Commit 497241f32b2ee4ba45a25ff47d5ded8b4cd13b0c
Merge pull request #60 from ssbc/tor
Add tor instructionsMikey authored on 12/17/2017, 10:16:33 AM
GitHub committed on 12/17/2017, 10:16:33 AM
Parent: 99e35d2f9c3c37a15cce3fb5fbde12ddb103bd1d
Parent: a2291a9cb083184475e2513d6bf7a33c960853db
Files changed
faq/misc/tor.md | added |
faq/misc/tor.md | ||
---|---|---|
@@ -1,0 +1,51 @@ | ||
1 … | +# How can I preserve my privacy | |
2 … | + | |
3 … | +Scuttlebutt does not require to use your real name. You can use | |
4 … | +whatever you like. Connecting to other peers to exchange gossip | |
5 … | +messages will reveal your IP and might be used to de-anonymize | |
6 … | +you. | |
7 … | + | |
8 … | +Luckily scuttlebutt has built in support for | |
9 … | +[TOR](https://torproject.org/). You need to be running the TOR daemon | |
10 … | +for scuttlebutt to relay messages through the onion network. If you | |
11 … | +want secure scuttlebutt to ONLY connect to other TOR nodes, you need | |
12 … | +to pass a –tor-only flag when running sbot. | |
13 … | + | |
14 … | +You can find a list pubs available over TOR at the | |
15 … | +[wiki](https://github.com/ssbc/scuttlebot/wiki/Pub-Servers). Please | |
16 … | +note that you might need to contact the person running it for an | |
17 … | +invite. | |
18 … | + | |
19 … | +Please note this is not an easy way to game the system or spam | |
20 … | +it. Scuttlebutt already has a great system for blocking users. | |
21 … | + | |
22 … | +Please note that even when using TOR the (normal | |
23 … | +rules)[https://www.whonix.org/wiki/DoNot] for staying anonymous still | |
24 … | +applies though. | |
25 … | + | |
26 … | +# What other cool things can I do with TOR? | |
27 … | + | |
28 … | +Glad you asked. | |
29 … | + | |
30 … | +If you configure TOR as a hidden service and redirect port 8008 to | |
31 … | +localhost 8008 then your sbot service will be available over TOR. Add | |
32 … | +the following to /etc/tor/torrc: | |
33 … | + | |
34 … | +HiddenServiceDir /var/lib/tor/hidden_service/ | |
35 … | +HiddenServicePort 8008 127.0.0.1:8008 | |
36 … | + | |
37 … | +And reload tor, then your onion address will be available in | |
38 … | +/var/lib/tor/hidden_service/hostname. | |
39 … | + | |
40 … | +Besides hiding your IP and doing end-to-end encryption, TOR also does | |
41 … | +location transparency. Meaning your hostname will always stay the same | |
42 … | +no matter where you are connected, and anyone can connect to you | |
43 … | +directly. No need to open ports in your firewall! | |
44 … | + | |
45 … | +This means that its possible to do p2p connections without pubs and | |
46 … | +talk direcly to your friends. If you create an invite from your | |
47 … | +machine (you probably need "allowPrivate": true in ~/.ssb/config), | |
48 … | +replace the ip or hostname with your onion adress and send that to a | |
49 … | +friend. They will be able to connect directly to you and start | |
50 … | +receiving messages straight away, assuming your machine is running of | |
51 … | +course. |
Built with git-ssb-web