Commit 497241f32b2ee4ba45a25ff47d5ded8b4cd13b0c
Merge pull request #60 from ssbc/tor
Add tor instructionsMikey authored on 12/17/2017, 10:16:33 AM
GitHub committed on 12/17/2017, 10:16:33 AM
Parent: 99e35d2f9c3c37a15cce3fb5fbde12ddb103bd1d
Parent: a2291a9cb083184475e2513d6bf7a33c960853db
Files changed
faq/misc/tor.md | added |
faq/misc/tor.md | |||
---|---|---|---|
@@ -1,0 +1,51 @@ | |||
1 … | +# How can I preserve my privacy | ||
2 … | + | ||
3 … | +Scuttlebutt does not require to use your real name. You can use | ||
4 … | +whatever you like. Connecting to other peers to exchange gossip | ||
5 … | +messages will reveal your IP and might be used to de-anonymize | ||
6 … | +you. | ||
7 … | + | ||
8 … | +Luckily scuttlebutt has built in support for | ||
9 … | +[TOR](https://torproject.org/). You need to be running the TOR daemon | ||
10 … | +for scuttlebutt to relay messages through the onion network. If you | ||
11 … | +want secure scuttlebutt to ONLY connect to other TOR nodes, you need | ||
12 … | +to pass a –tor-only flag when running sbot. | ||
13 … | + | ||
14 … | +You can find a list pubs available over TOR at the | ||
15 … | +[wiki](https://github.com/ssbc/scuttlebot/wiki/Pub-Servers). Please | ||
16 … | +note that you might need to contact the person running it for an | ||
17 … | +invite. | ||
18 … | + | ||
19 … | +Please note this is not an easy way to game the system or spam | ||
20 … | +it. Scuttlebutt already has a great system for blocking users. | ||
21 … | + | ||
22 … | +Please note that even when using TOR the (normal | ||
23 … | +rules)[https://www.whonix.org/wiki/DoNot] for staying anonymous still | ||
24 … | +applies though. | ||
25 … | + | ||
26 … | +# What other cool things can I do with TOR? | ||
27 … | + | ||
28 … | +Glad you asked. | ||
29 … | + | ||
30 … | +If you configure TOR as a hidden service and redirect port 8008 to | ||
31 … | +localhost 8008 then your sbot service will be available over TOR. Add | ||
32 … | +the following to /etc/tor/torrc: | ||
33 … | + | ||
34 … | +HiddenServiceDir /var/lib/tor/hidden_service/ | ||
35 … | +HiddenServicePort 8008 127.0.0.1:8008 | ||
36 … | + | ||
37 … | +And reload tor, then your onion address will be available in | ||
38 … | +/var/lib/tor/hidden_service/hostname. | ||
39 … | + | ||
40 … | +Besides hiding your IP and doing end-to-end encryption, TOR also does | ||
41 … | +location transparency. Meaning your hostname will always stay the same | ||
42 … | +no matter where you are connected, and anyone can connect to you | ||
43 … | +directly. No need to open ports in your firewall! | ||
44 … | + | ||
45 … | +This means that its possible to do p2p connections without pubs and | ||
46 … | +talk direcly to your friends. If you create an invite from your | ||
47 … | +machine (you probably need "allowPrivate": true in ~/.ssb/config), | ||
48 … | +replace the ip or hostname with your onion adress and send that to a | ||
49 … | +friend. They will be able to connect directly to you and start | ||
50 … | +receiving messages straight away, assuming your machine is running of | ||
51 … | +course. |
Built with git-ssb-web