Forcing .onion on Project

From Kicksecure
Revision as of 11:07, 28 March 2025 by Hans1 (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Kicksecure Onion Website - How to consistently access the Kicksecure website through its Tor Onion Service

Introduction[edit]

Info Note:

Consistent use of the Kicksecure onion service affords several benefits. It provides alternative end-to-end encryption that is independent of TLSOnion network Logo certificate authorities and the mainstream Domain Name System. Additionally, it reduces the load on Tor exit nodes.

The onion domain of Kicksecure is w5j6stm77zs6652pgsij4awcjeel3eco7kvipheu6mtr623eyyehj4yd.onion.

w5j6stm77zs6652pgsij4awcjeel3eco7kvipheu6mtr623eyyehj4yd.onion

Or, in machine-readable format (API), here is a raw link that only shows the onion: rawOnion network Logo

To use .onion services when browsing kicksecure.com, follow the links below to the Kicksecure homepage, forums, download, Debian repository, issue tracker, or the Kicksecure Debian repository.

Onion-Locationarchive.org iconarchive.today icon: Tor Browser 9.5 and later features an opt-in option for using onion sites automatically for participating websites. The system administrator of individual websites can choose to configure this. [1] Direct connections to onion services are harder to track than the Onion-Location opt-in method, which requires making DNS requests and web server connections from an exit node before switching to the onion service. The kicksecure.com is participating by setting the Onion-Location header.

Issues[edit]

If special precautions are not taken, some resources from the clearnet kicksecure.com address might be utilized when navigating the onion address. [2]

Also, note that on a few occasions in the past, it was not possible to log in to the Kicksecure forums using the onion address. [3] [4]

Forcing onion[edit]

There is currently no known method. This remains undocumented.

  • A) One way might be to configure the browser to block DNS requests to kicksecure.com. However, this is browser-specific.
  • B) Another way might be to configure the operating system to block DNS requests to kicksecure.com. For example, on Linux-based operating systems, this can be done using the /etc/hosts file. However, this method is both operating system-dependent and browser-dependent, as some browser such as Firefox in the USA, which uses DNS over HTTPS (DoH), or Tor Browser using Tor, do not ask the operating system to resolve DNS.

Forum Discussion[edit]

Footnotes[edit]

  1. The reason is that MediaWiki and Discourse are using the primary Kicksecure HTTPS domain. These web applications do not support multiple domains for the same website. See also Web Application ShortcomingsOnion network Logo and Privacy on the Kicksecure WebsiteOnion network Logo.
  2. https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197archive.org iconarchive.today icon
  3. This suggests the Kicksecure forums' onion address could become (temporarily) inaccessible in the future.
Notification image

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 13 year success story and maybe DONATE!