-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 darkweb-everywhere
"HTTPS Everywhere rulesets for hidden services and eepsites." https://github.com/chris-barry/darkweb-everywhere Just sharing it, because I thought it's an interesting follow up to our previous discussion "Using HTTPS Everywhere to redirect to .onion" here on tor-talk. I haven't looked closer into that project. fortasse: > Hello all, > > I am the web admin on the Whonix project (www.whonix.org / > kkkkkkkkkk63ava6.onion), where we serve the same wiki, blog, and > forums on both a .org and .onion, for censorship-resistance > purposes. > > Most web applications expect to "be" at one base URL, and generate > dynamic links based off the "known" location, which is usually > entered by hand during installation. That works great for most use > cases; but .onions are not a typical use case. > > While trying to come up with a way for the forum users to be able > to browse without having to manually edit the .org links into > .onion links, I threw together a HTTPS Everywhere user ruleset: > > <ruleset name="Whonix Onion"> <target host="www.whonix.org" /> > <target host="kkkkkkkkkk63ava6.onion" />7 <rule > from="^http(s)?://(www\.)?whonix\.org/" > to="http://kkkkkkkkkk63ava6.onion/"/> </ruleset> > > and it works beautifully. With this ruleset enabled, the user can > type in "whonix.org/forum" and the browser will actually make the > request for "http://kkkkkkkkkk63ava6.onion/forum". If the user > wants the .org version, they can toggle the ruleset off. > > My question is does this have more potential than being a weird > (rather effective) hack? Could we make an "onion Everywhere" as it > were to help solve the difficult-to-remember onion names? Or is > this just another layer of confusion that further increases the > barrier of entry on successful Tor use? > > It's a pretty simple idea, and I am open to any questions, > comments, or rude remarks. > > Thanks! > > ~~Fortasse > -----BEGIN PGP SIGNATURE----- iQJ8BAEBCgBmBQJTcqmrXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQ2RTk3OUIyOEE2RjM3QzQzQkUzMEFGQTFD QjhENTBCQjc3QkIzQzQ4AAoJEMuNULt3uzxIx0QP/2SCPDCVQPe4szj5rOkk42/g 7RhwGkur2F/GPK0R/ROqY2w1vH3uAC+H3eGASpJFHkSdFnVLscuvTJwhDWFp87/3 mQrB+6HJ6dIpDu9gG50HjnLJMNdB2o82TYG/BQCq8Aj3jLtFTI8b9NYZRnVm9g4d ZPOYzKZY+qCdE1nfloepF+nB4hfKbLWlct3WSKRi5I+0rbRAGY4LcSB3fYKNZkyv vQT46+mncwlNd4n/ZNWDFO9zRjMTnmZkuWeacQ0+YZ33ay7NzmiDJCpgoKu+tsPc 0ifqhIV/+o7n2t3BiWxLhUBBuiH0RO8+3C4KicKxZpTpjlngh4BaQw/NAwuzcFCQ VGg+/vhhX1WlPmrNPtEUpGeX4jfWwRM0Ct9AglQJVmfnk45FSm0Md4pZ7kH59FCw Y3F7RT5jUj/WDN6t8BkV4WBm+d9u7ppL+EEgWXx4ME8dQUZQgtbTLXZEV7ydYEWX wamUDvtTAX9yvcBgGO2UbqjOVXaXIxrA+ka6tDRav6NVhDdfaSKDWh3rTPDb4hYL Q11i7M7k7fhDO/tNB5OpLWnEHinKHHMcqXT5zeizu+5o+oQsdTRFXS3ic1zJprWl QtZREzfe1lV2N5bwZPSzShSllv0WlQkh1n4xjR4jNk1mb2SgaK+IY84z6jnJmm5B VRPH6HLkVgZoQG3zpgK7 =iBQi -----END PGP SIGNATURE----- -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk