Forcing .onion on Project

From Kicksecure
Jump to navigation Jump to search



Info Note:

  • Consistent use of the Kicksecure ™ onion service affords several benefits. It provides alternative end-to-end encryption which is independent from SSL certificate authorities and the mainstream Domain Name System and it also reduces the load on Tor exit nodes.

The onion domain of Kicksecure ™ is w5j6stm77zs6652pgsij4awcjeel3eco7kvipheu6mtr623eyyehj4yd.onion.


Or in machine readable format, here is a raw link that only shows the onion: raw

To use .onion services when browsing Kicksecure ™.org follow the links below to the Kicksecure ™ main page, homepage, forums, download page, phabricator site, or the Kicksecure ™ Debian repository.

Once a user rule is configured, no further intervention is needed to seamlessly browse the Kicksecure ™ .onion address. Note that if a user rule is not configured, some resources from the clearnet Kicksecure ™.org address will be utilized when navigating the onion address. [1] Also note that on a few occasions in the past it was not possible to log in to the Kicksecure ™ forums using the onion address. [2] [3]


  • The user must have Tor Browser installed.
  • A recent (non-ancient) Tor version. [4]


  1. The reason is mediawiki, wordpress and discourse are using the primary Kicksecure ™ https domain. These webapps do not support multiple domains for the same website.
  3. This suggests the Kicksecure ™ forums onion address could become (temporarily) inaccessible in the future.
  4. v3 onion connections require Tor v3.2 or above.

Unfinished: This wiki is a work in progress. Please do not report broken links until this notice is removed, use Search Engines First and contribute improving this wiki.