Skip to content

Commit 9e6fe6c

Browse files
committed
Update
1 parent c6bba7f commit 9e6fe6c

File tree

1 file changed

+6
-14
lines changed

1 file changed

+6
-14
lines changed

source/_docs/ecosystem/tor.markdown

Lines changed: 6 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -10,20 +10,14 @@ footer: true
1010
redirect_from: /cookbook/tor_configuration/
1111
---
1212

13-
This is an example about how you can configure Tor to provide secure remote access to your Home Assistant instance as an Onion site, through [Tor's Hidden Service](https://www.torproject.org/docs/hidden-services.html.en) feature. With this enabled, you do not need to open your firewall ports or setup HTTPS to enable secure remote access.
13+
This article guides your through the configuration of Tor to provide a secure access to your Home Assistant instance as an Onion site, through [Tor's Hidden Service](https://www.torproject.org/docs/hidden-services.html.en) feature, from remote. With this enabled, you do not need to open your firewall ports or setup HTTPS to enable secure remote access.
1414

1515
This is useful if you want to have:
1616

17-
* Access your Home Assistant instance remotely without opening a firewall port or setting up a VPN
18-
* Don't want to or know how to get an SSL/TLS certificate and HTTPS configuration setup
19-
* Want to block attackers from even being able to access/scan your port and server at all
20-
* Want to block anyone from knowing your home IP address and seeing your traffic to your Home Assistant
21-
22-
## {% linkable_title Background and Contact %}
23-
24-
This configuration is part of an effort to apply strong cryptography technologies (like Onion Routing and End-to-End Encryption) to technology we increasingly depend on in our day to day lives. Just like when WhatsApp enabled end-to-end encryption messaging for everyone, every home automation and IoT platform should do the same, because A) the technology is all there, freely licensed and open-source and B) up to this point, all the commercial manufacturers have been doing a horrific job with security.
25-
26-
You can learn more about how Tor can be used to secure home automation and IoT platforms through this short set of slides on the [Internet of Onion Things](https://github.com/n8fr8/talks/blob/master/onion_things/Internet%20of%20Onion%20Things.pdf)
17+
* Access your Home Assistant instance remotely without opening a firewall port or setting up a VPN.
18+
* Don't want to or know how to get an SSL/TLS certificate and HTTPS configuration setup.
19+
* Want to block attackers from even being able to access/scan your port and server at all.
20+
* Want to block anyone from knowing your home IP address and seeing your traffic to your Home Assistant.
2721

2822
## {% linkable_title Hidden Services and Onion Sites %}
2923

@@ -61,7 +55,7 @@ The "stealth" entry above ensures traffic to and from your Home Assistant instan
6155
Then, restart Tor:
6256

6357
```bash
64-
$ sudo /etc/init.d/tor restart
58+
$ sudo systemctl restart tor
6559
```
6660

6761
Then read the new generated authentication cookie from the Tor-generated hostname file:
@@ -106,5 +100,3 @@ You could also use Tor as a means to connect your Home Assistant instance to a r
106100

107101
As mentioned, with Orbot on Android, you can enable a "full device" VPN mode, that allows any app you have to tunnel through Tor, even if it is not Tor or proxy aware. This means you should be able to enter your "dot onion" Onion site address into any app you want to access to your Home Assistant instance, and it should work.
108102

109-
This configuration was provided by @n8fr8 ([github](https://github.com/n8fr8), [twitter](https://twitter.com/n8fr8)) of the [Guardian Project](https://guardianproject.info) and [Tor Project](https://torproject.org). You can send questions, feedback and ideas to [support@guardianproject.info](mailto:support@guardianproject.info).
110-

0 commit comments

Comments
 (0)