#onionservices — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #onionservices, aggregated by home.social.
-
Updated my onionscout repo.
onionscout is a lightweight CLI tool for first-pass auditing of Tor hidden services (.onion): clearnet dependency checks, metadata leaks, fingerprinting indicators, basic de-anonymization risks, cookie support for authenticated scans, JSON/TXT output, and a cleaner Rich-based result table.
-
【为什么 Hetzner 不适合Tor🧅出口节点】
https://www.reddit.com/r/TOR/comments/1m9yssc/why_hetzner_is_not_suitable_for_exit_nodesHetzner禁止扫描外网——Tor 出口流量来自运行出口节点的服务器——用户活动包括端口扫描和探测——违反条款——收到滥用报告
所以办法是只运行中继和网桥,而不运行出口节点:
✅ Middle Relay ✅ obfs4 Bridge ✅ Snowflake ✅ WebTunnel
❌ Exit Node -
Discover how to use Monero GUI with Onion remote nodes to keep your XMR transactions private and anonymous. Step-by-step setup, Tor tips, and practical advice for privacy-first crypto users. Dive in and lock down your wallet! #Monero #MoneroGUI #Onion #Tor #Privacy #CryptoPrivacy #Cryptocurrency #Security #OnionServices #English
https://johnydeep.net/videos/watch/ce52c4ca-3ab0-4513-8cb2-bd7b0bfcaf02 -
🚀 New Beta Launch!
We're excited to introduce Tor2Web, now available at https://tor2web.privacytools.click!Tor2Web is a gateway to the Tor network, allowing you to access .onion (hidden) services directly from a regular browser — no Tor client needed.
🔒 Browse anonymously, stay informed, and explore securely.
🧪 Currently in beta – feedback is welcome!Try it now → https://tor2web.privacytools.click
More info at https://privacytools.click#Tor2Web #PrivacyTools #Tor #OnionServices #CyberPrivacy #BetaLaunch
-
🚀 New Beta Launch!
We're excited to introduce Tor2Web, now available at https://tor2web.privacytools.click!Tor2Web is a gateway to the Tor network, allowing you to access .onion (hidden) services directly from a regular browser — no Tor client needed.
🔒 Browse anonymously, stay informed, and explore securely.
🧪 Currently in beta – feedback is welcome!Try it now → https://tor2web.privacytools.click
More info at https://privacytools.click#Tor2Web #PrivacyTools #Tor #OnionServices #CyberPrivacy #BetaLaunch
-
🚀 New Beta Launch!
We're excited to introduce Tor2Web, now available at https://tor2web.privacytools.click!Tor2Web is a gateway to the Tor network, allowing you to access .onion (hidden) services directly from a regular browser — no Tor client needed.
🔒 Browse anonymously, stay informed, and explore securely.
🧪 Currently in beta – feedback is welcome!Try it now → https://tor2web.privacytools.click
More info at https://privacytools.click#Tor2Web #PrivacyTools #Tor #OnionServices #CyberPrivacy #BetaLaunch
-
🚀 New Beta Launch!
We're excited to introduce Tor2Web, now available at https://tor2web.privacytools.click!Tor2Web is a gateway to the Tor network, allowing you to access .onion (hidden) services directly from a regular browser — no Tor client needed.
🔒 Browse anonymously, stay informed, and explore securely.
🧪 Currently in beta – feedback is welcome!Try it now → https://tor2web.privacytools.click
More info at https://privacytools.click#Tor2Web #PrivacyTools #Tor #OnionServices #CyberPrivacy #BetaLaunch
-
🚀 New Beta Launch!
We're excited to introduce Tor2Web, now available at https://tor2web.privacytools.click!Tor2Web is a gateway to the Tor network, allowing you to access .onion (hidden) services directly from a regular browser — no Tor client needed.
🔒 Browse anonymously, stay informed, and explore securely.
🧪 Currently in beta – feedback is welcome!Try it now → https://tor2web.privacytools.click
More info at https://privacytools.click#Tor2Web #PrivacyTools #Tor #OnionServices #CyberPrivacy #BetaLaunch
-
Martedì 22 aprile 2025 alle 21:30, Leandro Noferini presenterà gli #OnionServices di #Tor, all'Officina Informatica del #GOLEM.
https://community.torproject.org/onion-services/Gli Onion Services risolvono in parte la difficoltà di gestire i nodi di uscita della rete Tor, soprattutto dal punto di vista legale, garantendo l'anonimato da ambo le parti, sia per chi naviga, che per chi ospita siti e servizi.
