Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Connecting Remotely - Tor

Use Case

This connection method permits hosting services on the private Internet (aka the "Darknet") as anonymous (.onion) domains.

There are three reasons you might want this:

  1. Unless you share/leak a Tor address, it is totally private and anonymous. Nobody knows it exists, and nobody knows it belongs to you. It is your secure, secret tunnel to the underlying website/API.

  2. If you share/leak a Tor address without associating it to your identity (not easy to do), it is anonymous but not private. People know it exists, but nobody knows it belongs to you. By this method, you can anonymously host a censorship-resistant website/API on the private web.

  3. If you share/leak a Tor address and also associate it with your identity, it is neither private nor anonymous. People know it exists, and they know it belongs to you. This is useful for hosting an identified yet still censorship-resistant website/API on the private web, or for sharing access to the websites/API with select friends and family.

Warning

It is normal for Tor connections to be slow or unreliable at times.

Contents

  1. Creating and Removing Addresses
  2. Connecting over Tor

Creating and Removing Addresses

By default, newly installed services receive unique and randomly-generated Tor addresses for each interface. To add or remove a Tor address, simply navigate to the interface and look under the "Tor" section. If you delete all your Tor addresses, that service interface will no longer be accessible over Tor.

Vanity Addresses

When adding a Tor address to a service interface, can upload a private key to create a vanity address.

Connecting over Tor

Using a Tor Browser

You can connect to your server and installed services from anywhere in the world, privately and anonymously, by visiting its unique http://....onion URL from any Tor-enabled browser.

Running Tor in the Background on your Phone/Laptop

By running Tor in the background on your phone or laptop, certain apps can connect over Tor, even if the apps themselves do not natively support connecting over Tor. Select the guide specific to your phone/laptop: