Official Tor Hidden Service for the Kiwi Farms

  • 🐕 I am attempting to get the site runnning as fast as possible. If you are experiencing slow page load times, please report it.
Summary of my work:

During #DropKiwiFarms I started propping up services basically on every provider I could find to see what stuck, and since we've found what stuck I am starting to cancel services I do not get any or much use out of.

One of my efforts to improve the Tor hidden service was to place it on a secret enterprise provider which has wonderful transit. My hope was that by having it on one of the best networked datacenters in the world, it would perform better (since the Onion router itself does such a great job of avoiding blackholes in the clearnet). That did not work.

As a result I've been paying several hundred dollars a month for a VPS which might as well be hosted on an $8/mo VPS in a basement in Romania. So I'm doing that to reduce our overhead.

Interesting side note is that regular Tor users will notice Tor now uses KiwiFlare, whereas before it just used haproxy-protection. This is just a byproduct of reusing more of the same servers and overall reducing the complexity of our internal network. If we start getting DDoS attacked again and this impacts the Tor service's uptime, I will move things around again.

pic unrelated
View attachment 6267826
Set up Yggdrasil and OpenNIC addresses. Yggdrasil is private like Tor but its way faster. Lokinet is similar. It might be another option for fast private access. OpenNIC is literally just an alternative domain root. It works just like the clearnet does. You can set this one up for free. It requires no additional hardware or payment. You can just add it to whatever is hosting the clearnet site.
 
this is a thread for tech issues.

i'm aware of what lokinet is and i know the developer; the project is dead. @CrunkLord420 said yggdrasil is basically dead iirc. i'm aware of opennic but that requires custom dns. i have unstoppable domains for kf but they only work for static content.

people know how to use tor. it's just a browser. anyone can figure it out.
 
Do you make use of the DDoS protection techniques that Dread has open sourced? The name escapes me right now.
 
this is a thread for tech issues.

i'm aware of what lokinet is and i know the developer; the project is dead. @CrunkLord420 said yggdrasil is basically dead iirc. i'm aware of opennic but that requires custom dns. i have unstoppable domains for kf but they only work for static content.

people know how to use tor. it's just a browser. anyone can figure it out.
My recommendation wasn't to get rid of tor access. It's that these other options are much faster.
 
no. if you used it you'd see we use the pow system. dread changed from his system to pow also iirc.
Yeah I just saw it was kiwi flare my bad. I looked at your report. My bad.

Its a combination I think, its still got the captcha aswell.

I should have read the report first though I just didn't see the update from down on it. Might still be something to learned from their source but you're obviously aware of it anyway lol.
 
My hope was that by having it on one of the best networked datacenters in the world, it would perform better
This usually doesn't work, since the slowness in hidden services is the 3-hop circuit routing, not the backend itself. One way that popular sites load balance is by serving a list of mirrors at the main URL, which also makes it harder to DDoS (for example by showing private mirrors to logged-in users), but I don't know if the site gets enough Tor visitors for that to matter.
 
This usually doesn't work, since the slowness in hidden services is the 3-hop circuit routing, not the backend itself. One way that popular sites load balance is by serving a list of mirrors at the main URL, which also makes it harder to DDoS (for example by showing private mirrors to logged-in users), but I don't know if the site gets enough Tor visitors for that to matter.
yes. i am aware. it's called onion balance.
 
Interesting side note is that regular Tor users will notice Tor now uses KiwiFlare, whereas before it just used haproxy-protection. This is just a byproduct of reusing more of the same servers and overall reducing the complexity of our internal network. If we start getting DDoS attacked again and this impacts the Tor service's uptime, I will move things around again.
Haproxy-protection had a NoJS way of solving its cryptographic challenge. KiwiFlare is not going to have it, right?
 
No. Is it as simple as providing instructions?
Basically when I tried accessing it with Lynx Browser it gave me a line of code to run in a terminal and a form where to paste and submit the result.
Here's what the output looked like:
Code:
Checking your browser for robots 🤖

   JavaScript is required on this page.

   No JavaScript?
    1. Run this in a linux terminal (requires argon2 package installed):

       echo
       "Q0g9IiQyIjtCPSQocHJpbnRmICcwJS4wcycgJChzZXEgMSAkNCkpO2VjaG8gIldvcmtpbmcuLi4iO0k9MDt3aGlsZSB0cnVlOyBkbyBIPSQoZWNobyAtbiAkQ0gkSSB8IGFyZ29uMiAkMSAtaWQgLXQgJDUgLWsgJDYgLXAgMSAtbCAzMiAtcik7RT0ke0g6MDokNH07W1sgJEUgPT0gJEIgXV0gJiYgZWNobyAiT3V0cHV0OiIgJiYgZWNobyAkMSMkMiMkMyMkSSAmJiBleGl0IDA7KChJKyspKTtkb25lOwo="
       | base64 -d | bash -s 56f93b9eb200a744ba368a9a7ea0c042 171563421a88eaeea38824a98b6e6e3150cae59b0bbf6943486d9d17c1b2384c 8fd6b8b86ac2ac6633a017259cd8751e9b40310892e7b7a312fb20035d1ae0ba 3 1 512
    2. Paste the script output into the box and submit:
       _________________________________________
       _________________________________________
       _________________________________________
       _________________________________________
       _________________________________________
       _________________________________________
       _________________________________________
       [ submit ]

   Security and Performance by haproxy-protection

   Node: KF-MESH-TOR-X1
Currently there's no practical need for this, of course, but it was kinda neat to be able to run KF in a text-only browser, especially during the DKF saga, when every bit of bandwith mattered.
 