L'officina si trova in via Magolo 32 a #Empoli.
https://wiki.golem.linux.it/Officina_Informatica -
#TorProject State of the Onion
https://inv.nadeko.net/watch?v=EODNtLqD7f8 [perfect example, G de-onions]
https://onionmobile.dev #GuardianProject
https://github.com/blueprint-freespeech/gosling
53:16 - #InternetArchive , web.archive.org/
Access to information--and the preservation of it--otherwise difficult to obtain without a congressional staff and the library of congress. #ALibraryNotThefthttps://www.youtube.com/watch?v=HjPdReNmf_g&t=47
#TAILS
6:00 - partition checking (data integrity)
#Onionspray - facilitate making existing websites onion addressed! 15:00 making the addressing human accessible
18:51 - #Vanguards and #Arti
28:00 "conflux" congestion control
[...a whole lot of the internet doesn't work with Vanguards if it even did work with tor in the first place..]
#OnionServices
29:29 - Network Health
#Censorship
45:00 - webtunnel transport -
#TorProject State of the Onion
https://inv.nadeko.net/watch?v=EODNtLqD7f8 [perfect example, G de-onions]
https://onionmobile.dev #GuardianProject
https://github.com/blueprint-freespeech/gosling
53:16 - #InternetArchive , web.archive.org/
Access to information--and the preservation of it--otherwise difficult to obtain without a congressional staff and the library of congress. #ALibraryNotThefthttps://www.youtube.com/watch?v=HjPdReNmf_g&t=47
#TAILS
6:00 - partition checking (data integrity)
#Onionspray - facilitate making existing websites onion addressed! 15:00 making the addressing human accessible
18:51 - #Vanguards and #Arti
28:00 "conflux" congestion control
[...a whole lot of the internet doesn't work with Vanguards if it even did work with tor in the first place..]
#OnionServices
29:29 - Network Health
#Censorship
45:00 - webtunnel transport -
#TorProject State of the Onion
https://inv.nadeko.net/watch?v=EODNtLqD7f8 [perfect example, G de-onions]
https://onionmobile.dev #GuardianProject
https://github.com/blueprint-freespeech/gosling
53:16 - #InternetArchive , web.archive.org/
Access to information--and the preservation of it--otherwise difficult to obtain without a congressional staff and the library of congress. #ALibraryNotThefthttps://www.youtube.com/watch?v=HjPdReNmf_g&t=47
#TAILS
6:00 - partition checking (data integrity)
#Onionspray - facilitate making existing websites onion addressed! 15:00 making the addressing human accessible
18:51 - #Vanguards and #Arti
28:00 "conflux" congestion control
[...a whole lot of the internet doesn't work with Vanguards if it even did work with tor in the first place..]
#OnionServices
29:29 - Network Health
#Censorship
45:00 - webtunnel transport -
#TorProject State of the Onion
https://inv.nadeko.net/watch?v=EODNtLqD7f8 [perfect example, G de-onions]
https://onionmobile.dev #GuardianProject
https://github.com/blueprint-freespeech/gosling
53:16 - #InternetArchive , web.archive.org/
Access to information--and the preservation of it--otherwise difficult to obtain without a congressional staff and the library of congress. #ALibraryNotThefthttps://www.youtube.com/watch?v=HjPdReNmf_g&t=47
#TAILS
6:00 - partition checking (data integrity)
#Onionspray - facilitate making existing websites onion addressed! 15:00 making the addressing human accessible
18:51 - #Vanguards and #Arti
28:00 "conflux" congestion control
[...a whole lot of the internet doesn't work with Vanguards if it even did work with tor in the first place..]
#OnionServices
29:29 - Network Health
#Censorship
45:00 - webtunnel transport -
#TorProject State of the Onion
https://inv.nadeko.net/watch?v=EODNtLqD7f8 [perfect example, G de-onions]
https://onionmobile.dev #GuardianProject
https://github.com/blueprint-freespeech/gosling
53:16 - #InternetArchive , web.archive.org/
Access to information--and the preservation of it--otherwise difficult to obtain without a congressional staff and the library of congress. #ALibraryNotThefthttps://www.youtube.com/watch?v=HjPdReNmf_g&t=47
#TAILS
6:00 - partition checking (data integrity)
#Onionspray - facilitate making existing websites onion addressed! 15:00 making the addressing human accessible
18:51 - #Vanguards and #Arti
28:00 "conflux" congestion control
[...a whole lot of the internet doesn't work with Vanguards if it even did work with tor in the first place..]
