You could use Whonix as well. (Not supported or created by the Tor Project) https://whonix.org/
There is still opportunity for info leakage, so its best to not store identifying info inside the workstation if you are running a hidden service. You can also set Tor-level cookie authentication if your service is private. See the Tor manual for that. On Jul 4, 2016 7:00 AM, <[email protected]> wrote: Send tor-onions mailing list submissions to [email protected] To subscribe or unsubscribe via the World Wide Web, visit https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions or, via email, send a message with subject or body 'help' to [email protected] You can reach the person managing the list at [email protected] When replying, please edit your Subject line so it is more specific than "Re: Contents of tor-onions digest..." Today's Topics: 1. Re: Hidden Service IP Addresses ([email protected]) ---------------------------------------------------------------------- Message: 1 Date: Sun, 3 Jul 2016 19:47:28 +0000 From: "[email protected]" <[email protected]> To: [email protected] Subject: Re: [tor-onions] Hidden Service IP Addresses Message-ID: <[email protected]> Content-Type: text/plain; charset=utf-8 Flipchan: > Most Common is that an attacker gets root access or finds an rce bug > on ur system and useage that to login to ur sys and by that gettin > the ip,u can ofc run the site with a usr account and proxy all > connections through tor with ip tables What ------------------------------ Subject: Digest Footer _______________________________________________ tor-onions mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions ------------------------------ End of tor-onions Digest, Vol 7, Issue 2 ****************************************
_______________________________________________ tor-onions mailing list [email protected] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions
