fix .onion img src

This commit is contained in:
anarsec 2024-04-14 22:16:58 +00:00
parent ec6fb8110b
commit 7e7fbd3bc1
No known key found for this signature in database
8 changed files with 54 additions and 49 deletions

View file

@ -33,7 +33,7 @@ There are other operating systems. Maybe you have heard of Linux? Linux refers t
* ***Incognito***
* Tails is also a system that allows you to be incognito, or anonymous. It hides the elements that could reveal your identity, location, etc. Tails uses the [Tor anonymity network](/glossary#tor-network) to protect your anonymity online by forcing all default software to connect to the Internet through Tor. If an application tries to connect to the Internet directly, Tails will automatically block the connection. Tails also changes the "MAC address" of your network hardware, which can be used to uniquely identify your laptop.
![](tor-features.png)
![](/posts/tails/tor-features.png)
* ***Security***
* Tails was designed with security in mind. A minimal, functional, and verified environment is already installed (with everything needed for basic word processing, image editing, etc.). It comes bundled with easy-to-use [encryption](/glossary/#encryption) and data deletion tools, as well as protection against common attacks or threats.
@ -89,11 +89,11 @@ There are two solutions for the "source".
Once you have a Tails USB, follow the Tails instructions [for booting Tails on a Mac or PC](https://tails.net/doc/first_steps/start/index.en.html). The Tails USB must be inserted before turning on your laptop. The Boot Loader screen will appear and Tails will start automatically after 4 seconds.
![](grub.png)
![](/posts/tails/grub.png)
After about 30 seconds of loading, the [Welcome Screen](https://tails.net/doc/first_steps/welcome_screen/index.en.html) will appear.
![](welcome_screen.png)
![](/posts/tails/welcome_screen.png)
On the Welcome Screen, select your language and keyboard layout in the **Language & Region** section. For Mac users, there is a keyboard layout for Macintosh. Under "Additional Settings" you will find a **+** button, click it and more configuration options will appear:
@ -110,7 +110,7 @@ If you have Persistent Storage enabled, the passphrase to unlock it will appear
## Using the Tails Desktop
![](desktop-label.png)
![](/posts/tails/desktop-label.png)
Tails is a classic and simple operating system.
@ -172,7 +172,7 @@ In order for Tails to remain secure, the operating system must be continually de
Every time you start Tails, right after you connect to the Tor network, the Tails Upgrader checks to see if you have the latest version of Tails. There are two types of upgrades.
![](upgrader_automatic.png)
![](/posts/tails/upgrader_automatic.png)
### The [automatic upgrade](https://tails.net/doc/upgrade/index.en.html)
@ -190,11 +190,11 @@ Every time you start Tails, right after you connect to the Tor network, the Tail
[Tor](/glossary/#tor-network), which stands for The Onion Router, is the best way to be anonymous on the Internet. Tor is open-source software connected to a public network of thousands of relays (servers). Instead of connecting directly to a location on the Internet, Tor takes a detour through three intermediate relays. The Tor Browser uses the Tor network, but other applications can as well if they are configured properly. All internet-facing applications included in Tails by default use Tor.
![](tor.png)
![](/posts/tails/tor.png)
Internet traffic, including the IP address of the final destination, is encrypted in layers like an onion. Each hop along the three relays removes one layer of encryption. Each relay only knows the relay before it and the relay after it (relay #3 knows that it came from relay #2 and that it goes to such-and-such a website, but not relay #1).
![See *anarsec.guide* for the animation.](anonymous-browsing.gif)
![See *anarsec.guide* for the animation.](/posts/tails/anonymous-browsing.gif)
This means that any intermediaries between you and relay #1 know that you're using Tor, but they don't know what site you're going to. Any intermediaries after relay #3 know that someone in the world is going to that site, but they don't know who it is. The site's web server sees you coming from the IP address of relay #3.
@ -206,7 +206,7 @@ Virtually all websites today use [HTTPS](/glossary/#https); the S stands for "se
If there's a yellow warning on the padlock, it means that some elements on the page you're viewing are not encrypted (they use HTTP), which could reveal the exact page or allow intermediaries to partially modify the page. By default, the Tor Browser uses HTTPS-Only Mode to prevent users from visiting HTTP sites.
![](http.png)
![](/posts/tails/http.png)
HTTPS is essential both to limit your web fingerprint and to prevent an intermediary from modifying the data you exchange with websites. If the intermediary cannot decrypt the data, they cannot modify it. For an overview of HTTP / HTTPS connections with and without Tor, and what information is visible to various third parties, see the EFF's [interactive graphic](https://www.eff.org/pages/tor-and-https).
@ -216,7 +216,7 @@ In short, don't visit websites that don't use HTTPS.
Have you ever seen a strange website address with 56 random characters ending in .onion? This is called an onion service, and the only way to visit a website using such an address is to use the Tor Browser. The "deepweb" and "darkweb" are terms that have been popularized in the media in recent years to describe these onion services.
![](lead.webp)
![](/posts/tails/lead.webp)
Anyone can set up an .onion site. But why would they want to? Well, the server location is anonymized, so authorities cannot find out where the site is hosted in order to shut it down. When you send data to an .onion site, you enter the site's three Tor relays after the standard Tor circuit. So we have 6 Tor relays between us and the site; we know the first 3 relays, the site knows the last 3, and each Tor node only knows the relay before and after. Unlike a normal HTTPS website, it's all Tor encrypted from end to end.
