{"id":585,"date":"2025-02-04T16:05:39","date_gmt":"2025-02-04T13:05:39","guid":{"rendered":"https:\/\/trustcrypt.com\/?p=585"},"modified":"2025-02-04T16:40:09","modified_gmt":"2025-02-04T13:40:09","slug":"how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet","status":"publish","type":"post","link":"https:\/\/trustcrypt.com\/ar\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/","title":{"rendered":"How to Hide Your Service from Prying Eyes (Using Tor as a Tunnel to the Open Internet)"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Introduction<\/h3>\n\n\n\n<p>At Trustcrypt, we understand that privacy and resilience against unwanted attention are crucial when hosting services online. Whether you run a web app, a gaming server, or any other type of online service, ensuring anonymity and uninterrupted availability can be a top priority.<\/p>\n\n\n\n<p>This article introduces TORTCB (Tor TCP Chain Balancer) \u2013 a handy solution that sets up multiple Tor hidden services, then balances incoming traffic across them. The project is open-source on <a href=\"https:\/\/github.com\/keklick1337\/tortcb\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub<\/a>. Below, we explain what it does, why it might be useful, and how you can set it up.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why Hide Your Service?<\/h3>\n\n\n\n<p>Tor can do a lot for you:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Provide anonymity:<\/strong> When a server is placed behind a <code>.onion<\/code> address, its real IP and physical location remain hidden.<\/li><li><strong>Streamline access without public IPs:<\/strong> No need for manual port forwarding or obtaining a public IP address.<\/li><li><strong>Protect privacy:<\/strong> Only you know your server\u2019s real IP. Externally, only the <code>.onion<\/code> address is visible.<\/li><\/ul>\n\n\n\n<p>However, a typical Tor hidden service uses a single Tor process and a single tunnel. If you want extra redundancy or want to handle higher traffic by distributing load across multiple <code>.onion<\/code> addresses, <strong>TORTCB<\/strong> does exactly that.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What Is TORTCB?<\/h3>\n\n\n\n<p><strong>TORTCB (Tor TCP Chain Balancer)<\/strong> is essentially two Docker images working in tandem:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong><code>tor_forward<\/code>:<\/strong><ul><li>Spins up multiple Tor hidden services.<\/li><li>Each service listens on a unique <code>.onion<\/code> domain and forwards traffic to a local port (where your actual app runs).<\/li><li>Generates a <code>domains.list<\/code> file containing all the new <code>.onion<\/code> domains and their corresponding ports.<\/li><\/ul><\/li><li><strong><code>haproxy_receiver<\/code>:<\/strong><ul><li>Reads the <code>domains.list<\/code> file and launches a dedicated Tor client for each <code>.onion<\/code> domain, ensuring each has its own isolated Tor process.<\/li><li>Uses <code>socat<\/code> to receive traffic separately for each onion domain.<\/li><li>Aggregates everything with HAProxy, combining all Tor tunnels into a single front-end listening port.<\/li><\/ul><\/li><\/ol>\n\n\n\n<p>The end result is a cluster of <code>.onion<\/code> addresses (for redundancy) consolidated behind one external HAProxy port, enabling a robust load balancing setup for Tor hidden services.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How It Works in Practice<\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Multiple Onion Addresses:<\/strong> <code>tor_forward<\/code> creates several <code>.onion<\/code> domains.<\/li><li><strong>Unified Entry Point:<\/strong> <code>haproxy_receiver<\/code> merges traffic from those domains into one HAProxy port.<\/li><li><strong>Load Spreading:<\/strong> Instead of overloading one single Tor tunnel, your incoming connections are distributed across multiple <code>.onion<\/code> endpoints.