On Tue, Aug 16, 2011 at 11:38:35AM -0400, te...@riseup.net wrote 2.6K bytes in 68 lines about: : Is there a reason for doing this over a hidden service instead of just : Tor? I use a hidden service to check if my home server is reachable, but : if I'm on a network I don't trust (which is most of them) I just connect : to things through Tor.
I do this because I don't want to have to trust the exit node, the isp of the exit node, and the networks between the exit node and the destination. I use tor for lots of stuff, banking, general browsing, etc. But checking my email, ssh access, and such I do via hidden service so, in theory, no one knows what I'm doing. For clarity, every server I access has a hidden service setup in torrc, like so: HiddenServiceDir /usr/local/var/lib/tor/hidden/ssh/ HiddenServicePort 22 127.0.0.1:22 HiddenServiceDir /usr/local/var/lib/tor/hidden/web/ HiddenServicePort 80 127.0.0.1:80 HiddenServiceDir /usr/local/var/lib/tor/hidden/imaps/ HiddenServicePort 995 127.0.0.1:995 and so on for each different service. Some hosts have 10 different hidden services on them. I've been doing this for years. It lets me keep a simple deny all incoming firewall, and not have to worry about NAT and such. Hidden services just work and are globally accessible. -- Andrew pgp key: 0x74ED336B _______________________________________________ tor-talk mailing list tor-talk@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk