Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  nodelist  faq  login

We can embody the truth, but we cannot know it. -- Yates

rocksolid / Tor / Setup guide for hidden services

o Setup guide for hidden servicesGuest

Subject: Setup guide for hidden services
From: Guest
Newsgroups: rocksolid.shared.tor
Organization: Dancing elephants
Date: Sat, 5 May 2018 13:27 UTC
Path: rocksolid2!.POSTED.!not-for-mail
From: (Guest)
Newsgroups: rocksolid.shared.tor
Subject: Setup guide for hidden services
Date: Sat, 05 May 2018 09:27:30 -0400
Organization: Dancing elephants
Lines: 1566
Message-ID: <pckbg2$f7g$>
Reply-To: Guest <>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 5 May 2018 13:27:47 -0000 (UTC)
Injection-Info:; posting-host="";
logging-data="15600"; mail-complaints-to=""
User-Agent: FUDforum 3.0.7
X-FUDforum: e2245c1d60cd2fa7de3270a53d877d47 <1344>
View all headers
A little outdated, but still interesting.

Note some formatting has been messed up. To get the original
pdf and script click the links below:

There is also a git repository with a lot of automated
scripts to use, I would suggest reading both, finding the
methods that work for you.

Hidden Service Setup Guide for Newbies
Version .2
So, you've decided to set up a hidden service and join the
information underground? That's fantastic,
but be aware of what you're getting into. If you're setting
up a hidden service, you're probably doing so
because whatever you're publishing could put you at risk.
Maybe it's legal risk, maybe you might lose
your job, maybe your friends might disown you, or maybe you
might end up in prison for the rest of
your life or worse. It could also be that you're a Tor
fanatic and that you're setting up a hidden service
to help those who are taking the risk.
Tor is an amazing technology and there's lots of technology
that when combined with it can make your
hidden service almost bulletproof, but that doesn't mean you
can remove risk from the equation.
Whatever it is you're doing, you need to accept the risk and
the potential consequences. If you aren't
prepared to take the fall, you might want to reconsider what
you're doing or how you're doing it.
Nobody has ever been caught for running a hidden service and
those who will be will most likely do so
through their own stupid mistakes - Tor won't be at fault.
Tor is beautiful and so is the resistance to the
current system that is inherently built into it. If you're
ready to join the revolution and fall in love, be
my guest. All good things in life, all struggles must be
won. There is no easy way, this is a conflict.
Since you've taken it up to learn how to arm yourself, I'll
show you how to use your weapons.
Just as a clarification, I am not a lawyer. I'm not
qualified to give legal advice. You should learn about
what you're doing before you do it. This guide is not the
be-all end-all. You're going to have to use
your brain and some common sense if you're going to survive
out here. This guide is written for
laypersons, but that isn't an excuse for you not to do your
research. I didn't write this myself, it comes
from decades of research and work by individuals too
numerous to name. People have gotten hurt,
people have been thrown in jail, and some people have been
killed simply for taking the red pill.
I didn't write this guide to help people break laws. If you
do something stupid with this, it's your fault.
This, like the Tor software, is a tool and how you use it is
up to you.
There is no warranty of fitness or accuracy on this guide
whatsoever. You are using it at your own risk
and if you mess something up, it's not my fault. By using
this guide, you agree to hold its author(s)
harmless for any damage that may arise as a result.
This guide is anti-copyright. You are free to mercilessly
update it, edit it, share it, etc. If you give me
attribution, that's great but absolutely not required or
expected. If you have any questions/clafifications/
edits to the guide, you can reach me at
ringo{at} My PGP key is below:
Version: GnuPG v1.4.9 (GNU/Linux)
Because this guide is written for newbies, it's not the best
way to do it. It's meant to be as easy and
secure as possible. If you learn more and work on this
knowledge-base for a few years, you'll look back
on this guide as ridiculous. You'll realize that it could
have been done easier, better, faster, and without
such a nice computer. Since you are probably a newbie, let's
define some important terms we'll be
Administrator - An administrator controls the computer. They
can do system updates, install software,
and mess with all kinds of internal system things. In the
wrong hands (or in the case of a mis-typed
command), the administrator account can wreak all sorts of
Anonymity - Anonymity is the ability to operate without
anybody knowing who you are. It is not an
absolute, you are simply more anonymous than the average
person. Any adversary, given sufficient
resources and time, can break your anonymity. If somebody
can buy and control every internet router
in the world (or even a fair portion of them), tracking
somebody through Tor would be fairly easy.
Fortunately, few people/organizations have this power and
even fewer use it for this purpose. In terms
of using Tor or running a hidden service, the goal is to
obscure your browsing profile which includes
things like your browser configuration and your IP address.
Adversary - The adversary is the enemy, the person or entity
you use Tor to defend against. Maybe it
is your government, the police, your boss, or your
significant other.
Algorithm - A method for encrypting data. It describes how
data should be encrypted and decrypted,
kind of like a recipe.
Boot - To turn on a computer or operating system
Command - A command is something you tell a computer to do.
We'll be issuing them through the
terminal aka the shell or command line. After you type
enter, the command is executed. For instance,
typing "ls" and then the enter key causes the computer to
list all the files/folder in the current directory.
Encryption - Encryption takes regular data (emails, files,
etc.) and turns it into unreadable data. Onlythose who know
the secret (a password, private key, etc.) can theoretically
access that data in a format
that is readable. Encryption is strong these days.
Flag - A flag (also called an option) is something that's
added onto a command to change the way it
operates. For instance, the cp command (copy) when invoked
(used) by typing 'cp oldfilelocation
newfilelocation' will copy a file from one location to
another. If you want to copy an entire folder, you
would type 'cp -r oldfolder newfolder'. The -r is the
recursive flag and it tells the copy command to go
inside directories. Flags can also have values in this
format (usually, but there are a few exceptions)
'command -flag anumberorsometext'
Identity  Somebody or something that an entity claims to be.
This could be your name, a pseudonym
you use, or the name of a corporation. Identity is important
and when you're hosting a hidden service,

Click here to read the complete article
rocksolid light 0.7.2