<\/li><\/ol>\n\n\n\n<p>A simplified diagram:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>&#91;User] -> .onion addresses -> &#91;tor_forward] -> localhost:5000 (your app)\n                                     |\n                                     v\n&#91;HAProxy on a single port] ->&#91;haproxy_receiver]<\/code><\/pre>\n\n\n\n<p>You can choose to connect through any of the <code>.onion<\/code> addresses, or simply direct all users to that single HAProxy entry port (useful for local or external balancing).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Quick Start<\/h3>\n\n\n\n<h4 class=\"wp-block-heading\">1. Requirements<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Docker and (preferably) Docker Compose.<\/li><li>The <strong>TORTCB<\/strong> repository: <a href=\"https:\/\/github.com\/keklick1337\/tortcb\">GitHub &#8211; keklick1337\/tortcb<\/a>.<\/li><li>An application running locally, for example on port <code>5000<\/code>, that you want hidden behind Tor.<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">2. Clone the Repository<\/h4>\n\n\n\n<pre class=\"wp-block-code\"><code>git clone https:\/\/github.com\/keklick1337\/tortcb.git<br>cd tortcb<\/code><\/pre>\n\n\n\n<p>Inside, you will see two main folders: <code>tor_forward\/<\/code> and <code>haproxy_receiver\/<\/code>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Setting Up <code>tor_forward<\/code><\/h3>\n\n\n\n<p><code>tor_forward<\/code> is the container that creates multiple Tor hidden services, each forwarding traffic to your actual application.<\/p>\n\n\n\n<p><strong>Build the Docker image:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>cd tor_forward\ndocker build -t tor_forward .<\/code><\/pre>\n\n\n\n<p><strong>Run the container:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>docker run -d \\\n  --name tor_forward \\\n  -e HOST_IP=host.docker.internal \\\n  -e HOST_PORT=5000 \\\n  -e TOR_INSTANCES=3 \\\n  -e RANDOM_PORT_START=20000 \\\n  -v $(pwd)\/data\/tor_forward:\/var\/lib\/tor\/hidden_services \\\n  tor_forward<\/code><\/pre>\n\n\n\n<p><strong>Key parameters:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code>HOST_IP<\/code> \/ <code>HOST_PORT<\/code>: IP and port of the application you\u2019re hiding (e.g., <code>5000<\/code>).<\/li><li><code>TOR_INSTANCES<\/code>: Number of <code>.onion<\/code> addresses to generate.<\/li><li><code>RANDOM_PORT_START<\/code>: The initial port number Tor will start binding to on your host.<\/li><\/ul>\n\n\n\n<p>After launching, check <code>.\/data\/tor_forward\/domains.list<\/code> for lines like:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>abcde12345.onion:20000<br>fghij67890.onion:20001<\/code><\/pre>\n\n\n\n<p>Each <code>.onion<\/code> domain maps to a local port.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Setting Up <code>haproxy_receiver<\/code><\/h3>\n\n\n\n<p><code>haproxy_receiver<\/code> reads all <code>.onion<\/code> domains from the <code>domains.list<\/code> file, starts a Tor client and <code>socat<\/code> for each one, and then merges them behind HAProxy.<\/p>\n\n\n\n<p><strong>Build the Docker image:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>cd ..\/haproxy_receiver\ndocker build -t haproxy_receiver .<\/code><\/pre>\n\n\n\n<p><strong>Run the container:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>docker run -d \\\n  --name haproxy_receiver \\\n  -e HAPROXY_LISTEN_PORT=9080 \\\n  -e BASE_LOCAL_PORT=30000 \\\n  -e BASE_SOCKS_PORT=9050 \\\n  -e STATS_PORT=9090 \\\n  -e STATS_USER=admin \\\n  -e STATS_PASS=mypassword \\\n  -v \/path\/to\/domains.list:\/etc\/domains.list:ro \\\n  -p 9080:9080 \\\n  -p 9090:9090 \\\n  haproxy_receiver<\/code><\/pre>\n\n\n\n<p>Key parameters:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code>-v \/path\/to\/domains.list:\/etc\/domains.list:ro<\/code>: Points to the <code>domains.list<\/code> file generated by <code>tor_forward<\/code>.<\/li><li><code>HAPROXY_LISTEN_PORT=9080<\/code>: The port exposed by HAProxy (mapped to <code>-p 9080:9080<\/code>).<\/li><li><code>STATS_PORT=9090<\/code>, <code>STATS_USER=admin<\/code>, <code>STATS_PASS=mypassword<\/code>: Optional HAProxy stats page credentials.