>>3215
>Suggests a Tor hidden service, I haven't looked into this, but would this not mean your website is inaccessible to clearnet users?
I only suggested running an onion site since it is a realistic way for a person with zero resources to run a website. The larger your audience, the more it's going to cost to run a service for them. If you need clearnet people to access an onion site, there are free web proxies that MITM an onion site to allow clearnet users to access it.
With a quick search, I found this example:
https://onion.pet/ . Onion sites are actually the biggest thing I like about tor. These days everyone uses huge monolithic services, but onion sites allow anyone to host a site from their own bedroom. At least in theory. In practice there are very few onion sites worth visiting.
>Secondly I don't entirely understand the anonymity aspect. Tor BROWSER suggests to not modify anything, keep it out of full screen, etc. I understand this, because you don't stand out. But then there's people who wrap their entire systems in the Tor network, or OS's that do it like Tails (I think it was tails? One of the distros does by default). How does this not massively make someone stand out?
I actually don't know how the tor client works exactly, but I would hope that every program that uses tor would get separate paths through the tor network. If a same path is used by different programs connecting to the same destination, then indeed that would be bad for anonymity. However, TorBrowser doesn't actually use the system's tor client, but it comes with its own tor client. As a result, this shouldn't be a problem, if we ignore timing attacks.
The approach I take to anonymity is that I see it as a gradient rather than as a binary value. Even if I'm not getting good anonymity every time I go online, it's still better than never being anonymous. If your threat model is different, for example, if you're trying to build your own wikileaks, then I wouldn't trust Tor to be anonymous enough for that. The reality is that I'm running a bloated OS written in an unsafe language dating back to 1970s, on hardware that has NSA backdoors, running not so great implementations of bloated protocols and standards. I cannot really expect perfect privacy, security, or anonymity, while still using the internet. If I can just make the enemy's life more difficult, then I have succeeded.