#OnionServices
29:29 - Network Health
#Censorship
45:00 - webtunnel transport -
Today I have been working on traverse a scamming project named invidious.
It turns out that they falsely are luring people to believe they software are protecting people against the #Big5 and helping ensuring users right to privacy.
However it turns out to be yet another online scam.
Where do it becomes a hoax? they do offer a reverse proxy module, to ensure people's privacy.
True, the problem is arising in the [documentation][pubServ], where they are listing a variety of insecure and that do not protect users with the proxy module, which allows #Alphabet to collect the very same amount of userdata, as if you have visited the YT domain it self.
The consequence of this is, normal users are lured into this spyware trap, by unfulfilled promises from:
1. The domain owner
2. The team ofinvidious.io
When I tried to help them solve this contradiction, also according toinvidious.ioown rules, the MR got turned down immediately and locked for comments. See https://github.com/iv-org/documentation/pull/571
This means the people behind invidious is fully aware and deliberately support this scam.
The following domains have been added to our scam list at My Privacy DNS and matrix.rocksinv.in.projectsegfau.lt|scamming inv.nadeko.net|scamming inv.tux.pizza|scamming inv.us.projectsegfau.lt|scamming invidious.drgns.space|scamming invidious.flokinet.to|scamming invidious.materialio.us|scamming invidious.nerdvpn.de|scamming invidious.perennialte.ch|scamming invidious.privacydev.net|scamming invidious.protokolla.fi|scamming invidious.reallyaweso.me|scamming iv.melmac.space|scamming vid.puffyan.us|scamming yt.artemislena.eu|scamming yt.drgnz.club|scamming yewtu.be|scamming grwp24hodrefzvjjuccrkw3mjq4tzhaaq32amf33dzpmuxe7ilepcmad.onion|scamming ng27owmagn5amdm7l5s3rsqxwscl5ynppnis5dqcasogkyxcfqn7psid.onion|scamming invidious.g4c3eya4clenolymqbpgwz3q3tawoxw56yhzk4vugqrl6dtu3ejvhjid.onion|scamming inv.nadekonw7plitnjuawu6ytjsl7jlglk2t6pyq6eftptmiv3dvqndwvyd.onion|scamming nerdvpneaggggfdiurknszkbmhvjndks5z5k3g5yp4nhphflh3n3boad.onion|scamming
#scammers #scams #bigtech #infosec #privacy #mypdns #matrix #blacklist #onionservices #github #invidiousを用いて広告なしにyoutubeをみる方法 #invidious
[pubServ]: https://github.com/foreign-affairs/invidious-documentation/blob/master/docs/instances.md?plain=1#L9-L66 -
Today I have been working on traverse a scamming project named invidious.
It turns out that they falsely are luring people to believe they software are protecting people against the #Big5 and helping ensuring users right to privacy.
However it turns out to be yet another online scam.
Where do it becomes a hoax? they do offer a reverse proxy module, to ensure people's privacy.
True, the problem is arising in the [documentation][pubServ], where they are listing a variety of insecure and that do not protect users with the proxy module, which allows #Alphabet to collect the very same amount of userdata, as if you have visited the YT domain it self.
The consequence of this is, normal users are lured into this spyware trap, by unfulfilled promises from:
1. The domain owner
2. The team ofinvidious.io
When I tried to help them solve this contradiction, also according toinvidious.ioown rules, the MR got turned down immediately and locked for comments. See https://github.com/iv-org/documentation/pull/571
This means the people behind invidious is fully aware and deliberately support this scam.
