<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>onion Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/onion/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Wed, 16 Mar 2022 20:52:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>Tor2Web: what is it, and how does it work?</title>
		<link>https://www.osradar.com/tor2web-what-is-it-and-how-does-it-work/</link>
					<comments>https://www.osradar.com/tor2web-what-is-it-and-how-does-it-work/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Mon, 28 Mar 2022 21:51:00 +0000</pubDate>
				<category><![CDATA[Network]]></category>
		<category><![CDATA[onion]]></category>
		<category><![CDATA[tor2web]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=35187</guid>

					<description><![CDATA[<p>Hello! Surfing the Internet and maintaining privacy has become one of the main objectives of users. Indeed, our data can be stolen when we register on platforms we use social networks, as long as we do not take measures to prevent it. However, there are methods to surf anonymously and maintain privacy. Today we are [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/tor2web-what-is-it-and-how-does-it-work/">Tor2Web: what is it, and how does it work?</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hello! Surfing the Internet and maintaining privacy has become one of the main objectives of users. Indeed, our data can be stolen when we register on platforms we use social networks, as long as we do not take measures to prevent it. However, there are methods to surf anonymously and maintain privacy. Today we are going to discuss the Tor2Web project and how it helps to preserve data.</p>



<h2>Tor Project</h2>



<p><a href="https://www.osradar.com/how-to-route-network-traffic-through-tor/" target="_blank" rel="noreferrer noopener">Tor </a>stands for The Onion Router. It is a project that aims to improve privacy on the network. It allows you to browse web pages or use online services without filtering information such as IP address, location, etc. The Tor network encrypts information on entry and decrypts it on exit. In addition, it works through multiple nodes. Certainly, its main function is to provide anonymity to the Internet user. However, sometimes there have been vulnerable nodes, and it has been possible to reach the sender of a message.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="600" height="914" src="https://www.osradar.com/wp-content/uploads/2022/03/tor.png" alt="" class="wp-image-35189" srcset="https://www.osradar.com/wp-content/uploads/2022/03/tor.png 600w, https://www.osradar.com/wp-content/uploads/2022/03/tor-197x300.png 197w" sizes="(max-width: 600px) 100vw, 600px" /></figure>



<p>When we visit a normal website, or, the connection goes from our computer to the router and from there to the servers of that site. Consequently, they can easily see where the connection is coming from and where it is going. However, if we use the Tor network, that same connection goes through multiple nodes until it reaches the final server. Therefore, they cannot really determine what the initial connection was.</p>



<p>To use this network, it is imperative to use the Tor browser. It is necessary to use it to browse onion websites, which are part of the Dark Web and Deep Web. It is available for both desktop and mobile. Furthermore, it is also used by many users who want to avoid data leaks and privacy issues.</p>



<h2>What is Tor2Web</h2>



<p>After having explained what the Tor network is, we can mention how it differs from <a href="https://www.tor2web.org/" target="_blank" rel="noreferrer noopener">Tor2Web. </a>Actually, we will be able to define exactly what we are talking about. It is a software project that allows anonymous surfing of the web and access to the Onion servers. The difference is that it is not necessary to use the Tor browser.</p>



<p>Consequently, a user can access Onion sites from any browser. For example, using Google Chrome or Mozilla Firefox. How exactly does it work? Whenever you see a web address ending in <em>.onion it</em> means that it is a Tor service. To open them, you need to use the Tor browser.</p>



<p>Let&#8217;s see how it works. The first thing it does is to replace that URL, i.e., that <em>.onion </em>extension. In effect, it replaces it with <em>.onion.to, .onion.city, .onion.cab </em>or any of the domains that are made available to Tor2Web volunteer operators. In this way we can access them without the need to have the Tor browser installed on the computer.</p>



<h2>How does it work?</h2>



<p>It is basically proxy access to Tor servers. Kindly note that this is not a content hosting project. It simply acts as a proxy, as an intermediary, to reach the Tor servers that host those websites. The platform was created by the Tor team itself, to offer an alternative.</p>



<p>This reverse proxy is responsible for routing requests coming from the normal web to the Tor Deep Web. The hidden services will remain hidden, even if it is a Tor2Web proxy. However, the client, the person visiting that site, will not be hidden. The only way to really stay hidden is to use Tor.</p>



<p>Suppose you enter a web page with through the Tor2Web project. As a result, you will see a message telling you that it is only a proxy service, and you have to accept the terms to access it. The project is open source and is hosted on <a href="https://github.com/tor2web/Tor2web" target="_blank" rel="noreferrer noopener">GitHub.</a></p>



<p>In short, Tor2Web is a project created to allow a user to access content from Tor server websites. With the advantage of not having to install the Tor browser. We would only have to change the extension for one of those used by the volunteers behind the project, and we can open it from any other browser.</p>