<\/li><\/ul>\n\n\n\n<p>After launching, the logs will confirm each <code>.onion<\/code> domain is paired with its own Tor process and <code>socat<\/code> listener, all combined into HAProxy on port <code>9080<\/code>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Verifying Your Setup<\/h3>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Check Your App:<\/strong> Make sure your target service is up on <code>HOST_IP:HOST_PORT<\/code> (for instance, <code>localhost:5000<\/code>).<\/li><li><strong>Test an Onion Address:<\/strong> Pick any generated onion domain (e.g., <code>abcde12345.onion:20000<\/code>). Try connecting to it via Tor Browser or <code>curl<\/code> through a SOCKS proxy. You should reach your service anonymously.<\/li><li><strong>Check HAProxy:<\/strong> Port <code>9080<\/code> will be your consolidated external entry point. You can open that port publicly, tunnel it, or restrict it behind a VPN\u2014whatever suits your environment.<\/li><li><strong>HAProxy Stats:<\/strong> Go to <code>http:\/\/<docker_host>:9090\/stats<\/docker_host><\/code>, enter the credentials you set, and view connection and load metrics in real time.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Using Docker Compose<\/h3>\n\n\n\n<p>For convenience, you can automate everything with a <code>docker-compose.yml<\/code>. Below are two sample files\u2014one for each container. Adjust them to suit your environment.<\/p>\n\n\n\n<p><strong><code>docker-compose.yml<\/code> for <code>tor_forward<\/code>:<\/strong> <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>version: \"3.8\"\n\nservices:\n  tor_forward:\n    build: .\/tor_forward\n    container_name: tor_forward\n    environment:\n      - HOST_IP=host.docker.internal\n      - HOST_PORT=5000\n      - TOR_INSTANCES=5\n      - RANDOM_PORT_START=20000\n    volumes:\n      - .\/data\/tor_forward:\/var\/lib\/tor\/hidden_services<\/code><\/pre>\n\n\n\n<p><strong><code>docker-compose.yml<\/code> for <code>haproxy_receiver<\/code>:<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>version: \"3.8\"\n\nservices:\n  tor_forward:\n    build: .\/tor_forward\n    container_name: tor_forward\n    environment:\n      - HOST_IP=host.docker.internal\n      - HOST_PORT=5000\n      - TOR_INSTANCES=5\n      - RANDOM_PORT_START=20000\n    volumes:\n      - .\/data\/tor_forward:\/var\/lib\/tor\/hidden_services<\/code><\/pre>\n\n\n\n<p>Once configured, run:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><code>docker-compose up -d --build<\/code><\/pre>\n\n\n\n<p>This spawns both containers. <code>tor_forward<\/code> generates the <code>domains.list<\/code>, while <code>haproxy_receiver<\/code> automatically sets up Tor, <code>socat<\/code>, and HAProxy for each onion domain.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Tips and Caveats<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>IP Address Issues on Linux:<\/strong> <code>host.docker.internal<\/code> may not work on some Linux distributions. Use a real IP (e.g., <code>172.17.0.1<\/code>) or <code>localhost<\/code> instead, or consider <code>network: host<\/code> mode.<\/li><li><strong>Resource Usage:<\/strong> Spinning up multiple <code>.onion<\/code> domains can be CPU-intensive. Each instance runs a Tor client plus <code>socat<\/code>, so don\u2019t overdo it if your server has limited resources.<\/li><li><strong>Preserving Onion Addresses:<\/strong> As long as you keep the same volume (<code>.\/data\/tor_forward<\/code>), the generated <code>.onion<\/code> addresses remain the same across container restarts.<\/li><li><strong>Security:<\/strong> For a purely hidden service, you don\u2019t need to map HAProxy\u2019s port <code>9080<\/code> to the outside world. You can keep it internal within a Docker network, so all external traffic goes solely through <code>.onion<\/code> addresses.<\/li><li><strong>Scaling:<\/strong> If you want more <code>.onion<\/code> addresses, just increase <code>TOR_INSTANCES<\/code> in <code>tor_forward<\/code>. Then update your system resources accordingly.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>With <strong>TORTCB<\/strong>, you can hide your server behind multiple Tor hidden services while balancing load across several tunnels. The process is made simple through Docker containers or Docker Compose, providing:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Anonymity:<\/strong> True <code>.onion<\/code> addresses with no exposed IP.