home.social

#onionservices — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #onionservices, aggregated by home.social.

  1. Updated my onionscout repo.

    onionscout is a lightweight CLI tool for first-pass auditing of Tor hidden services (.onion): clearnet dependency checks, metadata leaks, fingerprinting indicators, basic de-anonymization risks, cookie support for authenticated scans, JSON/TXT output, and a cleaner Rich-based result table.

    Repo:
    github.com/h0ek/onionscout

    #Tor #OnionServices #OSINT #InfoSec #Pentest #Python

  2. 【为什么 Hetzner 不适合Tor🧅出口节点】
    reddit.com/r/TOR/comments/1m9y

    Hetzner禁止扫描外网——Tor 出口流量来自运行出口节点的服务器——用户活动包括端口扫描和探测——违反条款——收到滥用报告

    所以办法是只运行中继和网桥,而不运行出口节点:
    ✅ Middle Relay ✅ obfs4 Bridge ✅ Snowflake ✅ WebTunnel
    ❌ Exit Node

    #tor #hetzner #exitnode #OnionServices #onionnetwork #洋葱网络

  3. Discover how to use Monero GUI with Onion remote nodes to keep your XMR transactions private and anonymous. Step-by-step setup, Tor tips, and practical advice for privacy-first crypto users. Dive in and lock down your wallet! #Monero #MoneroGUI #Onion #Tor #Privacy #CryptoPrivacy #Cryptocurrency #Security #OnionServices #English
    johnydeep.net/videos/watch/ce5

  4. 🚀 New Beta Launch!
    We're excited to introduce Tor2Web, now available at https://tor2web.privacytools.click!

    Tor2Web is a gateway to the Tor network, allowing you to access .onion (hidden) services directly from a regular browser — no Tor client needed.

    🔒 Browse anonymously, stay informed, and explore securely.
    🧪 Currently in beta – feedback is welcome!

    Try it now → https://tor2web.privacytools.click
    More info at https://privacytools.click

    #Tor2Web #PrivacyTools #Tor #OnionServices #CyberPrivacy #BetaLaunch

  5. 🚀 New Beta Launch!
    We're excited to introduce Tor2Web, now available at https://tor2web.privacytools.click!

    Tor2Web is a gateway to the Tor network, allowing you to access .onion (hidden) services directly from a regular browser — no Tor client needed.

    🔒 Browse anonymously, stay informed, and explore securely.
    🧪 Currently in beta – feedback is welcome!

    Try it now → https://tor2web.privacytools.click
    More info at https://privacytools.click

    #Tor2Web #PrivacyTools #Tor #OnionServices #CyberPrivacy #BetaLaunch

  6. 🚀 New Beta Launch!
    We're excited to introduce Tor2Web, now available at https://tor2web.privacytools.click!

    Tor2Web is a gateway to the Tor network, allowing you to access .onion (hidden) services directly from a regular browser — no Tor client needed.

    🔒 Browse anonymously, stay informed, and explore securely.
    🧪 Currently in beta – feedback is welcome!

    Try it now → https://tor2web.privacytools.click
    More info at https://privacytools.click

    #Tor2Web #PrivacyTools #Tor #OnionServices #CyberPrivacy #BetaLaunch

  7. 🚀 New Beta Launch!
    We're excited to introduce Tor2Web, now available at https://tor2web.privacytools.click!

    Tor2Web is a gateway to the Tor network, allowing you to access .onion (hidden) services directly from a regular browser — no Tor client needed.

    🔒 Browse anonymously, stay informed, and explore securely.
    🧪 Currently in beta – feedback is welcome!

    Try it now → https://tor2web.privacytools.click
    More info at https://privacytools.click

    #Tor2Web #PrivacyTools #Tor #OnionServices #CyberPrivacy #BetaLaunch

  8. 🚀 New Beta Launch!
    We're excited to introduce Tor2Web, now available at https://tor2web.privacytools.click!

    Tor2Web is a gateway to the Tor network, allowing you to access .onion (hidden) services directly from a regular browser — no Tor client needed.

    🔒 Browse anonymously, stay informed, and explore securely.
    🧪 Currently in beta – feedback is welcome!

    Try it now → https://tor2web.privacytools.click
    More info at https://privacytools.click

    #Tor2Web #PrivacyTools #Tor #OnionServices #CyberPrivacy #BetaLaunch

  9. Martedì 22 aprile 2025 alle 21:30, Leandro Noferini presenterà gli #OnionServices di #Tor, all'Officina Informatica del #GOLEM.
    community.torproject.org/onion

    Gli Onion Services risolvono in parte la difficoltà di gestire i nodi di uscita della rete Tor, soprattutto dal punto di vista legale, garantendo l'anonimato da ambo le parti, sia per chi naviga, che per chi ospita siti e servizi.

