Jul 24, 2021
3 mins read
NOTE: Hardening is highly recommended. This will show you how to setup Nextcloud as a Tor Hidden Service but this video does not cover hardening aspects. It's a starter video to get you a functional Nextcloud Server + Onion Address using a shortcut I found recently.
SELF HOSTING EMPOWERMENT SERIES:
[while this shows a Pine64 A64 LTS, you can follow along with the same OS running on a Raspberry Pi/other single board computer]
Nextcloud as a Tor Hidden Service Video is part of my 'self hosting' series. I really want to put more focus on self hosting, and single board computers.
Call me 'old school' if you like, but I'm not so sure the industry standard cloud innovation is entirely why you think it is.
Today, innovation is always directed towards whichever way the money flows in.
The Cloud is perfected format for data collection.
Self hosting offers more options for protecting your data.
Self hosting means greater control of everything (do you really 'own' a site if not?): the hardware, software, the entire LAN network, and connection (to largest extent possible insulating our network).
We can use Single Board Computers to accomplish most of our goals here.
The truth is this: Self hosting is the Ultimate User Empowerment.
Otherwise you may one day find yourself in a thin cloud future. By thin cloud future I mean the next innovative step past "system on a chip": is a world where in light of chip shortages all applications/operating systems may one day become remotely hosted, and our devices, remote cloud interfaces (out of user control). The power of the end user, boxed into a virtual machine, as an "allowance" structure.
What do you think? Let me know in the comments.
[ The above comes from my Thin Client Future Blog Writing ]
Today's Video In The Series:
One of the things I am asked more than any other is "How do you make a Nextcloud Tor Hidden Service?"
Today we will do just that.
This video goes through the process, from flashing a Linux OS to a quick shortcut for installing Nextcloud, up to successfully creating the .onion hidden service address/public key.
My warning is this: Do not expect following this video alone to make you invisible. This is a howto make a Nextcloud Hidden Service, but it isn't the guide on securing it (will do my best to find time in the future for that but can't say when).
There is much more to running both hidden service sites and Nextcloud, rules/setup guidelines that should be adhered to. And in the future I will cover more on this (+ my past Nextcloud hidden service videos offer some other tips).
Thank You to everyone who takes the time to Share and/or Support my videos. As all my channels are completely demonetized, Sharing and/or Support/donation motivates/helps me continue (many hours can go into each video + cover: if you can simply repost/share my videos, it really helps; It is an uphill battle getting YT/other site algorithms to promote real privacy content.
I believe in what I am doing: I'm generally not here sell anyone anything (but do appreciate support), but if interested in Lessons/Consulting, contact me.
Coming up: I will be showing how to use something I am making: crypto_homes: a command you can install on Linux devices to allow you to create and manage multiple different encrypted $HOME sdcards for multiple virtual userspaces (ex: work, play, pentesting, research/doc, etc). It also creates a hardware key to go along with it (out of any ordinary USB stick).
From here you have a new Tor onion address (v3), a Nextcloud server running off a single board computer
If you have any questions on the howto, securing, or want to say something random, leave as a comment below: