commit d09af0b30b07d2005bf1b9e487627fc358e57fcb
Author: Damian Johnson <[email protected]>
Date:   Mon May 11 14:37:59 2015 -0700

    Nicer intro for the hidden service tutorial
    
    Slight improvements, including an explanation of tor2web and a screenshot.
---
 docs/_static/duck_duck_go_hidden_service.png |  Bin 0 -> 47402 bytes
 docs/tutorials/over_the_river.rst            |   23 +++++++++++++++++++----
 2 files changed, 19 insertions(+), 4 deletions(-)

diff --git a/docs/_static/duck_duck_go_hidden_service.png 
b/docs/_static/duck_duck_go_hidden_service.png
new file mode 100644
index 0000000..9596144
Binary files /dev/null and b/docs/_static/duck_duck_go_hidden_service.png differ
diff --git a/docs/tutorials/over_the_river.rst 
b/docs/tutorials/over_the_river.rst
index b7aa8f4..2d51541 100644
--- a/docs/tutorials/over_the_river.rst
+++ b/docs/tutorials/over_the_river.rst
@@ -1,11 +1,26 @@
 Over the River and Through the Wood
 ===================================
 
-`Hidden services <https://www.torproject.org/docs/hidden-services.html.en>`_ 
give you a way of providing a service without exposing your address. These 
services are only accessible through Tor or `Tor2web <https://tor2web.org/>`_, 
and useful for a surprising number of things...
+`Hidden services <https://www.torproject.org/docs/hidden-services.html.en>`_
+give you a way of providing a service without exposing your address. These
+services are only accessible through Tor or `Tor2web <https://tor2web.org/>`_,
+and useful for a surprising number of things...
 
-  * Hosting an anonymized site. This is usually the first thing that comes to 
mind, and something we'll demonstrate in a sec.
-  * Providing an endpoint Tor users can reach without exiting the Tor network. 
This eliminates the risk of an unreliable or malicious exit getting in the way. 
A great example of this is `Facebook 
<http://arstechnica.com/security/2014/10/facebook-offers-hidden-service-to-tor-users/>`_.
-  * Personal services. For instance you can host your home SSH server as a 
hidden service to prevent eavesdroppers from knowing where you live while 
traveling abroad.
+  * **Hosting an anonymized site**. This is usually the first thing that comes 
to mind, and something we'll demonstrate in a sec.
+  * Providing an **endpoint Tor users can reach** without exiting the Tor 
network. This eliminates the risk of an unreliable or malicious exit getting in 
the way. Great examples of this are `Facebook 
<http://arstechnica.com/security/2014/10/facebook-offers-hidden-service-to-tor-users/>`_
 (*facebookcorewwwi.onion*) and `DuckDuckGo 
<https://lists.torproject.org/pipermail/tor-talk/2010-August/003095.html>`_ 
(*3g2upl4pq6kufc4m.onion*).
+  * **Personal services**. For instance you can host your home SSH server as a 
hidden service to prevent eavesdroppers from knowing where you live while 
traveling abroad.
+
+`Tor2web <https://tor2web.org/>`_ provides a quick and easy way of seeing if
+your hidden service is working. To use it simply replace the **.onion** of
+your address with **.tor2web.org**...
+
+.. image:: /_static/duck_duck_go_hidden_service.png
+   :target: https://3g2upl4pq6kufc4m.tor2web.org/
+
+.. _running-a-hidden-service
+
+Running a hidden service
+------------------------
 
 Hidden services can be `configured through your torrc 
<https://www.torproject.org/docs/tor-manual.html.en#_hidden_service_options>`_, 
but Stem also provides some methods to easily work with them...
 



_______________________________________________
tor-commits mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits

Reply via email to