Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  nodelist  faq  login

We can embody the truth, but we cannot know it. -- Yates


rocksolid / Tor / Setup guide for hidden services

SubjectAuthor
o Setup guide for hidden servicesGuest

1
Subject: Setup guide for hidden services
From: Guest
Newsgroups: rocksolid.shared.tor
Organization: Dancing elephants
Date: Sat, 5 May 2018 13:27 UTC
Path: rocksolid2!.POSTED.10.128.12.155!not-for-mail
From: gue...@retrobbs.rocksolidbbs.com (Guest)
Newsgroups: rocksolid.shared.tor
Subject: Setup guide for hidden services
Date: Sat, 05 May 2018 09:27:30 -0400
Organization: Dancing elephants
Lines: 1566
Message-ID: <pckbg2$f7g$1@novabbs.com>
Reply-To: Guest <guest@retrobbs.rocksolidbbs.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 5 May 2018 13:27:47 -0000 (UTC)
Injection-Info: novabbs.com; posting-host="10.128.12.155";
logging-data="15600"; mail-complaints-to="usenet@novabbs.com"
User-Agent: FUDforum 3.0.7
X-FUDforum: e2245c1d60cd2fa7de3270a53d877d47 <1344>
View all headers
A little outdated, but still interesting.

https://pastebin.com/Fy6c1wB8

Note some formatting has been messed up. To get the original
pdf and script click the links below:
PDF:
https://docs.google.com/file/d/0Bw8hxGGZbI5dR2xmY1VuZmQ3ZFk/edit?usp=sharing
script:
https://docs.google.com/file/d/0Bw8hxGGZbI5dS3dNdmJrb3BzOEk/edit?usp=sharing

There is also a git repository with a lot of automated
scripts to use, I would suggest reading both, finding the
methods that work for you. https://github.com/whackashoe/tor-hidden-service-setup/

Hidden Service Setup Guide for Newbies
Version .2
So, you've decided to set up a hidden service and join the
information underground? That's fantastic,
but be aware of what you're getting into. If you're setting
up a hidden service, you're probably doing so
because whatever you're publishing could put you at risk.
Maybe it's legal risk, maybe you might lose
your job, maybe your friends might disown you, or maybe you
might end up in prison for the rest of
your life or worse. It could also be that you're a Tor
fanatic and that you're setting up a hidden service
to help those who are taking the risk.
Tor is an amazing technology and there's lots of technology
that when combined with it can make your
hidden service almost bulletproof, but that doesn't mean you
can remove risk from the equation.
Whatever it is you're doing, you need to accept the risk and
the potential consequences. If you aren't
prepared to take the fall, you might want to reconsider what
you're doing or how you're doing it.
Nobody has ever been caught for running a hidden service and
those who will be will most likely do so
through their own stupid mistakes - Tor won't be at fault.
Tor is beautiful and so is the resistance to the
current system that is inherently built into it. If you're
ready to join the revolution and fall in love, be
my guest. All good things in life, all struggles must be
won. There is no easy way, this is a conflict.
Since you've taken it up to learn how to arm yourself, I'll
show you how to use your weapons.
Just as a clarification, I am not a lawyer. I'm not
qualified to give legal advice. You should learn about
what you're doing before you do it. This guide is not the
be-all end-all. You're going to have to use
your brain and some common sense if you're going to survive
out here. This guide is written for
laypersons, but that isn't an excuse for you not to do your
research. I didn't write this myself, it comes
from decades of research and work by individuals too
numerous to name. People have gotten hurt,
people have been thrown in jail, and some people have been
killed simply for taking the red pill.
I didn't write this guide to help people break laws. If you
do something stupid with this, it's your fault.
This, like the Tor software, is a tool and how you use it is
up to you.
There is no warranty of fitness or accuracy on this guide
whatsoever. You are using it at your own risk
and if you mess something up, it's not my fault. By using
this guide, you agree to hold its author(s)
harmless for any damage that may arise as a result.
This guide is anti-copyright. You are free to mercilessly
update it, edit it, share it, etc. If you give me
attribution, that's great but absolutely not required or
expected. If you have any questions/clafifications/
edits to the guide, you can reach me at
ringo{at}hackbloc.org. My PGP key is below:
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.9 (GNU/Linux)
 mQGiBEniUKIRBADfn8kULsRd3si+zPnVbeVp4C/cjxfOxvPURPjRMDPRZPuD
uEI5
 QIiMP+lZs0Y1BS/zubrwJ/R+knZW0dfkCbd0IBqhtcci4ZiDXRCNxxYow0My
sweG
 sbZE0QY4T2u40ffOLs9m/ENiDebUxknTyAg8/Jim9aBdEDgurCc7HCX+iwCg
hfLh
 1POMWQRkXB4zUmXQfp+u+0MD/j5SUN6ct6fH4ex3L/WeIHRA+PZXBEpQv5HC
wcYO
 9VAtS0KYTtrBePXuhabjmiyhWIVsPHa8A+5RW3ONkK4gQ71E7sh2nu44p0rO
SVkz
 9/ZQiHVCjxZJNhvCsabIFT2/G8OFo2XPnJ0+8Gfluueb5a/HKArUWHIvkws8
2kQ5
 75RJBACJp436/Bvk/CpKDkIG8v/4dQkyNKhv5AEAbx3jNjdOAxNSK0tBaQAu
lgCk
 GFNkk+wpv6OWaawgQzFh71KvmEswSLObXk+S6WZgC+Epy4XmfzzDG/gIHD0V
uBQ+
 2D8JzFT/TiDMu6wdYu4kgDg5sO4a5Yzn7xoYMF5YWzXnPKhXi7QacmluZ28g
PHJp
 bmdvQGhhY2tibG9jLm9yZz6IZgQTEQIAJgUCSeJQogIbIwUJAeEzgAYLCQgH
AwIE
 FQIIAwQWAgMBAh4BAheAAAoJEFUc7QiIWsvrdtkAn3KtPdxxC/qWmmIFZ4Nc
4cFE
 as42AJoDwdk/N9I3sPvc91wTTlbsKhoHLrkEDQRJ4lCiEBAAs2JYGr1k1Dgi
3DMyh0ziX+22tIWWyIJoGKWKFspA7nGeniOBodLBvR+POtqqGCh+bkm9I0X/
YMF9oVcP
 xXBql7H6E4JSgtCk7xtohDpLlfcCpsddVxcJdXYLynTUMcmJtCER0bCNIkTm
YoV7
 uNXAqmUNAp4zaI70yWsidpAVHme0+sBUYNinfBdlcaMddzslbDtRV7yGKgvW
3E5e
 hPNTJ0pWF6WJg4VsEOFoP7pldtQ4YWScskvuCk957K4t4Of3QZs13Nn9sQZl
eFJU
 E2L1bxEHuSqY/f1F/pbKmc7in8qkoBBAyhUbzCNxxELdof3uJpBy0pw0468G
vSyb
 Z4jyh2XFvxFFAcelzc453y9GOylIC0OQczkrzOa6QrIWQSmeCzn/byjLoi+T
RFve
 usRmJn5H9MJg+k+mG5LJM2mcyQJU2UOPDvSurKmk50vByBED6Qn5CvhXJp18
H6Uk
 2r+PICG4h8aN9KZpSrMAqYggyKgAxHTlCaQzGCwvJGiX6lx6iIm2GLoqeHdR
HZZX
 9XognVcbTwUWJkL0LR9nhm5U0GhFGM9eRdLw89C/Z/s1/Q/QLjoDh60qXcYo
+vFS
 5bJtiT52HnlA002opyi+Zn5mk9aXQiksOJruIdNw1rvJSe+uAIYQeBv+rinx
zAyL
 4f/p/+vvgnfgkEc2G1hLuGTvWMsAAwYP+gIhIgQ6UwQ0Bu1gyRN88Gs9H0fn
Q74Z
 RmFXDgUtpn1YrFzFfTNegQh8vvgo1pXV4ZDPc0w9Cs8QHrspnkYrvSymAEmw
YtGd
 nvnAVVROIJfN5d140Z1FJXCgFp/3m2SAX1omYyN3/5WX9ef1uaYWub48kSdq
fHlr
 xe8Z15nXQ9E6WMgDtP5jXpfCkAnweW6/WSGRrHlRyBUevCTyRSZ4dwtim0GH
sls9
 VbfDYWJVxiKWdgjtjg+PfsXrdQG2KICEHXprS9/tYCheWaHP4couXVHDPUNM
GK/w
 HSYXbr0/xA0i0JHpRzVCDweKZ32hgbYkTXp0U7ArBYLtbfpWlB8uWHFFAIS5
yJQL
 YMwc8/qFCgl5fUGMk4ZLTgbftQo/sfcOAIPQl2nVjhnvzucj8PgBBaJgH9OR
TpW6
 89zIzOtfXfju0dq4LC6Xj4h6SA/duh8dEiBzewNJ1FwnlrywvaQjsVdx5+5R
olAk
 gZKcT4hHCj+s2vCAyF5R70rfKkZkKhMuUzEWc4R4AzbkmI1eTtEl/FJVCzBs
JRan
 HC+YMgCdf2ujTxvBltytpWrs0nvzFVY6+RyihQsqlV6KeOtDBTv38a8Q5gdA
RK0j
 5og+X3SWHW0p29PSKk6a3NeSB08J0wlXsrNOJ/JXlYw/yIifZdgl6fO8V7rP
BoQt
 xIQB5UKSXj8YiE8EGBECAA8FAkniUKICGwwFCQHhM4AACgkQVRztCIhay+vX
kQCf
beWbtPmJOWbXn+9LEaJTqcN73REAn2MmtesdDs24QjWfZeTfc8dyEZ2n
=O0oE
-----END PGP PUBLIC KEY BLOCK-----
Because this guide is written for newbies, it's not the best
way to do it. It's meant to be as easy and
secure as possible. If you learn more and work on this
knowledge-base for a few years, you'll look back
on this guide as ridiculous. You'll realize that it could
have been done easier, better, faster, and without
such a nice computer. Since you are probably a newbie, let's
define some important terms we'll be
using.
Administrator - An administrator controls the computer. They
can do system updates, install software,
and mess with all kinds of internal system things. In the
wrong hands (or in the case of a mis-typed
command), the administrator account can wreak all sorts of
havoc.
Anonymity - Anonymity is the ability to operate without
anybody knowing who you are. It is not an
absolute, you are simply more anonymous than the average
person. Any adversary, given sufficient
resources and time, can break your anonymity. If somebody
can buy and control every internet router
in the world (or even a fair portion of them), tracking
somebody through Tor would be fairly easy.
Fortunately, few people/organizations have this power and
even fewer use it for this purpose. In terms
of using Tor or running a hidden service, the goal is to
obscure your browsing profile which includes
things like your browser configuration and your IP address.
Adversary - The adversary is the enemy, the person or entity
you use Tor to defend against. Maybe it
is your government, the police, your boss, or your
significant other.
Algorithm - A method for encrypting data. It describes how
data should be encrypted and decrypted,
kind of like a recipe.
Boot - To turn on a computer or operating system
Command - A command is something you tell a computer to do.
We'll be issuing them through the
terminal aka the shell or command line. After you type
enter, the command is executed. For instance,
typing "ls" and then the enter key causes the computer to
list all the files/folder in the current directory.
Encryption - Encryption takes regular data (emails, files,
etc.) and turns it into unreadable data. Onlythose who know
the secret (a password, private key, etc.) can theoretically
access that data in a format
that is readable. Encryption is strong these days.
Flag - A flag (also called an option) is something that's
added onto a command to change the way it
operates. For instance, the cp command (copy) when invoked
(used) by typing 'cp oldfilelocation
newfilelocation' will copy a file from one location to
another. If you want to copy an entire folder, you
would type 'cp -r oldfolder newfolder'. The -r is the
recursive flag and it tells the copy command to go
inside directories. Flags can also have values in this
format (usually, but there are a few exceptions)
'command -flag anumberorsometext'
Identity  Somebody or something that an entity claims to be.
This could be your name, a pseudonym
you use, or the name of a corporation. Identity is important
and when you're hosting a hidden service,

Click here to read the complete article
1
rocksolid light 0.7.2
clearneti2ptor