/r/onions

2009-09-14 Thread Rich Jones
Hello!

I know there have to be some really interesting .onions out there, but I've
been having trouble finding them, so I started a reddit.com 'subreddit' to
do some of that web 2.0 magic and let the good ones bubble up.

http://www.reddit.com/r/onions/ , if any of you have anything to share,
that'd be pretty cool.

R


Hidden Service Setup Guide for Newbies (Version .2)

2009-09-14 Thread Ringo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hey all,

So I worked a lot more on this guide and I have worked out (hopefully)
all the bugs and kinks. This should allow you to safely run a hidden
service with PHP, shell access, cgi, etc. without worrying about your
anonymity being broken. I gave shell accounts out to a few people and
they weren't able to do anything. My hidden service is now down (I need
it for other work) but it would be cool if somebody that has a spare
machine can set something up using this guide and open it up to folks.

Grab the guide at http://www.olyhackbloc.org/hidsec.pdf

I've also set up a script to do most of the basic configuration for the
host machine (iptables setup, installing tor/privoxy, etc.). This script
is VERY untested so please use with extra caution and send me any
feedback you have. This doesn't do anything of the things I suggest in
the guide to speed up your machine, that's your responsibility. It also
doesn't enable automatic updates, which I highly suggest you do.

Grab the script at http://www.olyhackbloc.org/script.zip

Please try this guide out and let me know how it works for you. This is
still a beta thing so please be careful and don't do anything you need
strong anonymity for.

Solidarity,
Ringo



-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkqurT4ACgkQVRztCIhay+sHVQCfe/8TfQFjM4YeNHx+tAT8qd98
gM8AnAxlstAxDLhZoMss845yuDLlZnAF
=xhLz
-END PGP SIGNATURE-


More Secure Tor Browsing Through A Virtual Machine in Ubuntu (Version .2)

2009-09-14 Thread Ringo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hey all,

So I worked a little more on this guide and I have worked out
(hopefully) all the bugs and kinks. Please try this guide out and let me
know how it works for you. This is still a beta thing so please be
careful and don't do anything you need strong anonymity for.

You can grab the guide at http://www.olyhackbloc.org/browservm.pdf

Solidarity,
Ringo
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkqurTkACgkQVRztCIhay+ul+QCfXsmfTNivN2Le+4QLT2lr88SC
vLwAn19GnPHuGwpd9mP3oGa+43ZVHdzJ
=RuHE
-END PGP SIGNATURE-


Re: Tor for Android

2009-09-14 Thread Jacob Appelbaum
It also seems like TorProxy should have a new identity button. Shadow
suggests that users should restart TorProxy if connections fail and that
seems costly. Perhaps it's not too costly on the network or cpu?

The Shadow Browser/TorProxy setup seems like a pretty great start for
anonymity on Android. It's great stuff! Exciting!

Best,
Jacob



signature.asc
Description: OpenPGP digital signature


Tor for Android

2009-09-14 Thread Eugen Leitl

http://www.cl.cam.ac.uk/research/dtg/android/tor/

TorProxy and Shadow

Summer placement project, written by Connell Gauld.

TorProxy is an Android application that makes it possible to use Internet sites 
and services anonymously from a mobile device. This is possible thanks to the 
Tor network and OnionCoffee. TorProxy can be used by many different Android 
applications to obtain an anonymous Internet application. For example, if you 
want to browse website anonymously you will need to install a web browser which 
uses TorProxy such as Shadow (see below).

Shadow is an Android application allows you to browse the Web anonymously from 
your mobile phone. The Shadow browser requires TorProxy (see above) do do this. 
In addition to using the Tor network to anonymously retrieve information from 
the Web, Shadow also helps you manage any "cookies" sent to Shadow by Websites 
to protect your browsing history.

The source code of TorProxy and Shadow are available under the GPL v2 license. 
Please email us for further details. We hope to provide public access to our 
SVN repository shortly.
How to use TorProxy and Shadow

   1. Install TorProxy and Shadow by downloading them from the Android 
Marketplace.
   2. Start the TorProxy application.
   3. Select a profile for TorProxy:
  * off — do not connect to the tor network.
  * on-demand — only connect to the tor network if a program (e.g. 
Shadow) needs it. This profile is probably the best choice if you only want to 
make occassional use of an anonymous Internet connection.
  * always on — maintain an anonymous connection whenever the phone is 
actively in use.
   4. Once a connection to the Tor network is requested, a notification of the 
state of the connection appears in the notification bar. A countdown will 
appear with an estimate of the time remaining before an anonymous connection 
becomes available. This will take approximately one minute in the first 
instance, and around 35 seconds when reconnecting after the phone has woken up 
from a sleep state.
   5. To browse the Web, start the Shadow web browser. Shadow works in a very 
similar way to the normal Android Web browser. The Menu button reveals the 
usual browser options. Typing in a URL will initiate an anonymous connection 
over the Internet via Tor.

Frequently asked questions
Why is the Google Website frequently displayed in a foreign language?

Google determines the language you want from the internet address of your 
device. When browsing anonymously, the Tor network may provide an internet 
address from another country. You can click on the "Google.com in English" link 
to see the website in English.
Source Download

The TorProxy and Shadow source code is available through anonymous access to 
our SVN repository:

svn co http://www.cl.cam.ac.uk/research/dtg/code/svn/android-tor

We developed and compile this code using Eclipse with Subclipse and the Android 
developer SDK. Each of the four modules in the above repository should be 
checked out as separate eclipse projects (each has its own .project file).
Compiling TorProxyLib

   1. Checkout URL: 
http://www.cl.cam.ac.uk/research/dtg/code/svn/android-tor/TorProxyLib
   2. Build in Eclipse as normal
   3. Right click on export-torproxylib.jardesc and choose Create Jar 

Compiling TorProxy

   1. Checkout URL: 
http://www.cl.cam.ac.uk/research/dtg/code/svn/android-tor/TorProxy

Compiling Shadow

   1. Checkout URL: 
http://www.cl.cam.ac.uk/research/dtg/code/svn/android-tor/Shadow

Compiling TorProxyExamples

   1. Checkout URL: 
http://www.cl.cam.ac.uk/research/dtg/code/svn/android-tor/TorProxyExamples

Documentation for Application Developers
Overview

In order to anonymize your application's Internet communication:

1. Import TorProxyLib.jar into your project

2. Connect to the TorProxy control service

3. Register for the TorProxy status change broadcast

4. When the Tor connection is available, create your socket and tunnel it 
through SocksProxy
1. TorProxyLib

This library contains everything you need to allow your application to 
anonymize its sockets.

Add TorProxyLib.jar to your build path.
2. Connect to the TorProxy control service

The TorProxy service exports an interface which you can use to check the 
availability of the anonymous connection and register your desire to use it.

Example:

// Keep track of the control service
private ITorProxyControl mControlService = null;
private final IntentFilter torStatusFilter = new IntentFilter(

TorProxyLib.STATUS_CHANGE_INTENT);


// Service connection to TorProxy service
private ServiceConnection mSvcConn = new ServiceConnection() {

@Override
public void onServiceConnected(ComponentName name, IBinder service) {

mControlService = ITorProxyControl.Stub.asInterface(service);
// Connected to Control Service
// Perhaps check Tor status here

}

@Override
public voi