NODE_MODULES Telegram 94
#tor #linux #debian
Быстро поднять Tor мост на VPS c debian bullseye.


sudo ufw allow 9023
sudo apt install apt-transport-https
sudo -i
echo "deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] https://deb.torproject.org/torproject.org bullseye main" >> /etc/apt/sources.list
echo "deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] https://deb.torproject.org/torproject.org bullseye main" >> /etc/apt/sources.list
wget -qO- https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg >/dev/null
sudo apt update
sudo apt install tor deb.torproject.org-keyring
sudo apt install obfs4proxy
sudo setcap cap_net_bind_service=+ep /usr/bin/obfs4proxy
sudo sed -i 's/NoNewPrivileges=yes/NoNewPrivileges=no/' /lib/systemd/system/[email protected]
sudo systemctl daemon-reload
sudo tee -a /etc/tor/torrc > /dev/null <<EOT
Log notice file /var/log/tor/log
ORPort 9023
AssumeReachable 1
ExtORPort auto
BridgeRelay 1
PublishServerDescriptor 0
ExitPolicy reject *:*
ServerTransportPlugin obfs4 exec /usr/bin/obfs4proxy
ServerTransportListenAddr obfs4 0.0.0.0:443
ContactInfo [email protected]
Nickname lain
EOT
sudo systemctl restart tor


Obtain bridge's fingerprint:

sudo cat /var/lib/tor/fingerprint


Update the obfs4 config with your IP address, port and fingerprint:
sudo vi /var/lib/tor/pt_state/obfs4_bridgeline.txt

Restart tor:
sudo systemctl restart tor

Check that tor running sucessfully:
sudo tail /var/log/tor/log



tgoop.com/node_modules/94
Create:
Last Update:

#tor #linux #debian
Быстро поднять Tor мост на VPS c debian bullseye.


sudo ufw allow 9023
sudo apt install apt-transport-https
sudo -i
echo "deb [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] https://deb.torproject.org/torproject.org bullseye main" >> /etc/apt/sources.list
echo "deb-src [signed-by=/usr/share/keyrings/tor-archive-keyring.gpg] https://deb.torproject.org/torproject.org bullseye main" >> /etc/apt/sources.list
wget -qO- https://deb.torproject.org/torproject.org/A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89.asc | gpg --dearmor | tee /usr/share/keyrings/tor-archive-keyring.gpg >/dev/null
sudo apt update
sudo apt install tor deb.torproject.org-keyring
sudo apt install obfs4proxy
sudo setcap cap_net_bind_service=+ep /usr/bin/obfs4proxy
sudo sed -i 's/NoNewPrivileges=yes/NoNewPrivileges=no/' /lib/systemd/system/[email protected]
sudo systemctl daemon-reload
sudo tee -a /etc/tor/torrc > /dev/null <<EOT
Log notice file /var/log/tor/log
ORPort 9023
AssumeReachable 1
ExtORPort auto
BridgeRelay 1
PublishServerDescriptor 0
ExitPolicy reject *:*
ServerTransportPlugin obfs4 exec /usr/bin/obfs4proxy
ServerTransportListenAddr obfs4 0.0.0.0:443
ContactInfo [email protected]
Nickname lain
EOT
sudo systemctl restart tor


Obtain bridge's fingerprint:

sudo cat /var/lib/tor/fingerprint


Update the obfs4 config with your IP address, port and fingerprint:
sudo vi /var/lib/tor/pt_state/obfs4_bridgeline.txt

Restart tor:
sudo systemctl restart tor

Check that tor running sucessfully:
sudo tail /var/log/tor/log

BY Заметки фронтендера


Share with your friend now:
tgoop.com/node_modules/94

View MORE
Open in Telegram


Telegram News

Date: |

The main design elements of your Telegram channel include a name, bio (brief description), and avatar. Your bio should be: How to Create a Private or Public Channel on Telegram? With the administration mulling over limiting access to doxxing groups, a prominent Telegram doxxing group apparently went on a "revenge spree." Matt Hussey, editorial director of NEAR Protocol (and former editor-in-chief of Decrypt) responded to the news of the Telegram group with “#meIRL.” As of Thursday, the SUCK Channel had 34,146 subscribers, with only one message dated August 28, 2020. It was an announcement stating that police had removed all posts on the channel because its content “contravenes the laws of Hong Kong.”
from us


Telegram Заметки фронтендера
FROM American