    L'officina si trova in via Magolo 32 a #Empoli.
    wiki.golem.linux.it/Officina_I

    #sapereLibero #GNU #Linux

  10. #TorProject State of the Onion

    inv.nadeko.net/watch?v=EODNtLq [perfect example, G de-onions]

    onionmobile.dev #GuardianProject

    hushline.app

    github.com/blueprint-freespeec

    53:16 - #InternetArchive , web.archive.org/
    Access to information--and the preservation of it--otherwise difficult to obtain without a congressional staff and the library of congress. #ALibraryNotTheft

    youtube.com/watch?v=HjPdReNmf_
    #TAILS
    6:00 - partition checking (data integrity)
    #Onionspray - facilitate making existing websites onion addressed! 15:00 making the addressing human accessible
    18:51 - #Vanguards and #Arti
    28:00 "conflux" congestion control
    [...a whole lot of the internet doesn't work with Vanguards if it even did work with tor in the first place..]
    #OnionServices
    29:29 - Network Health
    #Censorship
    45:00 - webtunnel transport

  11. #TorProject State of the Onion

    inv.nadeko.net/watch?v=EODNtLq [perfect example, G de-onions]

    onionmobile.dev #GuardianProject

    hushline.app

    github.com/blueprint-freespeec

    53:16 - #InternetArchive , web.archive.org/
    Access to information--and the preservation of it--otherwise difficult to obtain without a congressional staff and the library of congress. #ALibraryNotTheft

    youtube.com/watch?v=HjPdReNmf_
    #TAILS
    6:00 - partition checking (data integrity)
    #Onionspray - facilitate making existing websites onion addressed! 15:00 making the addressing human accessible
    18:51 - #Vanguards and #Arti
    28:00 "conflux" congestion control
    [...a whole lot of the internet doesn't work with Vanguards if it even did work with tor in the first place..]
    #OnionServices
    29:29 - Network Health
    #Censorship
    45:00 - webtunnel transport

  12. #TorProject State of the Onion

    inv.nadeko.net/watch?v=EODNtLq [perfect example, G de-onions]

    onionmobile.dev #GuardianProject

    hushline.app

    github.com/blueprint-freespeec

    53:16 - #InternetArchive , web.archive.org/
    Access to information--and the preservation of it--otherwise difficult to obtain without a congressional staff and the library of congress. #ALibraryNotTheft

    youtube.com/watch?v=HjPdReNmf_
    #TAILS
    6:00 - partition checking (data integrity)
    #Onionspray - facilitate making existing websites onion addressed! 15:00 making the addressing human accessible
    18:51 - #Vanguards and #Arti
    28:00 "conflux" congestion control
    [...a whole lot of the internet doesn't work with Vanguards if it even did work with tor in the first place..]
    #OnionServices
    29:29 - Network Health
    #Censorship
    45:00 - webtunnel transport

  13. #TorProject State of the Onion

    inv.nadeko.net/watch?v=EODNtLq [perfect example, G de-onions]

    onionmobile.dev #GuardianProject

    hushline.app

    github.com/blueprint-freespeec

    53:16 - #InternetArchive , web.archive.org/
    Access to information--and the preservation of it--otherwise difficult to obtain without a congressional staff and the library of congress. #ALibraryNotTheft

    youtube.com/watch?v=HjPdReNmf_
    #TAILS
    6:00 - partition checking (data integrity)
    #Onionspray - facilitate making existing websites onion addressed! 15:00 making the addressing human accessible
    18:51 - #Vanguards and #Arti
    28:00 "conflux" congestion control
    [...a whole lot of the internet doesn't work with Vanguards if it even did work with tor in the first place..]
    #OnionServices
    29:29 - Network Health
    #Censorship
    45:00 - webtunnel transport

  14. #TorProject State of the Onion

    inv.nadeko.net/watch?v=EODNtLq [perfect example, G de-onions]

    onionmobile.dev #GuardianProject

    hushline.app

    github.com/blueprint-freespeec

    53:16 - #InternetArchive , web.archive.org/
    Access to information--and the preservation of it--otherwise difficult to obtain without a congressional staff and the library of congress. #ALibraryNotTheft

    youtube.com/watch?v=HjPdReNmf_
    #TAILS
    6:00 - partition checking (data integrity)
    #Onionspray - facilitate making existing websites onion addressed! 15:00 making the addressing human accessible
    18:51 - #Vanguards and #Arti
    28:00 "conflux" congestion control
    [...a whole lot of the internet doesn't work with Vanguards if it even did work with tor in the first place..]
    #OnionServices
    29:29 - Network Health
    #Censorship
    45:00 - webtunnel transport

  15. Today I have been working on traverse a scamming project named invidious.

    It turns out that they falsely are luring people to believe they software are protecting people against the
    #Big5 and helping ensuring users right to privacy.
    However it turns out to be yet another online scam.

