There's Now a Dark Web Version of Wikipedia (vice.com) 20
An anonymous reader shares a report: In many parts of the world, like North America, using Wikipedia is taken for granted; hell, there are even Twitter accounts to track government employees editing the internet's free encyclopedia while on the clock. But in other places, like Turkey or Syria, using Wikipedia can be difficult, and even dangerous. To make using Wikipedia safer for at-risk users, former Facebook security engineer Alec Muffett has started an experimental dark net Wikipedia service that gives visitors some strong privacy protections. The project is unofficial; for now, Wikipedia isn't involved. So it's a bit janky. The service uses self-signed certificates that may trigger a security warning in Tor, so you have to manually white-list the addresses, which takes a couple minutes.
Secure Contexts (Score:5, Informative)
using https over tor is just stupid.
I can see two main reason why a site operator might try using HTTPS to connect to a web server over an otherwise secure channel, such as a hidden service on Tor or I2P.*
One reason is that not all parts of all browsers are aware that hidden services are secure channels. The W3C has published a spec titled Secure Contexts [w3.org], which recommends that web browsers block use of sensitive JavaScript APIs by non-secure sites [pineight.com]. Even script-free sites cause the browser to show a warning about an insecure context if a document contains a form, such as a login form or an editing form. Until user agents start treating hidden services (*.i2p and *.onion) as potentially trustworthy origins, sites using these APIs must use HTTPS to build a secure context.
Another reason relates to typosquatting. If a user mistypes a hidden service's hostname, such as facebookcorewwwi.onion [wikipedia.org], the user might end up connecting to a server controlled by an entity other than Facebook. To fight this, some certificate authorities have begun to offer Extended Validation certificates that apply to hidden services [digicert.com], assuring the user of the real-world identity of a hidden service's operator.
* The I2P community refers to hidden services as "eepsites".
Re: (Score:3)
What we need is a Wikipedia that can’t be reverted.
Such a site would quickly fill with spam. What measure would you recommend to prevent that?
Re: (Score:2)
What the heck is a 'questionable change'?
Highly informative Daily Mash article on Darknet (Score:1, Informative)
http://www.thedailymash.co.uk/... [thedailymash.co.uk]
I’m surprised (Score:5, Interesting)
The best option would be for Wikipedia itself to offer a connection directly via an .onion address - I’m a bit surprised Wikipedia doesn’t already do this, really.
On a side note... I still find it hilariously ironic that Facebook offers an .onion address.
Mmmm (Score:1)
Does it have an article on 'standard web', perhaps entitled 'Corporate-Shill-/Sammer-/Fed Web ?'
It's old (Score:2)
The danger is a censored-pedia (Score:2)
Places like China do not like many of Wikipedia's articles, like Tianamin square. But they do like most other articles, especially technical ones. So the solution is to clone Wikipedia, and so maintain "public order". Then ban all access to the original.
They could even helpfully push edits from the cloned pedia back to the main one for non-controversial subjects.
alternatives (Score:1)
One can use
$>lynx gopher://gopherpedia.com/1/ [gopherpedia.com]
or
$>torify lynx https://wikipedia.org/ [wikipedia.org]
PS - gopher via tor is indeed a thing...