How to use Private.Ki with Tor
Using Private.Ki with the Tor network is an excellent way to enhance your privacy and anonymity. Tor (The Onion Router) routes your internet traffic through multiple encrypted relays, hiding your IP address and location from the websites you visit – in this case, from Private.Ki’s servers.
Private.Ki not only supports access via Tor, we encourage privacy tools like Tor for users who require a high level of anonymity. Here’s how you can access Private.Ki through Tor and what to expect:
1. Download and Install Tor Browser
If you haven’t already, you’ll need the Tor Browser, which is a modified version of Firefox configured for Tor. It’s available for Windows, macOS, Linux, and even Android (Onion Browser exists for iOS). Download it from the official Tor Project website to ensure you get the legitimate version. Install it like you would any other browser.
2. Launch Tor Browser and Connect
Open the Tor Browser. It will automatically begin connecting to the Tor network. After a few moments, you should see a message that Tor is connected (usually it opens a page with a search bar and .onion links). Now you are ready to browse privately.
Tor Browser comes with some preset security settings:
By default, JavaScript is enabled in Tor Browser at the “Standard” security level, because many websites (like Private.Ki) need it. Keep the security level on Standard or Safer (if you set it to Safest, Tor Browser will disable JavaScript, which will prevent Private.Ki from working – see the previous section on why JS is needed).
Tor Browser also includes NoScript, but on Standard mode it will allow scripts for most sites. On higher security levels, you might need to temporarily allow Private.Ki’s scripts for the site to function.
3. Access Private.Ki via Tor
Now there are two ways to access Private.Ki with Tor:
Using Private.Ki’s regular website through Tor:
You can navigate to https://private.ki/ directly in the Tor Browser. This will route your connection through Tor exit nodes to our site. Our web server will see a Tor exit node IP address instead of your real IP. We do not block Tor; we welcome it. However, sometimes accessing via Tor can trigger additional verification (like a CAPTCHA) on some services to ensure you’re not a bot.
Private.Ki will endeavor to make Tor access smooth – if we use any anti-bot protection, we’ll make sure Tor users can get through (perhaps via CAPTCHA or by providing an onion service).
Using the normal site over Tor gives you anonymity, but note that the traffic from the Tor exit node to Private.Ki is standard HTTPS. It’s encrypted (TLS), so content is secure, but an observer could note “Tor user connecting to private.ki”. If you want to eliminate even that metadata (i.e., not even use an exit node to go to our clearnet domain), you should use the onion service if available.
Using Private.Ki’s .onion service (recommended):
Coming soon: We will have a dedicated Tor hidden service (.onion address) for Private.Ki. It will look like a string of letters and numbers ending in .onion. When you use this in Tor Browser, your entire connection stays inside the Tor network – there’s no exit node and our service is reached through Tor’s hidden service protocol, providing extra anonymity and integrity (and possibly faster Tor access).
4. Log in and Use Private.Ki as usual
Once on Private.Ki (whether via clearnet or onion through Tor), you can log in normally. All features – mail, messenger, etc. – should work. The experience will be largely the same, though you might find Tor is a bit slower than a direct connection (that’s normal due to the relays).
A few things to keep in mind while using Private.Ki with Tor:
Performance: Sending/receiving messages may be a bit slower. Large attachments might take longer to upload/download. Patience is key; it’s the trade-off for anonymity.
Staying Anonymous: When using Tor, avoid doing things that would deanonymize you. For instance, don’t log into accounts or websites in the same Tor Browser session that could reveal your identity (unless that’s your intention). Use a new Tor circuit or separate session for Private.Ki if you use it under a pseudonymous identity separate from other browsing.
JavaScript and Security Slider: As mentioned, keep the Tor Browser security slider at Standard for full functionality. If you raise it, make sure Private.Ki is allowed to run scripts, or else it won’t work. You could use the NoScript interface (click the “S” icon) to allow scripts just for Private.Ki while keeping other sites restricted, if you choose the Safer level.
Onion vs Clearnet: Prefer the onion site when possible, because it’s directly hosted by us and can be more reliable within Tor. The clearnet site through Tor is fine too, but occasionally Tor exit IPs might be temporarily flagged (e.g., if someone abused that IP). With the onion, you bypass exit nodes entirely.
Bookmark the Onion: To avoid phishing, make sure you have the correct onion URL. Bookmark it once you’re sure it’s correct (verify from our official announcement). That way you don’t mistype it.
Captchas (if any): We try to avoid annoying Tor users, but if you ever see a anti-bot CAPTCHA, just complete it. Once you’re in, you should have normal access.
Using Private.Ki over Tor provides a high degree of anonymity: not only is your content encrypted (as always), but our servers don’t see your real IP, and anyone observing your internet traffic cannot easily tell you’re using Private.Ki (especially if you use the onion service, which doesn’t even use DNS or public internet routing in the usual way).