October 30, 2025
Peel the drama layer
Spinning Up an Onion Mirror Is Stupid Easy
Dark Web in 3 Commands? Fans cheer, skeptics clutch pearls
TLDR: A blogger showed making a Tor-only site mirror is surprisingly simple. The community cheered censorship resistance, debated whether HTTPS is needed inside Tor, warned about legal headaches, and geeked out over Tor’s Arti rewrite—important because it makes privacy tools easier while spotlighting real-world risks.
A blogger bragged that spinning up a “.onion” mirror (a Tor-only version of a website) took about three commands, and the comments immediately turned into a popcorn-worthy clash. The free speech crowd is hyped: ktallett wants onion and even old-school gopher versions to dodge censorship and keep info flowing. Security sticklers weighed in too. dewey dropped a mic with “Tor is already encrypted,” arguing you don’t need HTTPS (the usual green lock), while others recalled Facebook’s onion site rocking HTTPS mostly for flex. Meanwhile, the “real world” squad showed up: badmoddingyo warned the easy part isn’t tech—it’s law enforcement attention.
There were nerdy delight moments, too. simonmales had a “TIL” (today I learned) about the Onion-Location header so browsers can auto-redirect to the onion version—cue mini-tutorials and memes. And qhwudbebd steered the hype toward Tor’s shiny Rust rewrite, Arti, linking progress updates and turning the thread into a mini fan club for new privacy tech (link).
The vibe? Half “join the Onionverse” starter pack, half “brace for drama.” The author’s swagger (“it better be vim”) became a meme, the community turned a tiny tutorial into a debate about privacy, access, and consequences, and everyone left either inspired… or side-eyeing their threat model.
Key Points
- •The author created a .onion mirror of their website using Tor with minimal configuration.
- •Environment includes Caddy web server on a DigitalOcean VPS running Debian.
- •Tor is installed via apt and configured in torrc to run a hidden service on port 80 while disabling relay functions.
- •After restarting Tor, the .onion address is obtained from /var/lib/tor/hidden_service/hostname.
- •Caddy may require a site block for the onion domain, and the onion site is served over HTTP since HTTPS certificates for .onion aren’t available.