Hidden Services, Current Events, and Freedom Hosting
A Hidden service is a server – often delivering web pages – that is reachable only through the Tor network. While most people know that the Tor network with its thousands of volunteer-run nodes provides anonymity for users who don´t want to be tracked and identified on the internet, the lesser-known hidden service feature of Tor provides anonymity also for the server operator.
Anyone can run hidden services, and many do. We use them internally at The Tor Project to offer our developers anonymous access to services such as SSH, IRC, HTTP, and our bug tracker. Other organizations run hidden services to protect dissidents, activists, and protect the anonymity of users trying to find help for suicide prevention, domestic violence, and abuse-recovery. Whistleblowers and journalists use hidden services to exchange information in a secure and anonymous way and publish critical information in a way that is not easily traced back to them. The New Yorker's Strongbox is one public example.
Hidden service addresses, aka the dot onion domain, are cryptographically and automatically generated by the tor software. They look like this http://idnxcnkne4qt76tg.onion/, which is our torproject.org website as a hidden service.
There is no central repository nor registry of addresses. The dot onion address is both the name and routing address for the services hosted at the dot onion. The Tor network uses the .onion-address to direct requests to the hidden server and route back the data from the hidden server to the anonymous user. The design of the Tor network ensures that the user can not know where the server is located and the server can not find out the IP-address of the user, except by intentional malicious means like hidden tracking code embedded in the web pages delivered by the server. Additionally, the design of the Tor network, which is run by thousands of volunteers, ensures that it is impossible to censor or block certain .onion-addresses.
them if we can.
As for now, one of multiple hidden service hosting companies appears to be down. There are lots of rumors and speculation as to what's happened. We're reading the same news and threads you are and don't have any insider information. We'll keep you updated as details become available.
EDIT: See our next blog post for more details about the attack.
In the USA, according to the 2nd and 9th amendments, everyone not in prison (see 13th amendment) ARE allowed to have guns, despite any supreme court decisions or state laws. This includes felons, wife beaters, etc.
The problem is that the courts are corrupt, politically motivates, tyrants.
You could try to fight the law in court, but you don't have enough money and even f you did they won't let you win/
You do not need to be a constitutional scholar to understand what is written there.
All laws are subordinate to the bill of rights. IF any law violates them then that law is unconstitutional.
The 9th amendment implies that our rights are subject to old common law - no right to kill, cheat, lie, maim, similar.
A right is not a right if you cannot freely exercise it with impunity.
Anything else is just a privilege.
If TOR used Quantum encryption or even 3 dimensional encryption, no one could decode the transmissions except the recipient of the transmission.
I recent read that the feds cracked HTTPS now. Even that is no longer a safe avenue.
"the Center for Constitutional Rights in New York"
Are you, by any chance, familiar with the radio program "Law and Disorder"?
"I've practiced at world class law firms, served two NYSE companies as a senior legal executive, and been an international entrepreneur."
Have you any regrets or moral qualms, at least about the latter two roles?
(I am fairly convinced that "socially responsible" or "ethical" corporation is an oxymoron.)