commit d09af0b30b07d2005bf1b9e487627fc358e57fcb
Author: Damian Johnson <[email protected]>
Date: Mon May 11 14:37:59 2015 -0700
Nicer intro for the hidden service tutorial
Slight improvements, including an explanation of tor2web and a screenshot.
---
docs/_static/duck_duck_go_hidden_service.png | Bin 0 -> 47402 bytes
docs/tutorials/over_the_river.rst | 23 +++++++++++++++++++----
2 files changed, 19 insertions(+), 4 deletions(-)
diff --git a/docs/_static/duck_duck_go_hidden_service.png
b/docs/_static/duck_duck_go_hidden_service.png
new file mode 100644
index 0000000..9596144
Binary files /dev/null and b/docs/_static/duck_duck_go_hidden_service.png differ
diff --git a/docs/tutorials/over_the_river.rst
b/docs/tutorials/over_the_river.rst
index b7aa8f4..2d51541 100644
--- a/docs/tutorials/over_the_river.rst
+++ b/docs/tutorials/over_the_river.rst
@@ -1,11 +1,26 @@
Over the River and Through the Wood
===================================
-`Hidden services <https://www.torproject.org/docs/hidden-services.html.en>`_
give you a way of providing a service without exposing your address. These
services are only accessible through Tor or `Tor2web <https://tor2web.org/>`_,
and useful for a surprising number of things...
+`Hidden services <https://www.torproject.org/docs/hidden-services.html.en>`_
+give you a way of providing a service without exposing your address. These
+services are only accessible through Tor or `Tor2web <https://tor2web.org/>`_,
+and useful for a surprising number of things...
- * Hosting an anonymized site. This is usually the first thing that comes to
mind, and something we'll demonstrate in a sec.
- * Providing an endpoint Tor users can reach without exiting the Tor network.
This eliminates the risk of an unreliable or malicious exit getting in the way.
A great example of this is `Facebook
<http://arstechnica.com/security/2014/10/facebook-offers-hidden-service-to-tor-users/>`_.
- * Personal services. For instance you can host your home SSH server as a
hidden service to prevent eavesdroppers from knowing where you live while
traveling abroad.
+ * **Hosting an anonymized site**. This is usually the first thing that comes
to mind, and something we'll demonstrate in a sec.
+ * Providing an **endpoint Tor users can reach** without exiting the Tor
network. This eliminates the risk of an unreliable or malicious exit getting in
the way. Great examples of this are `Facebook
<http://arstechnica.com/security/2014/10/facebook-offers-hidden-service-to-tor-users/>`_
(*facebookcorewwwi.onion*) and `DuckDuckGo
<https://lists.torproject.org/pipermail/tor-talk/2010-August/003095.html>`_
(*3g2upl4pq6kufc4m.onion*).
+ * **Personal services**. For instance you can host your home SSH server as a
hidden service to prevent eavesdroppers from knowing where you live while
traveling abroad.
+
+`Tor2web <https://tor2web.org/>`_ provides a quick and easy way of seeing if
+your hidden service is working. To use it simply replace the **.onion** of
+your address with **.tor2web.org**...
+
+.. image:: /_static/duck_duck_go_hidden_service.png
+ :target: https://3g2upl4pq6kufc4m.tor2web.org/
+
+.. _running-a-hidden-service
+
+Running a hidden service
+------------------------
Hidden services can be `configured through your torrc
<https://www.torproject.org/docs/tor-manual.html.en#_hidden_service_options>`_,
but Stem also provides some methods to easily work with them...
_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits