Skip to main content

Using Tor - from a developer's point of view

People use Tor for various reasons these days. Journalists use them to accept whisleblower submissions, people with restricted internet access use it to jump those blockades, people with concerns about their privacy use it, people with bad intensions use it for obvious reasons etc. Tor has around 2 million users per month and today, in this post, I want to tell you how I, as a (student) developer, use Tor.

There is an awesome feature in Tor called Hidden Services where Tor provides anonymity to the servers hosting a website. Tor provides you with an .onion address (just like .com or .in domain) after the Hidden Service is set up. Tor Hidden Services can also function behind a Firewall or NAT which means, if you have a website running on localhost of your machine, then you can start a Hidden Service and serve the same website on Tor and anybody on Tor can visit it even if your machine is behind a NAT and has a private IP address. I wanted to expose the website running on my local network to the external internet and didn’t wanted to use services like ngrok or online hosting like 000webhost. I took advantage of Hidden Service feature by hosting my project (website) on Tor and shared the .onion address with a few friends to test it out. Of course, in order to access my Hidden Service, my friends had to open the onion address in a Tor Browser. Tor Hidden Service gives anyone the power to host their own websites for free and make them accessible worldwide instantly!

I also wanted to embed Tor into Android apps so that they can connect to my Hidden Service. After struggling for a few days to find suitable libraries, I finally succeeded in finding one (I have forked it to my account. You can take a look at it here). You can create truly decentralized apps if you start a Hidden Service from your app (so that it acts as a server and a client at the same time) and make other instances of your app communicate using each others’ .onion addresses. Here is one desktop app that does it.

There are endless possiblities of what you can do with Tor as a developer. But, you may say that it is very complicated to setup a Hidden Service. Well, it was. I was able to setup my Hidden Service within minutes using Docker. For example, if you already have Docker and Docker-Compose installed on your (Linux) system, then just create a docker-compose.yml file in any directory and put the following into it:

Now, just open the terminal in that directory and run docker-compose up. You will have a complete ready-to-use LAMP stack and you will get a Tor Hidden Service link (.onion address) printed in your terminal as well. It cannot get more easier than that! Let me know your thoughts on this.

Thanks for reading.

Comments

Popular posts from this blog

How did I setup a Rasberry Pi 3 without any peripherals

I am an absolute beginner in this Raspberry Pi (I'll be using "RPi" for short) world and this post shows how I started up the RPi without using external keyboard or mouse (for RPi) and still managed to get a graphical desktop environment of Raspbian on my Debian workstation (and controlled my RPi remotely). Step 1: I downloaded 'Raspbian Stretch with Desktop' ( here ). I got a ZIP file. I unzipped it and ended up with a .img which was roughly 4.6 GB. Step 2: Now, to create a bootable media (a memory card perhaps) by copying the .img file onto it, I used dd command. sudo dd if=<path to img> of=/dev/<sdb,sdc..> Be particularly careful with using dd command. You can mess up a lot of things. Using dd command on your memory card will wipe out all contents in it. Using dd command on your hard disk, umm.. not a good idea. To know the disk path of your memory card, use sudo fdisk -l  (el in small caps) . Your hard disk will probably be /dev/sda. You...

How are Bitcoins mined?

The image below is an example of the screen that appears when your Bitcoins have been sent. There is some text in roughly red marked area in that image saying “0.00022368 BTC" as a transaction fee to miners. In order to understand how Bitcoins are mined and why you should pay that transaction fee to miners, read this whole article! Whenever you start your transaction, there will be a transaction request (i.e. digitally signed message which is carrying your bitcoins) created and it is sent to the miners. Now, I have created a scenario in order to explain the mining process! The words in bold text will have a special significance and will help us to corelate with the actual Bitcoin terminologies later on. Imagine your transaction request as a letter ( or a courier). Miners collect your letter and put them in a machine . Just like yours’, there might be thousands of such letters from people all around the world! They collect all these and put them in the same mach...

My-Cloud-IDE - a SaaS built using Docker

I always wanted to know about how services like Codenvy  and Heroku  internally worked. The only way to understand that was to build a similar project. The main component of this project is Docker. Docker  Docker is a software that performs OS-level virtualisation and is developed for Linux. More information about it can be found here . About My-Cloud-IDE: My-Cloud-IDE is a proof-of-concept for a Software as a Service (SaaS). It   can be used to perform software development on cloud without worrying about resolving software dependencies, software installations etc. The user gets a fully functional IDE in his/her browser after registration. Each user has his/her own isolated software environment because My-Cloud-IDE uses Docker to perform OS-level virtualisation in the backend. Technical Details I divided the project into two modules. One module was for 'management' purpose. This includes user interfaces, user management and preparing some files that a...