{{Header}} {{#seo: |description=Anonymous Hosting, Comparison Table of Tor Onion Services, VPN with Remote Port Forwarding, PageKite and Anonymous Third-Party Web Hosting Providers |image=Deep-web-1106648640.jpg }} [[File:Deep-web-1106648640.jpg|thumb]]
* [[Onion Services]] * [[Hosting Location Hidden Services]]
{{intro| Anonymous Hosting, Comparison Table of Tor Onion Services, VPN with Remote Port Forwarding, PageKite and Anonymous Third-Party Web Hosting Providers }} = Introduction = This page discusses and compares different hosting options that utilize location/IP hidden servers. It is possible to host anonymous services such as websites either: * {{IconSet|h2|A}} at home using Tor [[Onion Services]]; * {{IconSet|h2|B}} on servers you physically own; or * {{IconSet|h2|C}} using (free) services provided by third parties, such as free .onion web space, VPS servers, and other web space. The five most common methods of running location-hidden servers include: * {{IconSet|h4|A}} Tor Onion Services, * {{IconSet|h4|B}} using a VPN provider with remote port forwarding, * {{IconSet|h4|C}} local host tunneling such as [https://pagekite.net/ PageKite] (which makes your local host a server), * {{IconSet|h4|D}} .onion webspace, and via anonymous third-party web hosting providers. An overview of these methods and a comparison table are provided below. Readers who are unsure of which method to use are recommended to review Tor [[Onion Services]], since they are the easiest to configure and provide the strongest anonymity. = Anonymous Hosting Overview = == Tor Onion Services == One way to host a location hidden service is Tor Onion Services. Onion Services provide a number of benefits. First, they are censor-resistant, which means that nobody can take the .onion domain offline unless they compromise the host and/or successfully perform a flood attack. See [https://github.com/Attacks-on-Tor/Attacks-on-Tor Thirteen years of Tor Attacks] for a description of flood and other attacks against Tor. In addition, Onion Services are accessible over tor2web via HTTP, although this is not as censor-resistant as the .onion domain itself. (Are there still functional tor2web instances nowadays?) Onion Services are free and do not require any registration to run (no sign-up is required). Further, they do not require any additional software other than the server software that will be run anonymously. Onion Services are flexible insofar as they can easily be run at home, on any server physically owned, or on (anonymous) third-party web hosting providers. Here is in context of {{project_name_short}} how Tor Onion Services could be used for the purpose of hosting a location hidden service. {{IconSet|h1|1}} Read the [[Onion Services]] documentation. * Instructions: Refer to [[Onion Services]] for full setup instructions. {{IconSet|h1|2}} Decide where to run the Onion Service. * Self-hosted at home: Run the service on your own hardware. * VPS hosting: Run the service on a Virtual Private Server in a cloud provider. You don't own the hardware and it's shared with others in a virtualized environment, all your encryption keys and information is accessible to the provider without physically touching the hardware. * Bare-metal server: Run the service on a server you physically own or rent in a cloud provider. {{IconSet|h1|3}} Install the server software inside {{project_name_workstation_short}}. * Web server: For example, a web server such as lighttpd. * Other services: Onion Services can also publish non-web services. {{IconSet|h1|4}} Configure Tor on {{project_name_gateway_short}}. * Configuration: Use the documented Onion Service configuration method from [[Onion Services]]. {{IconSet|h1|5}} Test reachability over .onion. * Verification: Confirm that the service is reachable using the generated .onion address. {{IconSet|h1|6}} Done. Notes: * No registration: Onion Services do not require a sign-up. * No anonymous money: Onion Services are free to run. * Visitor requirements: Visitors generally need Tor to access the .onion address. * Server security: If an adversary compromises the host or the server software, this can have serious consequences. See [[Onion Services]] for guidance and further reading. There are also alternatives to Tor Onion Services. == VPN with Remote Port Forwarding == Hosting location hidden services is not exclusive to Tor Onion Services. Using a VPN with Remote Port Forwarding is a totally different method. Here is in context of {{project_name_short}} how a VPN with remote port forwarding could be used for the purpose of hosting a location hidden service. {{IconSet|h1|1}} Get [[Money|anonymous money]]. {{IconSet|h1|2}} Purchase a VPN that supports both remote port forwarding and TCP. * Why not UDP? See [[Tor#UDP|Tor, UDP]]. * Which VPN? [[Undocumented]]. {{IconSet|h1|3}} Install the VPN inside {{project_name_workstation_short}}. {{IconSet|h1|4}} Open a remote port using the VPN software configuration. {{IconSet|h1|5}} Install the server software inside {{project_name_workstation_short}}. {{IconSet|h1|6}} Done. The server software should now be reachable on the IP and port provided by the VPN. Notes: * Public IP address: Provided by the VPN provider. * Incoming port: Provided by the VPN provider. * Tor configuration: Not required for this method. This is because the incoming port would be provided by the VPN and not by Tor. * Home router port opening: Not required. Reconfiguring the user's home router for this purpose is discouraged. The level of censorship resistance afforded by VPNs depends on the specific provider used. While services will be reachable by a wider audience (clients) because Tor is not required, there are probably no free VPN services that provide [https://security.stackexchange.com/questions/16627/does-portforwarding-present-a-risk-to-anonymity Remote Port Forwarding]. Unlike Onion Services, registration/sign-up is very likely required, which is a challenge to maintaining anonymity. On the upside, this configuration can be run at home, on any server physically owned, or on (anonymous) third-party web hosting providers. == PageKite == [https://pagekite.net/ PageKite] is another alternative service that has been tested inside {{project_name_workstation_long}}, and it is functional out of the box (although it is less tested by {{project_name_long}} developers). PageKite is a subscription-based service, but it is free for Free Software authors; an application for a free account is required. Further, it is necessary to comply with the [https://pagekite.net/humans.txt PageKite terms of service], register, and provide an (anonymous) [[E-Mail]] address. Here is in context of {{project_name_short}} how PageKite could be used for the purpose of hosting a location hidden service. {{IconSet|h1|1}} Decide whether [[Money|anonymous money]] is required. * Free account: PageKite is free for Free Software authors, but an application for a free account is required. * Paid subscription: If using a paid subscription, obtain [[Money|anonymous money]] first. {{IconSet|h1|2}} Create a PageKite account and choose how the service will be addressed. * PageKite domain: Use a PageKite-provided domain / subdomain (subject to PageKite policies and legislation). * Own domain: Use your own domain, if desired. https://pagekite.net/wiki/Howto/CnamePageKites/ {{IconSet|h1|3}} Install PageKite inside {{project_name_workstation_short}}. {{IconSet|h1|4}} Install and configure the server software inside {{project_name_workstation_short}}. * Local service: Ensure the web server (or other server software) is reachable locally on the intended IP address and port. {{IconSet|h1|5}} Configure PageKite to publish the local service. * Mapping: Configure PageKite to forward incoming connections to the local IP address and port used by the server software. {{IconSet|h1|6}} Start PageKite and verify external reachability. * Test: Confirm that the service is reachable using the PageKite-provided address (or your own domain, if configured). Besides this entry, there is no documentation for pairing PageKite with {{project_name_short}}. However, it is relatively simple to use, and their service is well-documented; see [https://pagekite.net/wiki/Howto/PageKiteOverTor/ Running PageKite over Tor] and the footnotes. * Instead