<h2>Tips on how to navigate with privacy</h2>



<p>Here are some tips for surfing the web without exposing personal data. This way, you will be protected regardless of whether you use the Tor browser or any other browser.</p>



<h3>Do not provide more data than necessary</h3>



<p>The first thing is not to make public more data than necessary. By this, we mean not to put our e-mail in open forums or comments on web pages, for example. This can be collected by bots on the Internet and put us on Spam lists and put our privacy at risk.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="900" height="900" src="https://www.osradar.com/wp-content/uploads/2022/03/tor2.png" alt="" class="wp-image-35220" srcset="https://www.osradar.com/wp-content/uploads/2022/03/tor2.png 900w, https://www.osradar.com/wp-content/uploads/2022/03/tor2-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2022/03/tor2-150x150.png 150w, https://www.osradar.com/wp-content/uploads/2022/03/tor2-768x768.png 768w, https://www.osradar.com/wp-content/uploads/2022/03/tor2-696x696.png 696w" sizes="(max-width: 900px) 100vw, 900px" /></figure>



<h3>Keeping everything up to date</h3>



<p>Another fundamental issue is to have our equipment properly updated. We must always install all the patches that appear and thus correct vulnerabilities that can be exploited by hackers and attack. This could expose personal data, passwords, etc.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="1024" height="1024" src="https://www.osradar.com/wp-content/uploads/2022/03/tor3.png" alt="" class="wp-image-35221" srcset="https://www.osradar.com/wp-content/uploads/2022/03/tor3.png 1024w, https://www.osradar.com/wp-content/uploads/2022/03/tor3-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2022/03/tor3-150x150.png 150w, https://www.osradar.com/wp-content/uploads/2022/03/tor3-768x768.png 768w, https://www.osradar.com/wp-content/uploads/2022/03/tor3-696x696.png 696w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h2>Security programs in place</h2>



<p>Having a good antivirus, such as Windows Defender, Avast or Bitdefender, is essential to prevent the entry of malware. But it is not only antivirus software that needs to be mentioned. Indeed, we can complement security with firewalls or even browser extensions that can protect us and eliminate possible malware.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="512" height="512" src="https://www.osradar.com/wp-content/uploads/2022/03/tor4.png" alt="" class="wp-image-35229" srcset="https://www.osradar.com/wp-content/uploads/2022/03/tor4.png 512w, https://www.osradar.com/wp-content/uploads/2022/03/tor4-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2022/03/tor4-150x150.png 150w" sizes="(max-width: 512px) 100vw, 512px" /></figure>



<h2>Common sense</h2>



<p>But if there is one thing that is important for maintaining privacy, it is common sense. We must avoid making mistakes that can affect us. For example, clicking where we should not, installing a program that we have downloaded from third-party sites and may not be safe or logging into a fake page.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="655" height="655" src="https://www.osradar.com/wp-content/uploads/2022/03/tor5.png" alt="" class="wp-image-35230" srcset="https://www.osradar.com/wp-content/uploads/2022/03/tor5.png 655w, https://www.osradar.com/wp-content/uploads/2022/03/tor5-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2022/03/tor5-150x150.png 150w" sizes="(max-width: 655px) 100vw, 655px" /></figure>



<p>It is important to avoid this type of actions that can be a danger. If we use only official programs, log on to secure sites, be careful with the files we download by e-mail… All this will help us to maintain our privacy on the network and be more protected.</p>



<p>In conclusion, the Tor2Web project is an alternative to using the Tor browser to be able to surf the net with more privacy. It is also essential at all times to avoid making mistakes and to be protected. Bye!</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/tor2web-what-is-it-and-how-does-it-work/">Tor2Web: what is it, and how does it work?</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/tor2web-what-is-it-and-how-does-it-work/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Access .onion Sites</title>
		<link>https://www.osradar.com/access-onion-sites/</link>
					<comments>https://www.osradar.com/access-onion-sites/#respond</comments>
		
		<dc:creator><![CDATA[Mel K]]></dc:creator>
		<pubDate>Fri, 12 Jan 2018 05:31:44 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[dark web]]></category>
		<category><![CDATA[deep web]]></category>
		<category><![CDATA[onion]]></category>
		<category><![CDATA[tor]]></category>
		<category><![CDATA[tor network]]></category>
		<category><![CDATA[tor proxy]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=1227</guid>

