<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Nix on Francesco</title><link>http://francesco.cc/tags/nix/</link><description>Recent content in Nix on Francesco</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 29 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="http://francesco.cc/tags/nix/index.xml" rel="self" type="application/rss+xml"/><item><title>Implementing "networking.tor" in NixOS</title><link>http://francesco.cc/posts/implementing_networking_tor_in_nixos/</link><pubDate>Wed, 29 Apr 2026 00:00:00 +0000</pubDate><guid>http://francesco.cc/posts/implementing_networking_tor_in_nixos/</guid><description>&lt;h2 id="introduction">Introduction&lt;/h2>
&lt;p>During the years, I&amp;rsquo;ve been struggling to build the perfect onion routing
system. The idea of producing only noise for network observers has always been
fascinating. You know, surfing the web knowing no one knows who you are and
stuff. On top of that, I just &lt;a href="https://github.com/deade1e/lor">rewrote&lt;/a> the
entire Tor protocol back in 2015, so it might just be an obsession.&lt;/p>
&lt;p>You could say, &amp;ldquo;bro, relax, no one is watching you.&amp;rdquo; &lt;strong>Yes&amp;hellip; but not
actually.&lt;/strong> During my career, I had the opportunity to use some very costly
instrumentation that made me able to &lt;strong>track down threat actors to their home
IP addresses&lt;/strong>. Such software is built on a massive, global-scale data
collection process.&lt;/p></description></item></channel></rss>