It amazes me that onion sites aren’t everywhere. They are easy to spin up, you don’t have to pay anything and can run it from your own home. No need to purchase a domain, worry about expiration, have an open port. Built-in DoS protection. Anonymity and authentication by default. No need to configure HTTPS. Sure, uptime is on you and there is some latency/bandwidth limits to be considered, but once you are over that, onions are a solution to many problems and the benefits are enormous.

14 points

Last time I tried onion it was 5+ years ago and slow as fuck. Has the performance improved?

permalink
report
reply
5 points

Depends on your location and standards. Lots of the Tor relays are in Europe, so if you are here the connectivity is pretty good. Bandwidth is usually up to 2 MB/s and latency usually goes from 300ms - 1.5 seconds. Initial connections to a server might take longer (5-7 seconds). For browsing the web and playing non-HD videos it’s fine in my opinion.

permalink
report
parent
reply
4 points
Deleted by creator
permalink
report
parent
reply
5 points

Not really, but the performance was based on the nodes you went through. Nodes have gotten better over time, so the experience now should be better.

permalink
report
parent
reply
11 points

As someone who just stumbled on here from ALL, I’m vaguely familiar with Onion sites and TOR more generally, but what resources would you recommend to learn more about setting one up for myself to play around with?

permalink
report
reply
3 points
*

It’s easy. Just edit your Tor configuration file (torrc) to enable an onion service. This one forwards from the onion service on port 80 (so users don’t have to specify a port number in the URL) to a local HTTP server running on your machine on port 8000:

HiddenServiceDir /var/lib/tor/hidden_service/
HiddenServicePort 80 127.0.0.1:8000

Change the directory path based on your operating system. Specify a directory that doesn’t exist yet so Tor can set the correct permissions on it. Next, start or restart Tor. Then just read the onion service’s hostname in the hostname file created in that hidden services directory.

You can then run any HTTP server on localhost:8000 and anyone connecting to your onion service can access it. In Python this might be as simple as python3 -m http.server --bind localhost 8000 --directory . to share the files current directory (but be aware that there are some security considerations, like symbolic links, to be aware of. Just use this for testing.) For production servers you will want a “real” http server.

permalink
report
parent
reply
2 points

Probably the tor project.

permalink
report
parent
reply
6 points
*
Removed by mod
permalink
report
reply
4 points

and can run it from your own home.

A risk most people aren’t willing to take lightly?

permalink
report
reply
11 points

Running an onion service is generally much less risky legally speaking than a Tor exit node.

permalink
report
parent
reply
7 points

Is it legality or security? I personally wouldn’t want a public facing service on my home network without extensive hardening

permalink
report
parent
reply
3 points

I mean, you could segment it off.

permalink
report
parent
reply
3 points

I’m more worried about opening up a port in my home network.

permalink
report
parent
reply

You don’t. The tor service connects out to a node. This is also nice because it means you can run it behind nat and firewall and whatnot without problems.

permalink
report
parent
reply
2 points

Sorry but for someone who knows just what the Wikipedia intro says about TOR, and having used it like once, I just thought it takes forever to load broken sites just for the benefit of some allegedly improved privacy. I figured it is only useful to people who want to browse illegal sites, but does this mean that any hidden website is illegal? Just for the sake of argument if someone hosts an old-fashioned HTML site about his fucking hobby, will they face legal repercussions just for serving it as a hidden webpage? I can’t fathom that.

permalink
report
parent
reply
4 points

If you don’t share the onion link with others and just use it for yourself, no one ever discovers it, unlike the public internet where you get crawled by port scanners all the time. Also there is a public key whitelist feature if you want to restrict who connects.

permalink
report
parent
reply
3 points

That’s actually a really useful feature for me, how much processor does it need? Can a raspberry pi run it?

permalink
report
parent
reply
2 points

The Tor client itself is lightweight. It’s the application you want to run behind the onion service (http server, etc.) that is probably going to limit you in terms of hardware. You can run an onion service on a Raspberry Pi. Any version in fact, even the first one.

permalink
report
parent
reply
1 point
*

I think OnionShare can run on an RPi, which is a FOSS prebuilt web service

permalink
report
parent
reply
2 points

Primarily because I can’t use an onion for my email domain so I can’t like have me at znoonkblahblahblah.onion (protonmail)

permalink
report
reply

Tor - The Onion Router

!tor@lemmy.ml

Create post

Tips, tricks and information about the Tor network!

Tor Project

Community stats

  • 7

    Monthly active users

  • 82

    Posts

  • 88

    Comments

Community moderators