2025-01-09 Domain Change and Preparations for 2025

AuraGem over Tor

Varilib

AuraGem is announcing Varilib over Tor to provide for resources that will educate and help protect vulnerable people in the US under the second Trump administration. It is only accessible over Tor. Resources will include:

Varilib over HTTP
Varilib over Gemini
Varilib over Spartan

Currently, the site has some Standard Ebooks, but more material will be coming within the next week.

Tor

Tor is a censorship-resistant network that hides your IP address from the destination server. This can be used with any website on the internet through exit relays (relays where traffic exits the network at a given point), or it can be used with onion services - servers that are hosted on the network itself (and therefore do not require an exit relay).

The simplest way to get Tor is to download the Tor Browser. This will work with HTTP(S) websites, and it also has plugins to block Javascript.

Tor Browser Download

You can also install Tor itself and use it with other applications (for example, Gemini browsers). To do this, there are two options:

Some applications will have a different SOCKS setting for hostname resolution (for example, curl's `--socks5-hostname`).

Torifier is a Windows application that can route all network traffic on your computer, including DNS requests, through Tor without needing to configure each application. It also emulates system-wide support for .onion names and blocks UDP requests. Install it here:

Torifier

Torrenting

Torrenting is a way of distributing files across multiple computers for more efficient downloading. It should NOT be used with Tor, as it will slow down the Tor network. It can, however, be used with I2P.

In order for torrenting to work, each computer requesting access to a file needs to get a list of IP addresses to other computers that have the file. This is done through multiple methods:

Trackers are centralized servers that host IP addresses of computers requesting and seeding files. Most of them are publicly available, which means they are not great for anonymity. There are some private trackers, but they usually require an invite.

DHT is a hash table that is distributed across multiple computers. It is also publicly available.

PEX is a way to exchange peers between peers that are already connected to each other.

You can also use I2P for better privacy while torrenting. Here's a tutorial on how to connect Bittorrent to I2P:

Bittorrent over I2P

PeerBlock and I-Blocklist

Many companies track torrents and which IP addresses are requesting files to determine who is illegally downloading or sharing pirated content. To help fight against this, you can use the PeerBlock application to block your torrent client's connection to all company ip addresses. I-Blocklist provides lists that you can use from within PeerBlock.

PeerBlock can also be useful for blocking spam and other bad actors on the internet.

PeerBlock
I-Blocklist

Note: If you want to setup your own Tor Onion Service or run a bridge or relay, then go to the Tor project website, which provides a lot of documentation:

Tor Project

Tails is a Linux OS that routes all network traffic into the Tor network:

Tails Linux