Great, you've got your first hidden service set up, and you're ready to do a little more work to secure it. In this post, we will be looking at ensuring Nginx only serves traffic through the Tor process and set up a very basic firewall configuration to block inbound traffic other than whitelisted protocols and services. As with my previou…Thomas White
Privacy and technology activist. Full time Linuxer. Audentes fortuna adiuvat.
If you've kept up with the latest news, you've probably heard the word "Dark web" or "Dark net" or "Deep web" bandied around quite loosely, usually in the context of some murky illegal activities. The reality of this though, is that this "dark net" is simply a term used to describe corners of the internet which reside on the Tor network,…Thomas White
I'm no stranger to controversy. In fact, my past few years have been entirely dogged by it. Transitioning from a respected advocate for privacy and technology into one of the world's best-known publishers of leaked material was not a smooth journey, and has forever marked my record. Whether you see this as a positive or negative is down t…Thomas White