![](/static/img/peekaboo.16547b8aab5d.png)
![](/static/banners/wAlJ7wr.730fe1f65ca2.png)
User Controls
free onion hosting service
-
2021-04-09 at 5:09 AM UTCfellas is anyone of you all know a free tor hosting? and did the rasbperry pi works for hosting over the darkweb?
-
2021-04-09 at 2:29 PM UTCIt's called a GARDEn fuckbag
-
2021-04-11 at 8:10 PM UTCedited for privacy
-
2021-04-12 at 9:53 AM UTC
Originally posted by netstat setting up an onion service is usually less difficult than setting up a clearnet facing service since you don't have to deal with firewalls or NAT, basically just set up a service to run locally on the server as you would normally do for testing before deploying on the web, then point the tor process on your server at the port the service is listening at
more info here
https://community.torproject.org/onion-services/setup/
just noticed tor recently crippled their website with a giant faggy header and excessive whitespace, bunch of niggers
Word. These days if you have a static site you wanna turn into a hidden service, OnionShare has an option to do that too. Super easy.The following users say it would be alright if the author of this post didn't die in a fire! -
2021-04-12 at 12:05 PM UTClol freedomhost 2.0
-
2021-04-12 at 1:08 PM UTC
-
2021-04-12 at 1:12 PM UTC
Originally posted by Sophie My Virtual Datacenter is pretty much operational, i mean i could rent out server space and facilitate something along those lines. But if i ever end up doing that, it'll be a limited hangout.
that'd be a heat magnet
did I ever tell you how I think they were able to shut down so many of the high-traffic hidden services (ie. Freedomhost) in the past? -
2021-04-12 at 1:18 PM UTC
-
2021-04-12 at 1:30 PM UTC
Originally posted by Sophie I've heard theories but i'd be interested in hearing your thoughts specifically.
basically 'they' scan outbound traffic from all the major VPS providers, then when they find one with a significant amount of tor/onion traffic they target that provider. Either using a subpoenis, some sort of arm-twisting or secret agreement, they have the VPS provider hand over internal data so that they can analyse the machines hosting TOR services themselves.The following users say it would be alright if the author of this post didn't die in a fire! -
2021-04-12 at 2:52 PM UTC
Originally posted by aldra basically 'they' scan outbound traffic from all the major VPS providers, then when they find one with a significant amount of tor/onion traffic they target that provider. Either using a subpoenis, some sort of arm-twisting or secret agreement, they have the VPS provider hand over internal data so that they can analyse the machines hosting TOR services themselves.
that correlation attack is hard to beat. it takes many months but thats about the average time a shady tor site lasts before it is busted. the tor site is one server after all, as long as a service is centralized, it is vulnerable. i know almost jack shit about tech and i can still see the obvious writing on the wall. putting all your eggs in one basket, no matter how well you guard the basket, is fucking stupid. -
2021-04-12 at 8:45 PM UTC
Originally posted by aldra basically 'they' scan outbound traffic from all the major VPS providers, then when they find one with a significant amount of tor/onion traffic they target that provider. Either using a subpoenis, some sort of arm-twisting or secret agreement, they have the VPS provider hand over internal data so that they can analyse the machines hosting TOR services themselves.
Right, but my data center is a small operation, i own all the servers, and with limited hang out i'm talking 10-15 hidden services tops. No CP. Also, it's starting to look more like a VM lab instead of a data center but i dual purpose it. -
2021-04-16 at 7:25 PM UTCWhy would anyone want to host an onion?
-
2021-04-16 at 8:34 PM UTCThe author of this post has returned to nothingness
-
2021-04-16 at 9:55 PM UTC
-
2021-04-16 at 9:58 PM UTC
-
2021-04-16 at 10:02 PM UTCThe author of this post has returned to nothingness
-
2021-04-16 at 11:13 PM UTC
-
2021-04-17 at 4:34 PM UTCThe author of this post has returned to nothingness
-
2021-04-17 at 6:49 PM UTCX Incorrect X
-
2021-04-17 at 6:50 PM UTCthe correct response was: faggot