1
0
Fork 0
mayvaneday/blog/2023/july/FULL_TOR.html

33 lines
7.4 KiB
HTML
Raw Permalink Normal View History

<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<title>It's never been a better time to dive into Tor - Archive - MayVaneDay Studios</title>
<link href="../../../style.css" rel="stylesheet" type="text/css" media="all">
<meta name="author" content="Vane Vander">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
</head>
<body class="mayvaneday">
<article>
<div class="box">
<h1>It's never been a better time to dive into Tor</h1>
<p>published: 2023-07-01</p>
</div>
<hr>
<div class="box">
<p>According to WHOIS data from ICANN, I registered <code>letsdecentralize.org</code> on October 19 of 2020. Since then, one of the main missions of Let's Decentralize has been to prove to people that the Tor network is useful for far more than just buying drugs and committing crime: anything you can think of doing online that isn't directly commercial, from writing email to hosting websites to checking the news, can nowadays be done over a Tor hidden service. Sometimes you don't even have to move to some obscure service you don't necessarily trust in order to take advantage of Tor's anonymity: over the last few years, lots of mainstream services and organizations like <a href="https://duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion">DuckDuckGo</a>, <a href="https://protonmailrmez3lotccipshtkleegetolb73fuirgj7r4o4vfu7ozyd.onion">ProtonMail</a>, <a href="https://www.reddittorjg6rue252oqsxryoxengawnmo46qy4kyii5wtqnwfj4ooad.onion">Reddit</a>, and <a href="https://www.bbcweb3hytmzhn5d532owbu6oqadra5z3ar726vq5kgwwn6aucdccrad.onion">BBC News</a> have set up their own hidden services to minimize passive data collection and allow uncensored access to those in regions with restricted Internet.</p>
<p>And for sites that refuse to set up their own hidden services, or Twitter who <a href="https://archive.md/pVxpg">had one but then let it die</a>, privacy-preserving frontends exist, pieces of software one can set up on their own computers or servers and then configure as Tor hidden services to allow themselves or others to access those sites over Tor. These frontends are usually used by replacing the domain of the target service, such as <code>twitter.com</code>, with the domain of the frontend, such as <code>nitter.net</code>. To avoid having to manually replace the domain in the URL every time you want to, say, access a tweet, you can use an extension such as <a href="https://web.archive.org/web/20230325203918/https://einaregilsson.com/redirector/">Redirector</a> to tell your browser to do it automatically each time. That way, you can go directly to an instance like Nitter every time you click on a link to a tweet and never have to talk to the Twitter servers.</p>
<p><a href="https://web.archive.org/web/20230325211544/https://github.com/iv-org/invidious">Invidious</a> for YouTube, <a href="https://web.archive.org/web/20230325211725/https://github.com/zedeus/nitter">Nitter</a> for Twitter, and <a href="https://web.archive.org/web/20230325211819/https://github.com/libreddit/libreddit">Libreddit</a> for Reddit have all existed for a while, but in the few years since I've started Let's Decentralize, there's been <a href="https://web.archive.org/web/20230323090219/https://libredirect.github.io/">a Cambrian explosion of new frontends for different services</a>. For example, did you know that <a href="https://web.archive.org/web/20230325212114/https://codeberg.org/gothub/gothub">Github</a> has a frontend? And <a href="https://web.archive.org/web/20230325211539/https://github.com/heyLu/numblr">Tumblr</a> as well. I'd bet you'd be happy to know that there's now a way to read <a href="https://web.archive.org/web/20230325212201/https://github.com/zyachel/quetre">Quora answers</a> without having to deal with their annoying login wall. Want to hateread reviews on <a href="https://web.archive.org/web/20230325212144/https://github.com/nesaku/BiblioReads">Goodreads? You can now do that</a> without advertisers knowing. Did a friend recommend a funny TikTok user to you, but you don't want to risk getting sucked into TikTok's <a href="https://web.archive.org/web/20230325210627/https://www.salon.com/2023/03/25/tiktoks-algorithm-is-pushing-out-extremist-and-violent-content-to-13-year-olds/">provably harmful algorithm</a>? Just fire up <a href="https://archive.md/Z6Jua">ProxiTok</a> in a browser tab, and you get a nice list of that user's videos along with helpful download buttons.</p>
<p>And when someone hosts one of these instances on their server as a Tor hidden service, you can browse the associated service in complete anonymity. Since none of them require you to log in with an actual account, unless you've gone out of your way to break Tor Browser's anti-fingerprinting measures, even if the person running the hidden service is evil, there's nothing to identify you with: you can't exactly geolocate the IP address <code>127.0.0.1</code>, which all traffic to a hidden instance comes in as, to anyone's house. The downside to this is that these instances only provide read-only views of the services they proxy. If, for example, you want to <em>post a tweet</em> but don't want to leave the Tor network, you can't do that through Nitter; you'd have to find a way to log into <code>twitter.com</code> without tripping their thousands of anti-bot measures or requirement for phone verification. Some Invidious instances allow you to "subscribe" to YouTube channels, but it's not an actual subscription as YouTube understands it; it's just a glorified bookmark of that channel that only lives on that particular Invidious instance. (Unless they changed it from last time I checked. In which case I'd <a href="../../../identity/index.html">like to know</a>.)</p>
<p>And before I forget, I must mention that the benefits of Tor can extend even past the browser. <a href="http://fdroidorg6cooksyluodepej4erfctzk7rrjpjbbr6wx24jh3lqyfwyd.onion/index.html.en">F-Droid</a>, a FOSS-only app store for Android, has a hidden service you can use to get apps. If you run <a href="http://5ekxbftvqg26oir5wle3p27ax3wksbxcecnm6oemju7bjra2pn26s3qd.onion">Debian, you can get software updates</a> over Tor, as well as download whole ISOs for new installations. <a href="http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion">Whonix</a> and <a href="http://qubesosfasa4zl44o4tws22di6kepyzfeqv3tg4e3ztknltfxqrymdad.onion">Qubes</a>, two Linux distributions heavily focused on security and privacy, also provide ways to obtain installation files over Tor. I expect more Linux distros to follow suit in the future.</p>
<p>If you're a social recluse like me who doesn't have to worry about posting to social media and your work doesn't take place on your personal computer, for the first time ever that I know of, it's possible to live <em>almost</em> your entire online life over Tor without having to give up "normal people" comforts or become a crazy minimalist. (I say <em>almost</em> because we still don't have the banks on board yet. And I don't recommend trying to buy things over Amazon. Although you <em>can</em> <a href="https://archive.md/aeCwK">look at item listings</a>...) If we're all waiting for the tsunami tides of totalitarian Internet policies to reach us, then it would be wise to get a leg up and make one's Internet activity as untrackable as possible.</p>
<p>I'll see you on Tor.</p>
</div>
<hr>
<div class="box">
<p align=right>CC BY-NC-SA 4.0 &copy; Vane Vander</p>
</div>
</article>
</body>
</html>