Forcing .onion on Project

Kicksecure Onion Website - How to consistently access the Kicksecure website through its Tor Onion Service
Introduction[edit]
The onion domain of Kicksecure is w5j6stm77zs6652pgsij4awcjeel3eco7kvipheu6mtr623eyyehj4yd.onion
.
w5j6stm77zs6652pgsij4awcjeel3eco7kvipheu6mtr623eyyehj4yd.onion
Or, in machine-readable format (API), here is a raw link that only shows the onion: raw
To use .onion
services when browsing kicksecure.com
, follow the links below to the Kicksecure homepage, forums, download, Debian repository, issue tracker, or the Kicksecure Debian repository.
Onion-Location
: Tor Browser 9.5 and later features an opt-in option for using onion sites automatically for participating websites. The system administrator of individual websites can choose to configure this. [1] Direct connections to onion services are harder to track than the
Onion-Location
opt-in method, which requires making DNS requests and web server connections from an exit node before switching to the onion service. The kicksecure.com
is participating by setting the Onion-Location
header.
Issues[edit]
If special precautions are not taken, some resources from the clearnet kicksecure.com
address might be utilized when navigating the onion address. [2]
Also, note that on a few occasions in the past, it was not possible to log in to the Kicksecure forums using the onion address. [3] [4]
Forcing onion[edit]
There is currently no known method. This remains undocumented.
- A) One way might be to configure the browser to block DNS requests to
kicksecure.com
. However, this is browser-specific. - B) Another way might be to configure the operating system to block DNS requests to
kicksecure.com
. For example, on Linux-based operating systems, this can be done using the/etc/hosts
file. However, this method is both operating system-dependent and browser-dependent, as some browser such as Firefox in the USA, which uses DNS over HTTPS (DoH), or Tor Browser using Tor, do not ask the operating system to resolve DNS.
Forum Discussion[edit]
Footnotes[edit]
- ↑
- ↑
The reason is that MediaWiki and Discourse are using the primary Kicksecure HTTPS domain. These web applications do not support multiple domains for the same website. See also Web Application Shortcomings
and Privacy on the Kicksecure Website
.
- ↑
https://forums.whonix.org/t/onion-forum-site-redirects-to-clearnet/197
- ↑ This suggests the Kicksecure forums' onion address could become (temporarily) inaccessible in the future.

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 13 year success story and maybe DONATE!