This is a deepweb bunker I made for Voat on Zeronet. http://127.0.0.1:43110/17UQMKMwdYqptM3nzeNqdXs31X3UvN8yHg/
I wanted to make it a central hub where people can coordinate migrations. There is also ZeroVoat which is linked in the top bar.
You'll need the ZeroNet app to access it.
Its on the loopback adapter for your system. What does it proxy to? You should be able to bypass an app. I don't trust an app to be doing that shit for me.
Oh what's this? It sends a copy of everything I write as a direct email to the feds? Its another fucking tactic to collect data, they have many of them, I'd like to not give them another.
Its a peer to peer web socket app, it loops back to yourself because you act as a host for any site you visit. Nothing on it is encrypted but it uses tor exit nodes to conceal your IP address.
Utilizing a websocket proxy on the loopback doesn't mean you host anything, it just means that you access the content via a locally 'hosted' reverse proxy. At best it is operating a local web cache to keep you from downloading the same content more than once per whatever interval is set on the content.
Exiting over tor is cool, is there a way to 'see' it doing this, or would I need to be running an upstream layer-7 inspection service to validate the requests are not leaking out further than expected?
Zeronet isn't secure. Your IP is shared globally.
(post is archived)