    Where do it becomes a hoax? they do offer a reverse proxy module, to ensure people's privacy.
    True, the problem is arising in the [documentation][pubServ], where they are listing a variety of insecure and that do not protect users with the proxy module, which allows
    #Alphabet to collect the very same amount of userdata, as if you have visited the YT domain it self.

    The consequence of this is, normal users are lured into this spyware trap, by unfulfilled promises from:

    1. The domain owner
    2. The team of
    invidious.io

    When I tried to help them solve this contradiction, also according to
    invidious.io own rules, the MR got turned down immediately and locked for comments. See https://github.com/iv-org/documentation/pull/571

    This means the people behind invidious is fully aware and deliberately support this scam.

    The following domains have been added to our scam list at My Privacy DNS and matrix.rocks

    inv.in.projectsegfau.lt|scamming
    inv.nadeko.net|scamming
    inv.tux.pizza|scamming
    inv.us.projectsegfau.lt|scamming
    invidious.drgns.space|scamming
    invidious.flokinet.to|scamming
    invidious.materialio.us|scamming
    invidious.nerdvpn.de|scamming
    invidious.perennialte.ch|scamming
    invidious.privacydev.net|scamming
    invidious.protokolla.fi|scamming
    invidious.reallyaweso.me|scamming
    iv.melmac.space|scamming
    vid.puffyan.us|scamming
    yt.artemislena.eu|scamming
    yt.drgnz.club|scamming
    yewtu.be|scamming
    
    grwp24hodrefzvjjuccrkw3mjq4tzhaaq32amf33dzpmuxe7ilepcmad.onion|scamming
    ng27owmagn5amdm7l5s3rsqxwscl5ynppnis5dqcasogkyxcfqn7psid.onion|scamming
    invidious.g4c3eya4clenolymqbpgwz3q3tawoxw56yhzk4vugqrl6dtu3ejvhjid.onion|scamming
    inv.nadekonw7plitnjuawu6ytjsl7jlglk2t6pyq6eftptmiv3dvqndwvyd.onion|scamming
    nerdvpneaggggfdiurknszkbmhvjndks5z5k3g5yp4nhphflh3n3boad.onion|scamming

    #scammers #scams #bigtech #infosec #privacy #mypdns #matrix #blacklist #onionservices #github #invidiousを用いて広告なしにyoutubeをみる方法 #invidious

    [pubServ]:
    https://github.com/foreign-affairs/invidious-documentation/blob/master/docs/instances.md?plain=1#L9-L66

  16. Today I have been working on traverse a scamming project named invidious.

    It turns out that they falsely are luring people to believe they software are protecting people against the
    #Big5 and helping ensuring users right to privacy.
    However it turns out to be yet another online scam.

    Where do it becomes a hoax? they do offer a reverse proxy module, to ensure people's privacy.
    True, the problem is arising in the [documentation][pubServ], where they are listing a variety of insecure and that do not protect users with the proxy module, which allows
    #Alphabet to collect the very same amount of userdata, as if you have visited the YT domain it self.

    The consequence of this is, normal users are lured into this spyware trap, by unfulfilled promises from:

    1. The domain owner
    2. The team of
    invidious.io

    When I tried to help them solve this contradiction, also according to
    invidious.io own rules, the MR got turned down immediately and locked for comments. See https://github.com/iv-org/documentation/pull/571

    This means the people behind invidious is fully aware and deliberately support this scam.

    The following domains have been added to our scam list at My Privacy DNS and matrix.rocks

    inv.in.projectsegfau.lt|scamming
    inv.nadeko.net|scamming
    inv.tux.pizza|scamming
    inv.us.projectsegfau.lt|scamming
    invidious.drgns.space|scamming
    invidious.flokinet.to|scamming
    invidious.materialio.us|scamming
    invidious.nerdvpn.de|scamming
    invidious.perennialte.ch|scamming
    invidious.privacydev.net|scamming
    invidious.protokolla.fi|scamming
    invidious.reallyaweso.me|scamming
    iv.melmac.space|scamming
    vid.puffyan.us|scamming
    yt.artemislena.eu|scamming
    yt.drgnz.club|scamming
    yewtu.be|scamming
    