of localhost, it is possible to use the {{project_name_gateway_long}} IP 10.152.152.10 and a custom port such as 9159, that is, replace --torify=localhost:9050 with --torify=10.152.152.10:9159. * Alternatively, the --torify switch can be dropped and the default PageKite GNU/Linux tutorial instructions followed, since "misc traffic" in {{project_name_workstation_short}} is automatically routed through Tor's TransPort. * See [[Stream Isolation]] for an explanation of "misc traffic", custom SocksPorts, and Tor's TransPort in {{project_name_short}}. Notes: * Tor requirement: PageKite can provide a clearnet reachable service without requiring visitors to use Tor. * Tor routing option: PageKite can optionally be used over Tor; see [https://pagekite.net/wiki/Howto/PageKiteOverTor/ Running PageKite over Tor] and [[Stream Isolation]]. * Registration requirement: Registration is required (including an (anonymous) [[E-Mail]] address), which is a challenge to maintaining anonymity. * Online requirement: The service is only reachable while the local server and PageKite client are running. == Anonymous Web Third-Party Hosting Providers == {{Contributor| |status=stable |about=About this Anonymous Third Party Hosts wiki chapter |difficulty=medium |contributor=[https://forums.{{project_clearnet}}/users/FranklyFlawless FranklyFlawless] |support=[[KVM/Support|Community support only!]] /
[https://forums.whonix.org/t/list-of-hosting-providers-that-accept-cryptocurrencies-as-payment/8502 List of Hosting Providers That
Accept Cryptocurrencies as Payment] }} {{Vspacer|vmargin=-15}} {{IntroLike| There are many so-called offshore or anonymous web hosting companies. Most of these hosting companies do not really offer anonymity because they usually require valid registration data (real name, etc.), forbid registration over Tor, and/or do not offer anonymous payment methods. The ones listed in the following table are Tor user-friendly, accept anonymous registration, and can be paid anonymously using various cryptocurrencies (including stablecoins). }} {{Community Support|scope=chapter}} {{mbox | type = notice | image = [[File:Ambox_notice.png|40px|alt=Info]] | text = Also note: * There are some free .onion web hosting services, as well as paid ones. * Anonymous VPS servers also exist, but none are free; this necessitates the use of [[Money|anonymous money]]. }} {{mbox | image = [[File:Ambox_warning_pn.svg.png|40px]] | text = '''Warning:''' The {{project_name_short}} project does not vet or endorse any of these services. No guarantees are made regarding their trustworthiness, reliability, or policies. '''Disclaimer:''' This list is community-maintained and does not reflect the views or recommendations of the {{project_name_short}} team. {{project_name_short}} does not investigate, verify, or endorse any of these services. Users are encouraged to do their own due diligence before engaging with any provider. Use at your own risk. [[Transparency#Third-Party_Policies|Third-Party Policies]] and [[Terms_of_Service#Non-Endorsement|Non-Endorsement]] apply! See also [[Transparency|project transparency]]. }} {| class="wikitable" |+ Anonymous Web Third-Party Hosting Providers |- ! Name !! Requirement(s) !! Cryptocurrencies !! Last Updated |- | {{ExtLink |text=1984 |https://1984.hosting }} | * Email address * JavaScript | * Bitcoin * Monero | February 26 2026 |- | {{ExtLink |text=Cloudzy |https://cloudzy.com }} | * Email address * "Full name" * JavaScript | * Bitcoin * Litecoin | February 26 2026 |- | {{ExtLink |text=Cockbox |https://cockbox.org |http://dwtqmjzvn2c6z2x462mmbd34ugjjrodowtul4jfbkexjuttzaqzcjyad.onion }} | * Email address | * Bitcoin * Monero | February 26 2026 |- | {{ExtLink |text=IncogNET |https://incognet.io |http://incoghostm2dytlqdiaj3lmtn7x2l5gb76jhabb6ywbqhjfzcoqq6aad.onion }} | * Email address * JavaScript | * Bitcoin * Dogecoin * Litecoin * Monero | February 26 2026 |- | {{ExtLink |text=Kyun |https://kyun.sh |http://kyunnnckhnkl6oevonhwbltenwbgxwxf54mcpvmicphmaeqr5ourgqyd.onion }} | * JavaScript | * Monero | February 26 2026 |- | {{ExtLink |text=Mynymbox |https://mynymbox.io |http://mynymecyaiv7t55qiggp76rzqz35si5g7nzdh3yci4wiqbmlwqg7xeyd.onion }} | * Email address * JavaScript | * Bitcoin (Lightning) * Litecoin * Monero | February 26 2026 |- | {{ExtLink |text=NiceVPS |https://nicevps.net |https://nicevpsvzo5o6mtvvdiurhkemnv7335f74tjk42rseoj7zdnqy44mnqd.onion }} | * JavaScript | * Bitcoin * Dash * Ethereum * Litecoin * Monero * Tether (on the Ethereum blockchain) * Zcash | February 26 2026 |- | {{ExtLink |text=Njalla |https://njal.la |https://njallalafimoej5i4eg7vlnqjvmb6zhdh27qxcatdn647jtwwwui3nad.onion }} | * Email or XMPP address * JavaScript * SSH Key | * Bitcoin * Ethereum * Litecoin * Zcash | February 26 2026 |- | {{ExtLink |text=rdp.monster |https://rdp.monster }} | * "Country" * Email address * JavaScript | * Tether (on the Tron blockchain) | February 26 2026 |- | {{ExtLink |text=Servers Guru |https://servers.guru }} | * Email address * JavaScript | * Binance Coin * Bitcoin * Bitcoin Cash * Ethereum * Litecoin * Monero * Tether (on the Ethereum, Polygon or Tron blockchain) * Tronix * USD Coin (on the Ethereum or Polygon blockchain) | February 26 2026 |- | {{ExtLink |text=SnowCore |https://snowcore.io }} | * JavaScript | * Bitcoin * Bitcoin Cash * Ethereum * Litecoin * Monero * Solana * Tether (on the Binance Smart Chain, Ethereum, Solana, or Tron blockchain) * USD Coin (on the Ethereum or Solana blockchain) | February 26 2026 |- | {{ExtLink |text=SporeStack |https://sporestack.com |http://spore64i5sofqlfz5gq2ju4msgzojjwifls7rok2cti624zyq3fcelad.onion }} | * JavaScript | * Bitcoin * Bitcoin Cash * Monero | February 26 2026 |- | {{ExtLink |text=VPSBG.eu |https://www.vpsbg.eu }} | * "Country" * Email address * "Full Name" * JavaScript | * Bitcoin (Lightning) | February 26 2026 |- |} Forum discussion: [https://forums.whonix.org/t/list-of-hosting-providers-that-accept-cryptocurrencies-as-payment/8502 List of Hosting Providers That Accept Cryptocurrencies as Payment] = onion Webspace = Third-party hosts offering free or paid onion webspace. No research has been done if this still exists. [[Undocumented]]. = Comparison Table = {| class="wikitable" |+ Hosting Configuration Comparison |- | ! [[#Tor_Onion_Services|Tor Onion Services]] ! [[#VPN_with_Remote_Port_Forwarding|VPN with Remote Port Forwarding]] ! [[#PageKite|PageKite]] ! [[#onion_Webspace|.onion Webspace]] ! [[#Anonymous_Web_Third-Party_Hosting_Providers|Anonymous Third-Party Web Hosting Providers]] |- ! Accessible over clearnet http(s) | style="background-color: {{Yellow}}"| tor2web only | {{Yes}} | {{Yes}} | style="background-color: {{Yellow}}"| tor2web only | {{Yes}} Yes, if you buy a domain. |- ! Accessible over Tor .onion | {{Yes}} | {{No}} | {{No}} | {{Yes}} | {{Yes}}, if Tor is installed. |- ! Attack against server software (lighttpd, etc.) | {{Fail}} Fail - it would deanonymize you. | {{Fail}} Fail - it would deanonymize you. | {{Fail}} Fail - it would deanonymize you. | {{Safe}} Safe - you are still anonymous. The domain may be lost. | {{Safe}} Safe - you are still anonymous. The domain may be lost. |- ! Attack against Tor (onion services) | {{Fail}} Fail - it would deanonymize you. | {{Fail}} Fail - it would deanonymize you. | {{Fail}} Fail - it would deanonymize you. | {{Safe}} Safe - you are still anonymous. The domain may be lost. | {{Safe}} Safe - you are still anonymous. The domain may be lost. |- ! Clearnet domain censor resistance | style="background-color: {{Red}}"| Depends on tor2web legislation. | style="background-color: {{Red}}"| Depends on domain registrar legislation. | style="background-color: {{Red}}"| * When using PageKite domain: Depends on PageKite legislation. * When using own domain https://pagekite.net/wiki/Howto/CnamePageKites/: Depends on domain registrar legislation. | style="background-color: {{Red}}"| Depends on tor2web legislation. | style="background-color: {{Red}}"| Depends on anonymous third-party web hosting provider's legislation. |- ! No anonymous money required | {{Yes}} | {{No}} (?) | style="background-color: {{Blue}}"| Depends | style="background-color: {{Blue}}"| Depends | {{No}} |- ! No need to register | {{Yes}} | {{No}} | {{No}} | {{No}} | {{No}} |- ! .onion domain censor