WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2026 Poal.co

531

(post is archived)

[–] 2 pts

This is a deepweb bunker I made for Voat on Zeronet. http://127.0.0.1:43110/17UQMKMwdYqptM3nzeNqdXs31X3UvN8yHg/

I wanted to make it a central hub where people can coordinate migrations. There is also ZeroVoat which is linked in the top bar.

You'll need the ZeroNet app to access it.

[–] 1 pt

Its on the loopback adapter for your system. What does it proxy to? You should be able to bypass an app. I don't trust an app to be doing that shit for me.

Oh what's this? It sends a copy of everything I write as a direct email to the feds? Its another fucking tactic to collect data, they have many of them, I'd like to not give them another.

[–] 1 pt

Its a peer to peer web socket app, it loops back to yourself because you act as a host for any site you visit. Nothing on it is encrypted but it uses tor exit nodes to conceal your IP address.

[–] 0 pt

Utilizing a websocket proxy on the loopback doesn't mean you host anything, it just means that you access the content via a locally 'hosted' reverse proxy. At best it is operating a local web cache to keep you from downloading the same content more than once per whatever interval is set on the content.

Exiting over tor is cool, is there a way to 'see' it doing this, or would I need to be running an upstream layer-7 inspection service to validate the requests are not leaking out further than expected?

[–] 0 pt

Zeronet isn't secure. Your IP is shared globally.