You could use Whonix as well. (Not supported or created by the Tor Project)
https://whonix.org/

There is still opportunity for info leakage, so its best to not store
identifying info inside the workstation if you are running a hidden service.

You can also set Tor-level cookie authentication if your service is
private. See the Tor manual for that.
On Jul 4, 2016 7:00 AM, <[email protected]> wrote:

Send tor-onions mailing list submissions to
        [email protected]

To subscribe or unsubscribe via the World Wide Web, visit
        https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions
or, via email, send a message with subject or body 'help' to
        [email protected]

You can reach the person managing the list at
        [email protected]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of tor-onions digest..."


Today's Topics:

   1. Re: Hidden Service IP Addresses ([email protected])


----------------------------------------------------------------------

Message: 1
Date: Sun, 3 Jul 2016 19:47:28 +0000
From: "[email protected]" <[email protected]>
To: [email protected]
Subject: Re: [tor-onions] Hidden Service IP Addresses
Message-ID: <[email protected]>
Content-Type: text/plain; charset=utf-8

Flipchan:
> Most Common is that an attacker gets root access or finds an rce bug
> on ur system and useage that to login to ur sys and by that gettin
> the ip,u can ofc run the site with a usr account and proxy all
> connections through tor with ip tables

What


------------------------------

Subject: Digest Footer

_______________________________________________
tor-onions mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions


------------------------------

End of tor-onions Digest, Vol 7, Issue 2
****************************************
_______________________________________________
tor-onions mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions

Reply via email to