					<description><![CDATA[<p>All the websites on the internet are hosted on servers – computers that host the files, process the data and serves the web pages to us. We only have to type the website’s URL in our web browser and it’s that simple, right? When we hit “Enter”, the web browser contacts the server using the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/access-onion-sites/">How to Access .onion Sites</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>All the websites on the internet are hosted on servers – computers that host the files, process the data and serves the web pages to us. We only have to type the website’s URL in our web browser and it’s that simple, right? When we hit “Enter”, the web browser contacts the server using the IP address. There’s a HUGE database that holds all the server IP address corresponding to every website on the internet. That allows us to contact the server, request the website and all the other stuff. So, what’s the big deal about the ONION sites?</p>
<p>Websites ending with “.onion” aren’t normal websites. These domains use Tor hidden services and a part of the “deep web”.</p>
<h2><strong>What is deep web?</strong></h2>
<p>Let’s talk about the deep web on short. All the websites on the web – Facebook, Twitter, Nasa, CNET etc. – all make up the internet we know about. However, there are a lot more things that aren’t accessible through the normal search engines. That side of the WWW (World Wide Web) is called the deep web. The characteristics of this part are quite similar to the normal internet – emails, chat messages, social media sites, electronic banks etc.</p>
<p>These websites aren’t indexed by search engines like Google, Yahoo, Bing or DuckDuckGo. These parts are visible by the normal internet. However, search engines do not crawl into these places. Experts estimate that the deep web consists about 90% (even 99%) of the entire internet. They are only accessible via Tor network.</p>
<h2><strong>How Tor network works</strong></h2>
<p>When you access, say, <a href="https://www.google.com">https://www.google.com</a>, your request is bounced from one Tor relay to another Tor relay, until it reaches an exit node – a computer that sends the request to Google. Google catches the request, sends data accordingly. The return is again bounced in a long road of one Tor relay to another until it reaches you.</p>
<p>The entire data exchange on the road is encrypted so that no monitoring system can check the data. Moreover, Google only saw the end-point IP address, not yours. Thus, you’re browsing the internet with absolute anonymity. Tor hidden service is a server that’s only accessible to Tor network users. Thus, someone hosting a website can hide it from the surface web and no one can find it – in theory.</p>
<h2><strong>Deep web websites</strong></h2>
<p>Before we go deep into this section, I strongly recommend exercising caution. Some websites are really nasty and full of scams. We recommend you to stay out of browsing “.onion” websites unless you have A REALLY GOOD REASON. The websites are accessible by “the onion router”.</p>
<p>It’s an anonymizing computer network. It’s funded partially by the US government and designed for countries where internet access is banned or monitored. When you connect to the Tor network, only then you’re allowed to visit these sites. For example, Facebook has got its own “.onion” portal &#8211; <a href="https://facebookcorewwwi.onion">https://facebookcorewwwi.onion</a>. This is very useful if you’re in a country where Facebook’s banned.</p>
<h2><strong>How to access deep web sites?</strong></h2>
<p>In order to access, you need to configure Tor network and Tor browser in your system. Tor Browser is a modified version of Firefox that’s designed to connect Tor network.</p>
<p><a href="https://www.torproject.org/projects/torbrowser.html.en">Download the Tor Browser</a>. It’s available for Windows, Linux, and Mac. For Android devices, use their official <a href="https://play.google.com/store/apps/details?id=org.torproject.android">Orbot: Proxy with Tor</a> or <a href="https://play.google.com/store/apps/details?id=info.guardianproject.orfox&amp;hl=en">Orfox: Tor Browser for Android</a>. Unfortunately, there’s no official app for iOS.</p>
<p>After installing the Tor browser on your system, type the “.onion” address on the address bar. Let’s say, we’re going to Facebook via Tor.</p>
<ol>
<li>Enter the address: <a href="https://facebookcorewwwi.onion/">https://facebookcorewwwi.onion/</a></li>
<li>Hit “Enter”.</li>
</ol>
<p>Done! Very simple, right?</p>
<h2><strong>Don’t use proxies like Tor2Web</strong></h2>
<p>There’re several proxies that will let you connect with Tor network via their own VPN. It’s strongly not recommended. If you’re concerned about your privacy, this is a big “NO, NO”.</p>
<p>The reason for using Tor network is anonymity. Tor directly anonymizes your identity through their network system. When using the proxy, they’re easily able to tap into your data. Tor won’t be able to protect your anonymity in such condition.</p>
<h2><strong>Exercise caution!!!!</strong></h2>
<p>Tor is a good media for hiding your identity on the web. Hiding your identity isn’t illegal. However, beware that many “.onion” websites are really nasty and a lot of them are scams. This technique is good if you need to visit specific “.onion” site.</p>
<p>For normal users like you and me, “.onion” websites are of no use. Until you know what you’re doing, it’s the best to stay away from them.</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/access-onion-sites/">How to Access .onion Sites</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/access-onion-sites/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
