[tor-bugs] #21952 [User Experience]: Increasing the use of onion services through automatic redirects and aliasing

Tor Bug Tracker & Wiki blackhole at torproject.org
Sat Apr 15 19:13:25 UTC 2017


#21952: Increasing the use of onion services through automatic redirects and
aliasing
-----------------------------+-----------------------
 Reporter:  linda            |          Owner:  linda
     Type:  enhancement      |         Status:  new
 Priority:  Medium           |      Milestone:
Component:  User Experience  |        Version:
 Severity:  Normal           |     Resolution:
 Keywords:                   |  Actual Points:
Parent ID:                   |         Points:
 Reviewer:                   |        Sponsor:
-----------------------------+-----------------------

Comment (by cypherpunks):

 If it will be useful here is my collection of 290 clearnet to onion rules.
 It is the personal continuation of "darkweb-everywhere" but does not
 include the proofs. Most of them are official mirrors, some addresses are
 unofficial but useful mirrors, obvious or potential scam websites were not
 added. To use them, just copy the rules to the HTTPSEverywhereUserRules
 folder inside your Tor Browser profile. Since the goal was just to collect
 all such addresses, I didn't bother with cleaning obsolete rules.
 Nevertheless it is up to date and contains most of the major websites that
 has onion addresses. But Facebook is turned off by default since that
 would make the user fingerprintable, is there a way to use the redirection
 only if the person visits facebook.com?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/21952#comment:7>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list