Chapter 6

Tor Hidden Services

One natural by-product of creating an anonymization network protocol like that used by Tor is that it makes it possible for a node that exists on the network to act not just as a client (e.g., for browsing websites on the public Internet anonymously) but also to act as a server. A server that can be accessed by other clients within the anonymity network, while the actual location (IP address) of the server remains anonymous.

When using Tor to maintain anonymity as a client while accessing the global Internet, the Tor network itself (comprising all those systems set up to act as Tor relays) functions (for the user) like a simple network proxy.

The user in those cases doesn’t access anything connected to the Tor ...

Get Practical Anonymity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.