@ -230,7 +230,7 @@ Some sites offer both a classic URL and an .onion address. In this case, if the
Some sites block users who visit through the Tor network, or otherwise make it inconvenient to visit the site. Some sites may force you to complete CAPTCHAs or provide additional personal information (ID, phone number…) before continuing, or they may block Tor altogether.
![](new_identity.png)
![](/posts/tails/new_identity.png)
The site may only block certain Tor relays. In this case, you can change the Tor exit node being used for this site: click the **≣ → "New Tor circuit for this site"** button. The Tor circuit (path) will only change for the one tab. You may need to do this several times in a row if you're unlucky enough to encounter multiple banned relays.
@ -242,13 +242,13 @@ It is not recommended to perform different Internet tasks that should not be ass
The Tor Browser's 'New Identity' feature is not sufficient to completely separate contextual identities in Tails, since it does not reestablish connections outside the Tor Browser, and you keep the same Tor entry node. Restarting Tails is a better solution.
![](onion-circuits.png)
![](/posts/tails/onion-circuits.png)
The Onion Circuits application shows which Tor circuit a server connection (website or otherwise) is using. Sometimes it can be useful to make sure that the exit relay is not located in a certain country, to be further away from the easiest access for investigating authorities. In the example above, the connection to check.torproject.org goes through the relays tor7kryptonit, Casper03, and the exit node blackfish. Clicking on a circuit will display technical details about its relays in the right pane. The Tor Browser's 'New Identity' feature is useful for changing this exit relay without restarting the Tails session, which can be repeated until you have an exit relay you are happy with. We do not recommend using 'New Identity' to switch between identities, but only if you want to change the exit node within the same identity's activities.
### Tor Browser security settings
![](safest.png)
![](/posts/tails/safest.png)
Like any software, the Tor Browser has vulnerabilities that can be exploited - various police agencies have Tor Browser exploits for serious cases. To mitigate this, it's important to keep Tails up to date, and you should increase the Tor Browser's security settings: click the shield icon, and then click **Settings...**. By default, it's set to Standard, which maintains a browsing experience comparable to a regular browser. **We strongly recommend that you set it to the most restrictive setting before you start browsing: Safest**. The vast majority of exploits against Tor Browser will not work with the Safest setting.
@ -262,7 +262,7 @@ The Tor Browser on Tails is kept in a ["sandbox"](/glossary/#sandboxing) to prev
When you download something using the Tor Browser, it is stored in the Tor Browser folder (`/home/amnesia/Tor Browser/`), which is inside the sandbox. If you want to do anything with the file, you should move it out of the Tor Browser folder. You can use the file manager (**Applications → Accessories → Files**) to do this.
![](nautilus.png)
![](/posts/tails/nautilus.png)
#### Uploading
@ -274,7 +274,7 @@ Be aware that if you are downloading or otherwise working with very large files,
### Share Files with Onionshare
![](onionshare.png)
![](/posts/tails/onionshare.png)
It is possible to send a document through an .onion link thanks to [OnionShare](https://tails.net/doc/anonymous_internet/onionshare/index.en.html) (**Applications → Internet → OnionShare**). By default, OnionShare stops the hidden service after the files have been downloaded once. If you want to offer the files for multiple downloads, you need to go to the settings and uncheck "Stop sharing after first download". As soon as you close OnionShare, disconnect from the Internet, or shut down Tails, the files will no longer be accessible. This is a great way to share files because it doesn't require you to plug a USB into someone else's computer, which we [don't recommended](/posts/tails-best/#reducing-risks-when-using-untrusted-computers). The long .onion address can be shared through another channel (such as a [Riseup Pad](https://pad.riseup.net/) you create that is easier to type).
@ -298,7 +298,7 @@ We recommend that you compartmentalize your passwords - have a different KeePass
>In the terminology used by KeePassXC, a *password* is a random sequence of characters (letters, numbers, and other symbols), while a *passphrase* is a random sequence of words.
![](seconds.png)
![](/posts/tails/seconds.png)
When you [create a new KeePassXC database](https://tails.net/doc/encryption_and_privacy/manage_passwords/index.en.html#index1h1), increase the decryption time in the **Encryption settings** window from the default to the maximum (5 seconds). Then choose a [strong passphrase](/posts/tails-best/#passwords) and save your KeePassXC file. We recommend that you click the small dice icon (🎲) in the password field to generate a random passphrase of 7-10 words.
@ -308,7 +308,7 @@ After creating the database itself, you should see an empty “Root” folder. I
You can now add your first entry. Click **Entries → New Entry**, or click the “plus” icon. Enter the title of the account, your username for the account, and your password. Click the “dice” icon to generate a random password or passphrase for the entry.
![](entry.png)
![](/posts/tails/entry.png)
To copy a password from the database, select the entry and press CTRL + C. To copy a username, select the entry and press CTRL + B.
@ -334,7 +334,7 @@ Store data only on encrypted drives. This is necessary if you want to use a sepa
* In the Partitioning drop-down list, select **Compatible with all systems and devices (MBR/DOS)** .
* Then click **Format…**
![](empty_device.png)
![](/posts/tails/empty_device.png)
* Now you need to add the encrypted partition.
* Click on the "**+**" button