From 6d1345957cb41770d63073cd5ddd93e64307d25d Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Cristian=20Cezar=20Mois=C3=A9s?= <86272521+cristiancmoises@users.noreply.github.com> Date: Sat, 24 Feb 2024 03:25:11 +0000 Subject: Add files via upload --- -torsite.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to '-torsite.html') diff --git a/-torsite.html b/-torsite.html index aafa479..9652911 100644 --- a/-torsite.html +++ b/-torsite.html @@ -7,4 +7,4 @@ Nov 13 17:18:37.000 [notice] Tor has successfully opened a circuit. Looks like c Nov 13 17:18:37.000 [notice] Bootstrapped 100%: Done
Once it is done, leave the terminal window open. The Tor program will create two files under the directory /var/lib/tor/hidden_services/ and those files are:
hostname: this file contains the Onion address of your website. private_key: this file contains the private key. It should be completely secure.
One important note here is that the private_key file must be kept confidential and secure. Tor generates for your website two keys: public and private. The public key is sent to the actual Tor network and gets stored in a directory database along with many other public keys of other websites. Users wishing to access your website use that public key to make the connection. However, your local Tor service uses the private key to decrypt the traffic.
If you have done everything correctly up to now, you should have your onion address in the file /var/lib/tor/hidden_service/hostname. In our example, we have the following address:
cd /var/lib/tor/hidden_service/
cat hostname
http://idtirp7vx6rcpxgkmm3t6ungbuq6wcsinjggfhmppuv2e2prux4gc6qd.onion
All you need to do now is to open a Tor Browser — from any system on the Internet — and type the above address in the URL bar:
torbrowser-launcher &
Notice that we also need to enter the html file name — we created earlier — after the address. Thus, our address looks exactly like this: -idtirp7vx6rcpxgkmm3t6ungbuq6wcsinjggfhmppuv2e2prux4gc6qd.onion/torsite.html