diff options
Diffstat (limited to '-torsite.html')
-rw-r--r-- | -torsite.html | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/-torsite.html b/-torsite.html index aafa479..9652911 100644 --- a/-torsite.html +++ b/-torsite.html @@ -7,4 +7,4 @@ Nov 13 17:18:37.000 [notice] Tor has successfully opened a circuit. Looks like c Nov 13 17:18:37.000 [notice] Bootstrapped 100%: Done</p><p>Once it is done, leave the terminal window open. The Tor program will create two files under the directory /var/lib/tor/hidden_services/ and those files are:</p><blockquote><p>hostname: this file contains the Onion address of your website. private_key: this file contains the private key. It should be completely secure.</p></blockquote><p>One important note here is that the private_key file must be kept confidential and secure. Tor generates for your website two keys: public and private. The public key is sent to the actual Tor network and gets stored in a directory database along with many other public keys of other websites. Users wishing to access your website use that public key to make the connection. However, your local Tor service uses the private key to decrypt the traffic.</p><h2>[5] Accessing the Hidden Website</h2><p>If you have done everything correctly up to now, you should have your onion address in the file /var/lib/tor/hidden_service/hostname. In our example, we have the following address:</p><div id="code"><pre style="overflow: auto"><code> cd /var/lib/tor/hidden_service/ cat hostname</code></pre></div><p>http://idtirp7vx6rcpxgkmm3t6ungbuq6wcsinjggfhmppuv2e2prux4gc6qd.onion</p><p>All you need to do now is to open a Tor Browser — from any system on the Internet — and type the above address in the URL bar:</p><div id="code"><pre style="overflow: auto"><code> torbrowser-launcher &</code></pre></div><p>Notice that we also need to enter the html file name — we created earlier — after the address. Thus, our address looks exactly like this: -idtirp7vx6rcpxgkmm3t6ungbuq6wcsinjggfhmppuv2e2prux4gc6qd.onion/torsite.html</p></div></div><footer><div id="block"><br /><p>+>---------------------------<+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://orcid.org/0000-0001-9533-4916">ORCID</a>]--[<a href="https://arxiv.org/search/?">ArXiv</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+>---------------------------<+</p></div></footer></body>
\ No newline at end of file +idtirp7vx6rcpxgkmm3t6ungbuq6wcsinjggfhmppuv2e2prux4gc6qd.onion/torsite.html</p></div></div><footer><div id="block"><br /><p>+>---------------------------<+</p><div>[<a href="https://github.com/cristiancmoises">GitHub</a>]--[<a href="https://www.linkedin.com/in/cristiancezarmoises">LinkedIn</a>]</div><div>[<a href="https://www.researchgate.net/profile/Cristian-Moises/research">ResearchGate</a>]--[<a href="http://idtirp7vx6rcpxgkmm3t6ungbuq6wcsinjggfhmppuv2e2prux4gc6qd.onion/">TOR</a>]--[<a href="https://youtube.com/@securityops">Youtube</a>]</div><p>© 2024 Cristian Cezar Moises</p><p>[<a href="https://creativecommons.org/licenses/by-sa/4.0/">CC BY-SA 4.0</a>]</p><p>Built with [<a href="http://haunt.dthompson.us">Haunt</a>] in [<a href="https://www.gnu.org/software/guile/guile.html">Scheme</a>]</p><p>+>---------------------------<+</p></div></footer></body>
\ No newline at end of file |