Self-Hosted Gitea/Git on Tor
GitHub, GitLab, and Bitbucket require account verification and log extensive metadata about contributors. For open-source projects that need anonymous collaboration — security tools, whistleblowing software, censorship circumvention tools — self-hosting Gitea on Tor provides anonymous Git hosting where code contributions cannot be traced back to individuals. AnubizHost offers Tor hosting optimized for Git server deployments.
Need this done for your project?
We implement, you ship. Async, documented, done in days.
Why Host Git on Tor?
Source code hosting platforms are increasingly subject to government pressure. GitHub has blocked repositories in response to DMCA claims and government sanctions. Contributors to sensitive projects — security research, whistleblowing tools, censorship circumvention software — can be identified through their Git commit history and hosting account data.
- Anonymous contributions — Developers push code through Tor, hiding their IP address from the Git server
- Repository censorship resistance — .onion Git repositories cannot be taken down by DNS-level blocking or hosting provider pressure
- Operator anonymity — The server operator's identity is protected by the .onion address
- No platform dependency — Self-hosted Git eliminates reliance on corporate platforms that may change policies
Tor-hosted Git is the choice for projects where code freedom and contributor safety are non-negotiable.
Gitea and Forgejo on Tor
AnubizHost supports lightweight, self-hosted Git platforms ideal for Tor deployment:
- Gitea — A painless, self-hosted Git service written in Go. Fast, low resource usage, and feature-rich with pull requests, issues, CI/CD, and package registry.
- Forgejo — A community fork of Gitea focused on sustainability and community governance. Fully compatible with Gitea but with additional privacy features.
- cgit — An ultra-lightweight Git web interface in C. Minimal resource usage, ideal for read-only repository browsing on Tor.
- Bare Git + SSH — For maximum simplicity, expose bare Git repositories via Tor SSH without any web interface.
Gitea/Forgejo deployments include:
- Web UI accessible via .onion address
- Git SSH clone/push over Tor hidden service
- SQLite or PostgreSQL backend for issue tracking and user management
- Built-in CI/CD runners for automated testing (Gitea Actions)
Git Workflow Over Tor
Using Git over Tor requires some client-side configuration. AnubizHost provides documentation for common workflows:
- HTTP clone via Tor — Configure Git to use Tor SOCKS proxy:
git config --global http.proxy socks5h://127.0.0.1:9050 - SSH clone via Tor — Use
torsocks git clone ssh://[email protected]/repo.gitor configure~/.ssh/configwithProxyCommandfor Tor - Anonymous commits — Use a pseudonym for
git config user.nameand a disposable email foruser.email - GPG signing — Sign commits with a pseudonymous GPG key for authenticity without identity disclosure
For CI/CD pipelines, Gitea Actions runners can be configured to execute within the Tor network, keeping build artifacts and test results private.
Deploy Git on AnubizHost
Launch your anonymous Git hosting on Tor with AnubizHost. Our offshore servers in Iceland, Romania, and Finland provide privacy-friendly hosting for source code repositories.
- No KYC — Host your code repositories without identity verification
- Crypto payments — Bitcoin, Monero, Ethereum, and Litecoin accepted
- NVMe SSD storage — Fast disk I/O for Git operations and repository browsing
- Full root access — Install Gitea, Forgejo, or any Git server software via Tor SSH
- Zero logging — No records of who pushes code or clones repositories
Free software deserves free infrastructure. Choose a Tor Hosting plan and host your code where it cannot be censored or traced.
Related Services
Why Anubiz Labs
Ready to get started?
Skip the research. Tell us what you need, and we'll scope it, implement it, and hand it back — fully documented and production-ready.