<\/li><li><strong>Scalability:<\/strong> Multiple Tor tunnels for traffic distribution and resilience.<\/li><li><strong>Convenience:<\/strong> Quick, containerized deployment using a minimal config.<\/li><\/ul>\n\n\n\n<p>Explore the <a href=\"https:\/\/github.com\/keklick1337\/tortcb\">TORTCB GitHub repository<\/a> to dive deeper, open issues, or contribute. Enjoy building faster, safer, and more private services with Tor and TORTCB!<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>\u00a9 2025 Trustcrypt. All rights reserved.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction At Trustcrypt, we understand that privacy and resilience against unwanted attention are crucial when hosting services online. Whether you&#8230;<\/p>\n","protected":false},"author":1,"featured_media":588,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[28],"tags":[],"class_list":["post-585","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Hide Your Service from Prying Eyes (Using Tor as a Tunnel to the Open Internet) - Trustcrypt<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustcrypt.com\/ar\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:locale:alternate\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Hide Your Service from Prying Eyes (Using Tor as a Tunnel to the Open Internet)\" \/>\n<meta property=\"og:description\" content=\"Introduction At Trustcrypt, we understand that privacy and resilience against unwanted attention are crucial when hosting services online. Whether you...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustcrypt.com\/ar\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustcrypt\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-04T13:05:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-04T13:40:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/02\/tor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"920\" \/>\n\t<meta property=\"og:image:height\" content=\"460\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Trustscrypt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"Trustscrypt\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u062f\u0642\u0627\u0626\u0642\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustcrypt.com\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/\",\"url\":\"https:\/\/trustcrypt.com\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/\",\"name\":\"How to Hide Your Service from Prying Eyes (Using Tor as a Tunnel to the Open Internet)\",\"isPartOf\":{\"@id\":\"https:\/\/trustcrypt.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustcrypt.com\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustcrypt.com\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/02\/tor.png\",\"datePublished\":\"2025-02-04T13:05:39+00:00\",\"dateModified\":\"2025-02-04T13:40:09+00:00\",\"author\":{\"@id\":\"https:\/\/trustcrypt.com\/#\/schema\/person\/469b1cf97b9f7ea4e4d7fa31689dfa9f\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustcrypt.com\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/trustcrypt.com\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/#primaryimage\",\"url\":\"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/02\/tor.png\",\"contentUrl\":\"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/02\/tor.png\",\"width\":920,\"height\":460},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustcrypt.com\/#website\",\"url\":\"https:\/\/trustcrypt.com\/\",\"name\":\"Trustcrypt\",\"description\":\"\u0627\u0644\u0623\u0645\u0646 \u0647\u0648 \u0627\u0633\u0645\u0646\u0627 \u0627\u0644\u062b\u0627\u0646\u064a\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustcrypt.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustcrypt.com\/#\/schema\/person\/469b1cf97b9f7ea4e4d7fa31689dfa9f\",\"name\":\"Trustscrypt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/trustcrypt.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4c36ff3376565a0f4981e9397667feb08d5e09acacce32a52ea4a3f628e03692?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4c36ff3376565a0f4981e9397667feb08d5e09acacce32a52ea4a3f628e03692?s=96&d=mm&r=g\",\"caption\":\"Trustscrypt\"},\"sameAs\":[\"http:\/\/trustcrypt.com\"],\"url\":\"https:\/\/trustcrypt.com\/ar\/author\/trustscrypt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Hide Your Service from Prying Eyes (Using Tor as a Tunnel to the Open Internet) - Trustcrypt","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustcrypt.com\/ar\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/","og_locale":"ar_AR","og_type":"article","og_title":"[:en]How to Hide Your Service from Prying Eyes (Using Tor as a Tunnel to the Open Internet)[:] - Trustcrypt","og_description":"Introduction At Trustcrypt, we understand that privacy and resilience against unwanted attention are crucial when hosting services online. Whether you...","og_url":"https:\/\/trustcrypt.com\/ar\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/","og_site_name":"Trustcrypt","article_published_time":"2025-02-04T13:05:39+00:00","article_modified_time":"2025-02-04T13:40:09+00:00","og_image":[{"width":920,"height":460,"url":"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/02\/tor.png","type":"image\/png"}],"author":"Trustscrypt","twitter_card":"summary_large_image","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"Trustscrypt","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"5 \u062f\u0642\u0627\u0626\u0642"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/trustcrypt.com\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/","url":"https:\/\/trustcrypt.com\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/","name":"How to Hide Your Service from Prying Eyes (Using Tor as a Tunnel to the Open Internet)","isPartOf":{"@id":"https:\/\/trustcrypt.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustcrypt.com\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/#primaryimage"},"image":{"@id":"https:\/\/trustcrypt.com\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/02\/tor.png","datePublished":"2025-02-04T13:05:39+00:00","dateModified":"2025-02-04T13:40:09+00:00","author":{"@id":"https:\/\/trustcrypt.com\/#\/schema\/person\/469b1cf97b9f7ea4e4d7fa31689dfa9f"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustcrypt.com\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/trustcrypt.com\/how-to-hide-your-service-from-prying-eyes-using-tor-as-a-tunnel-to-the-open-internet\/#primaryimage","url":"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/02\/tor.png","contentUrl":"https:\/\/trustcrypt.com\/wp-content\/uploads\/2025\/02\/tor.png","width":920,"height":460},{"@type":"WebSite","@id":"https:\/\/trustcrypt.com\/#website","url":"https:\/\/trustcrypt.com\/","name":"Trustcrypt","description":"\u0627\u0644\u0623\u0645\u0646 \u0647\u0648 \u0627\u0633\u0645\u0646\u0627 \u0627\u0644\u062b\u0627\u0646\u064a","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustcrypt.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Person","@id":"https:\/\/trustcrypt.com\/#\/schema\/person\/469b1cf97b9f7ea4e4d7fa31689dfa9f","name":"Trustscrypt","image":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/trustcrypt.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4c36ff3376565a0f4981e9397667feb08d5e09acacce32a52ea4a3f628e03692?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4c36ff3376565a0f4981e9397667feb08d5e09acacce32a52ea4a3f628e03692?s=96&d=mm&r=g","caption":"Trustscrypt"},"sameAs":["http:\/\/trustcrypt.com"],"url":"https:\/\/trustcrypt.com\/ar\/author\/trustscrypt\/"}]}},"_links":{"self":[{"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/posts\/585","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/comments?post=585"}],"version-history":[{"count":8,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/posts\/585\/revisions"}],"predecessor-version":[{"id":596,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/posts\/585\/revisions\/596"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/media\/588"}],"wp:attachment":[{"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/media?parent=585"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/categories?post=585"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustcrypt.com\/ar\/wp-json\/wp\/v2\/tags?post=585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}