resistance | style="background-color: {{Green}}"| Highest | style="background-color: {{Blue}}"| There is no .onion domain. | style="background-color: {{Blue}}"| There is no .onion domain. | style="background-color: {{Red}}"| Depends on .onion webspace host. The administrator can and will most likely see what users are doing on their server and decide accordingly. | style="background-color: {{Red}}"| Depends on anonymous third-party web hosting provider. The administrator can and will most likely see what users are doing on their server and decide accordingly. |- ! Online, when you are offline | {{No}}, only online as long as your server is online. | {{No}}, only online as long as your server is online. | {{No}}, only online as long as your server is online. | {{Yes}} Besides server downtime, in which case you can do nothing but wait until the host has fixed it. | {{Yes}} Besides server downtime, in which case you can do nothing but wait until the host has fixed it. |- ! Price | style="background-color: {{Green}}"| Free | style="background-color: {{Red}}"| Paid only (?) | style="background-color: {{Blue}}"| Depends | style="background-color: {{Blue}}"| Some are free | style="background-color: {{Red}}"| Paid only |- ! Server administrator cannot take away the clearnet domain. | {{No}}, tor2web can. They must do so, if they are forced by legislation or other reasons. | {{Yes}} | style="background-color: {{Blue}}"| Depends. * Domain by PageKite: No They must do so, if they are forced by legislation or other reasons. * Own domain: Yes | {{No}}, tor2web can. They must do so, if they are forced by legislation or other reasons. | {{No}} They must do so, if they are forced by legislation or other reasons. |- ! Server administrator cannot take away the .onion domain | {{Yes}}, you are the administrator. | style="background-color: {{Blue}}"| There is no .onion domain. | style="background-color: {{Blue}}"| There is no .onion domain. | {{No}}, they must have private keys for .onion domain to make the service work. | {{No}} |- ! Services other than web | {{Yes}} | {{Yes}} | {{Yes}} | {{No}} | {{Yes}} |- ! No port forwarding configuration in home router required | {{Yes}} | {{Yes}} | {{Yes}} | {{Yes}} | {{Yes}} |- ! Further reading | [[Onion Services|Tor Onion Services]] | - | [https://pagekite.net/ PageKite] | - | - |- |} = Conclusion = Based on the preceding overview and comparison table, each method of running location-hidden servers has both advantages and disadvantages. Tor Onion Services provide the greatest number of advantages. It is unnecessary to learn about and obtain anonymous money, which is a difficult endeavor on its own. Further, trust is not placed in third parties; you only need to rely on your own skills to set up a server. Also, nobody can censor the server, and there is no registration or limiting terms of service. On the downside, if an adversary compromises the onion service, it is game over. This can occur via a successful attack against Tor Onion Services, the server software, or by breaking out of {{project_name_short}}. Onion Services are also only accessible over .onion (visitors need Tor), and tor2web is not indexed by search engines. Finally, Tor onion services are only online as long as the server is online. In comparison, a free (or paid) .onion webspace host can steal the domain at any time and take it over. On the other hand, it is unnecessary to worry about server security, and successful attacks against the Tor onion service will not lead to your location or IP address. Finally, anonymous third-party web hosting providers involve anonymous money, which is difficult on its own. However, they can provide clearnet domains and/or the service can be used to host Tor onion services. Also, there is no concern about server security, and successful attacks against Tor onion services will not lead to your location or IP address. = See Also = * [[Money|Anonymous Money]] * [[Onion_Services|Onion Services]] * [[Onion_Services_Guides|Onion Services Guides]] * [[Surfing Posting Blogging|Surfing Blogging Posting]] = References = {{reflist|close=1}} {{Footer}} [[Category:Documentation]]