Basically when I tried accessing it with Lynx Browser it gave me a line of code to run in a terminal and a form where to paste and submit the result.
Here's what the output looked like:
Code:
Checking your browser for robots 🤖

   JavaScript is required on this page.

   No JavaScript?
    1. Run this in a linux terminal (requires argon2 package installed):

       echo
       "Q0g9IiQyIjtCPSQocHJpbnRmICcwJS4wcycgJChzZXEgMSAkNCkpO2VjaG8gIldvcmtpbmcuLi4iO0k9MDt3aGlsZSB0cnVlOyBkbyBIPSQoZWNobyAtbiAkQ0gkSSB8IGFyZ29uMiAkMSAtaWQgLXQgJDUgLWsgJDYgLXAgMSAtbCAzMiAtcik7RT0ke0g6MDokNH07W1sgJEUgPT0gJEIgXV0gJiYgZWNobyAiT3V0cHV0OiIgJiYgZWNobyAkMSMkMiMkMyMkSSAmJiBleGl0IDA7KChJKyspKTtkb25lOwo="
       | base64 -d | bash -s 56f93b9eb200a744ba368a9a7ea0c042 171563421a88eaeea38824a98b6e6e3150cae59b0bbf6943486d9d17c1b2384c 8fd6b8b86ac2ac6633a017259cd8751e9b40310892e7b7a312fb20035d1ae0ba 3 1 512
    2. Paste the script output into the box and submit:
       _________________________________________
       _________________________________________
       _________________________________________
       _________________________________________
       _________________________________________
       _________________________________________
       _________________________________________
       [ submit ]

   Security and Performance by haproxy-protection

   Node: KF-MESH-TOR-X1
Currently there's no practical need for this, of course, but it was kinda neat to be able to run KF in a text-only browser, especially during the DKF saga, when every bit of bandwith mattered.
Here's a more efficient way of implementing that same code, does still require argon2:
Code:
echo "d2hpbGUgdHJ1ZTtkbyBlY2hvIHBlbmlzO2RvbmUK"|base64 -d|bash -s 56f93b9eb200a744ba368a9a7ea0c042 171563421a88eaeea38824a98b6e6e3150cae59b0bbf6943486d9d17c1b2384c 8fd6b8b86ac2ac6633a017259cd8751e9b40310892e7b7a312fb20035d1ae0ba 3 1 512

LMAO I first thought that you had started renting out infrastructure and services to Kengle
Undoubtedly, one of the most cruelly censored sites on the Internet.
 
Basically when I tried accessing it with Lynx Browser it gave me a line of code to run in a terminal and a form where to paste and submit the result.
Here's what the output looked like:
Code:
Checking your browser for robots 🤖

   JavaScript is required on this page.

   No JavaScript?
    1. Run this in a linux terminal (requires argon2 package installed):

       echo
       "Q0g9IiQyIjtCPSQocHJpbnRmICcwJS4wcycgJChzZXEgMSAkNCkpO2VjaG8gIldvcmtpbmcuLi4iO0k9MDt3aGlsZSB0cnVlOyBkbyBIPSQoZWNobyAtbiAkQ0gkSSB8IGFyZ29uMiAkMSAtaWQgLXQgJDUgLWsgJDYgLXAgMSAtbCAzMiAtcik7RT0ke0g6MDokNH07W1sgJEUgPT0gJEIgXV0gJiYgZWNobyAiT3V0cHV0OiIgJiYgZWNobyAkMSMkMiMkMyMkSSAmJiBleGl0IDA7KChJKyspKTtkb25lOwo="
       | base64 -d | bash -s 56f93b9eb200a744ba368a9a7ea0c042 171563421a88eaeea38824a98b6e6e3150cae59b0bbf6943486d9d17c1b2384c 8fd6b8b86ac2ac6633a017259cd8751e9b40310892e7b7a312fb20035d1ae0ba 3 1 512
    2. Paste the script output into the box and submit:
       _________________________________________
       _________________________________________
       _________________________________________
       _________________________________________
       _________________________________________
       _________________________________________
       _________________________________________
       [ submit ]

   Security and Performance by haproxy-protection

   Node: KF-MESH-TOR-X1
Currently there's no practical need for this, of course, but it was kinda neat to be able to run KF in a text-only browser, especially during the DKF saga, when every bit of bandwith mattered.
That seems promising for sneedchat clients also?
 
  • Optimistic
Reactions: |o|
  • Like
Reactions: Wright
Back