    grwp24hodrefzvjjuccrkw3mjq4tzhaaq32amf33dzpmuxe7ilepcmad.onion|scamming
    ng27owmagn5amdm7l5s3rsqxwscl5ynppnis5dqcasogkyxcfqn7psid.onion|scamming
    invidious.g4c3eya4clenolymqbpgwz3q3tawoxw56yhzk4vugqrl6dtu3ejvhjid.onion|scamming
    inv.nadekonw7plitnjuawu6ytjsl7jlglk2t6pyq6eftptmiv3dvqndwvyd.onion|scamming
    nerdvpneaggggfdiurknszkbmhvjndks5z5k3g5yp4nhphflh3n3boad.onion|scamming

    #scammers #scams #bigtech #infosec #privacy #mypdns #matrix #blacklist #onionservices #github #invidiousを用いて広告なしにyoutubeをみる方法 #invidious

    [pubServ]:
    https://github.com/foreign-affairs/invidious-documentation/blob/master/docs/instances.md?plain=1#L9-L66

  17. Today I have been working on traverse a scamming project named invidious.

    It turns out that they falsely are luring people to believe they software are protecting people against the
    #Big5 and helping ensuring users right to privacy.
    However it turns out to be yet another online scam.

    Where do it becomes a hoax? they do offer a reverse proxy module, to ensure people's privacy.
    True, the problem is arising in the [documentation][pubServ], where they are listing a variety of insecure and that do not protect users with the proxy module, which allows
    #Alphabet to collect the very same amount of userdata, as if you have visited the YT domain it self.

    The consequence of this is, normal users are lured into this spyware trap, by unfulfilled promises from:

    1. The domain owner
    2. The team of
    invidious.io

    When I tried to help them solve this contradiction, also according to
    invidious.io own rules, the MR got turned down immediately and locked for comments. See https://github.com/iv-org/documentation/pull/571

    This means the people behind invidious is fully aware and deliberately support this scam.

    The following domains have been added to our scam list at My Privacy DNS and matrix.rocks

    inv.in.projectsegfau.lt|scamming
    inv.nadeko.net|scamming
    inv.tux.pizza|scamming
    inv.us.projectsegfau.lt|scamming
    invidious.drgns.space|scamming
    invidious.flokinet.to|scamming
    invidious.materialio.us|scamming
    invidious.nerdvpn.de|scamming
    invidious.perennialte.ch|scamming
    invidious.privacydev.net|scamming
    invidious.protokolla.fi|scamming
    invidious.reallyaweso.me|scamming
    iv.melmac.space|scamming
    vid.puffyan.us|scamming
    yt.artemislena.eu|scamming
    yt.drgnz.club|scamming
    yewtu.be|scamming
    
    grwp24hodrefzvjjuccrkw3mjq4tzhaaq32amf33dzpmuxe7ilepcmad.onion|scamming
    ng27owmagn5amdm7l5s3rsqxwscl5ynppnis5dqcasogkyxcfqn7psid.onion|scamming
    invidious.g4c3eya4clenolymqbpgwz3q3tawoxw56yhzk4vugqrl6dtu3ejvhjid.onion|scamming
    inv.nadekonw7plitnjuawu6ytjsl7jlglk2t6pyq6eftptmiv3dvqndwvyd.onion|scamming
    nerdvpneaggggfdiurknszkbmhvjndks5z5k3g5yp4nhphflh3n3boad.onion|scamming

    #scammers #scams #bigtech #infosec #privacy #mypdns #matrix #blacklist #onionservices #github #invidiousを用いて広告なしにyoutubeをみる方法 #invidious

    [pubServ]:
    https://github.com/foreign-affairs/invidious-documentation/blob/master/docs/instances.md?plain=1#L9-L66

  18. @briankrebs Interestingly they don't use or because the former's - like for - will literally deny-list known bad actors, and isn't natively supported in shitty OSes susceptible to this crap due to lack of - like and ...

  19. @briankrebs Interestingly they don't use #IFPS or #BitTorrent because the former's #Gateways - like #Tor2Web for #OnionServices - will literally deny-list known bad actors, and #BitTorrent isn't natively supported in shitty OSes susceptible to this crap due to lack of #PackageManagers - like #Windows and #macOS...

  20. @briankrebs Interestingly they don't use #IFPS or #BitTorrent because the former's #Gateways - like #Tor2Web for #OnionServices - will literally deny-list known bad actors, and #BitTorrent isn't natively supported in shitty OSes susceptible to this crap due to lack of #PackageManagers - like #Windows and #macOS...