
<td>2017 Oct 27</td>
|
||||
<td>NYTimes</td>
|
||||
<td><a href="https://open.nytimes.com/https-open-nytimes-com-the-new-york-times-as-a-tor-onion-service-e0d0b67b7482">The New York Times is Now Available as a Tor Onion Service</a></td>
|
||||
</tr>
|
||||
|
||||
<tr style="">
|
||||
<td>2017 Sep 7</td>
|
||||
<td>Threatpost</td>
|
||||
|
@ -72,16 +72,16 @@
|
||||
<h2>How can I run my own private TorDNSEL?</h2>
|
||||
|
||||
<p>You can learn all about the code for TorDNSEL by visiting the <a
|
||||
href="http://p56soo2ibjkx23xo.onion/">official hidden service</a> through
|
||||
href="http://p56soo2ibjkx23xo.onion/">official onion service</a> through
|
||||
Tor.</p>
|
||||
|
||||
<p>You can download the latest source release from the <a
|
||||
href="http://p56soo2ibjkx23xo.onion/dist/tordnsel-0.0.6.tar.gz">hidden
|
||||
href="http://p56soo2ibjkx23xo.onion/dist/tordnsel-0.0.6.tar.gz">onion
|
||||
service</a> or from a
|
||||
<a href="/tordnsel/dist/tordnsel-0.0.6.tar.gz">
|
||||
local mirror</a>. It's
|
||||
probably wise to check out the current revision from the darcs repository
|
||||
hosted on the aforementioned hidden service.</p>
|
||||
hosted on the aforementioned onion service.</p>
|
||||
|
||||
<p>For more information or to report something useful, please email
|
||||
the
|
||||
|