What am I doing?
There are 4 sections to this workshop. You can either work through them in order, or choose whatever looks fun. This will work better if you form a group and discuss. If you need any help, or have questions, get the attention of one of the friendly workshop assistants -- Rob, Eru, or Robin.
- "Set up a hidden service" gets a Tor hidden service up and running on your laptop
- "Get a fancy .onion name" shows how to get a nice-looking .onion name by brute force. You need to complete section 1 or 3 first.
- "Manage a server anonymously" shows how to get a virtual private server up and running your hidden service without revealing your identity
- "Scan for leaks" invites you to play with OnionScan, a leak detector for hidden services
Why would I do that?
Remember the internet of the 90's and early 2000's, when you could type whatever you wanted into Altavista without fear of ending up "on a list"?
Well those days are gone. We can safely assume we're being watched. How can we speak our minds, explore ideas, or follow our true interests with Big Brother looking over our shoulders?
The anonymous internet that we remember is still all around us; it's just not as visible as it used to be. It's our job to bring that internet back and make it mainstream again.
To make this happen, we need to build stuff -- awesome sites and services that are available anonymously.
What do I need?
- A computer with an internet connection (wi-fi, or preferably your own mobile internet)
- if downloading is too slow or expensive, and you are happy to plug in a USB drive containing Tor and Tor Browser instead, please ask for one.
- Preferably a computer running Linux or Mac OS X. You can probably get things working in Windows but the instructions won't help much.
- A little bit of background knowledge
- What Tor is (this covers it)
- Basic *nix command line
This is a learning exercise, designed to demystify Tor hidden services, and should be taken with a grain of salt. Don't expect to be untraceable at the end of this hour. For in-depth configuration suggestions see this 3-part tutorial.