Tor Onion Relays with Linux clients is extremely good for censorship.
You have two choices, your Tor method and your Nostr client.
Mobile
For Tor on mobile, with a client such as Amethyst, your choices are:
Orbot
InvizPro
Keep in mind that both of these do NOT switch Tor circuits for different apps like Whonix does. So the Tor exit sees your other apps, which if they are something like a KYC Telegram or Signal number, doxes your Nostr account.
If you’re just doing random fun shit, who cares. But if you really care, then you can either do different profiles on Graphene, toggle networking off, or use Calyx’s firewall app.
Desktop
For Tor on desktop, with a client such as Gossip, your choices are:
Whonix
TailsOS
Torify CLI
ParrotOS (all one circuit, but real easy/simple for n00bs)
KaliTorify (all one circuit)
I recommend Gossip in Whonix, with KVM (or Tails).
But you can do Tails if you’re willing to reinstall it everytime from dot files which is a minor pain.
I do not recommend “naked” Torify CLI, because it’s very prone to you forgetting and running it on clearweb accidentally.
Here is our previous guide on speeding up Gossip for Tor use.
Onion relays:
oxtrdevav64z64yb7x6rjg4ntzqjhedm5b5zjqulugknhzr46ny2qbad.onion,
bitcoinr6de5lkvx4tpwdmzrdfdpla5sya2afwpcabjup2xpi5dulbad.onion, 2jsnlhfnelig5acq6iacydmzdbdmg7xwunm4xl6qwbvzacw4lwrjmlyd.onion, skzzn6cimfdv5e2phjc4yr5v7ikbxtn5f7dkwn5c7v47tduzlbosqmqd.onion,
nostrland2gdw7g3y77ctftovvil76vquipymo7tsctlxpiwknevzfid.onion
Conclusion
Tor Relays are relatively new, but promising. If you want to take your privacy to the next level, follow us on Nostr. Public Key:
npub14slk4lshtylkrqg9z0dvng09gn58h88frvnax7uga3v0h25szj4qzjt5d6