The following domains have been added to our scam list at My Privacy DNS and matrix.rocksinv.in.projectsegfau.lt|scamming inv.nadeko.net|scamming inv.tux.pizza|scamming inv.us.projectsegfau.lt|scamming invidious.drgns.space|scamming invidious.flokinet.to|scamming invidious.materialio.us|scamming invidious.nerdvpn.de|scamming invidious.perennialte.ch|scamming invidious.privacydev.net|scamming invidious.protokolla.fi|scamming invidious.reallyaweso.me|scamming iv.melmac.space|scamming vid.puffyan.us|scamming yt.artemislena.eu|scamming yt.drgnz.club|scamming yewtu.be|scamming grwp24hodrefzvjjuccrkw3mjq4tzhaaq32amf33dzpmuxe7ilepcmad.onion|scamming ng27owmagn5amdm7l5s3rsqxwscl5ynppnis5dqcasogkyxcfqn7psid.onion|scamming invidious.g4c3eya4clenolymqbpgwz3q3tawoxw56yhzk4vugqrl6dtu3ejvhjid.onion|scamming inv.nadekonw7plitnjuawu6ytjsl7jlglk2t6pyq6eftptmiv3dvqndwvyd.onion|scamming nerdvpneaggggfdiurknszkbmhvjndks5z5k3g5yp4nhphflh3n3boad.onion|scamming
#scammers #scams #bigtech #infosec #privacy #mypdns #matrix #blacklist #onionservices #github #invidiousを用いて広告なしにyoutubeをみる方法 #invidious
[pubServ]: https://github.com/foreign-affairs/invidious-documentation/blob/master/docs/instances.md?plain=1#L9-L66 -
Today I have been working on traverse a scamming project named invidious.
It turns out that they falsely are luring people to believe they software are protecting people against the #Big5 and helping ensuring users right to privacy.
However it turns out to be yet another online scam.
Where do it becomes a hoax? they do offer a reverse proxy module, to ensure people's privacy.
True, the problem is arising in the [documentation][pubServ], where they are listing a variety of insecure and that do not protect users with the proxy module, which allows #Alphabet to collect the very same amount of userdata, as if you have visited the YT domain it self.
The consequence of this is, normal users are lured into this spyware trap, by unfulfilled promises from:
1. The domain owner
2. The team ofinvidious.io
When I tried to help them solve this contradiction, also according toinvidious.ioown rules, the MR got turned down immediately and locked for comments. See https://github.com/iv-org/documentation/pull/571
This means the people behind invidious is fully aware and deliberately support this scam.
The following domains have been added to our scam list at My Privacy DNS and matrix.rocksinv.in.projectsegfau.lt|scamming inv.nadeko.net|scamming inv.tux.pizza|scamming inv.us.projectsegfau.lt|scamming invidious.drgns.space|scamming invidious.flokinet.to|scamming invidious.materialio.us|scamming invidious.nerdvpn.de|scamming invidious.perennialte.ch|scamming invidious.privacydev.net|scamming invidious.protokolla.fi|scamming invidious.reallyaweso.me|scamming iv.melmac.space|scamming vid.puffyan.us|scamming yt.artemislena.eu|scamming yt.drgnz.club|scamming yewtu.be|scamming grwp24hodrefzvjjuccrkw3mjq4tzhaaq32amf33dzpmuxe7ilepcmad.onion|scamming ng27owmagn5amdm7l5s3rsqxwscl5ynppnis5dqcasogkyxcfqn7psid.onion|scamming invidious.g4c3eya4clenolymqbpgwz3q3tawoxw56yhzk4vugqrl6dtu3ejvhjid.onion|scamming inv.nadekonw7plitnjuawu6ytjsl7jlglk2t6pyq6eftptmiv3dvqndwvyd.onion|scamming nerdvpneaggggfdiurknszkbmhvjndks5z5k3g5yp4nhphflh3n3boad.onion|scamming
#scammers #scams #bigtech #infosec #privacy #mypdns #matrix #blacklist #onionservices #github #invidiousを用いて広告なしにyoutubeをみる方法 #invidious
[pubServ]: https://github.com/foreign-affairs/invidious-documentation/blob/master/docs/instances.md?plain=1#L9-L66 -
@briankrebs Interestingly they don't use #IFPS or #BitTorrent because the former's #Gateways - like #Tor2Web for #OnionServices - will literally deny-list known bad actors, and #BitTorrent isn't natively supported in shitty OSes susceptible to this crap due to lack of #PackageManagers - like #Windows and #macOS...
-
@briankrebs Interestingly they don't use #IFPS or #BitTorrent because the former's #Gateways - like #Tor2Web for #OnionServices - will literally deny-list known bad actors, and #BitTorrent isn't natively supported in shitty OSes susceptible to this crap due to lack of #PackageManagers - like #Windows and #macOS...
-
@briankrebs Interestingly they don't use #IFPS or #BitTorrent because the former's #Gateways - like #Tor2Web for #OnionServices - will literally deny-list known bad actors, and #BitTorrent isn't natively supported in shitty OSes susceptible to this crap due to lack of #PackageManagers - like #Windows and #macOS...