diff --git a/_i18n/ar.yml b/_i18n/ar.yml
index 45148dbe0beb83a28199117a546549e996a0499a..bd7caee741562d147c82ec454c3dbc1a80c8106c 100644
--- a/_i18n/ar.yml
+++ b/_i18n/ar.yml
@@ -481,6 +481,7 @@ user-guides:
   nicehash: How to mine Monero XMR without a mining equipment
   ledger-wallet-cli: How to generate a Ledger Monero wallet with the CLI (monero-wallet-cli)
   multisig-messaging-system: Multisig transactions with MMS and CLI wallet
+  tor_wallet: Connecting your local wallet to your own daemon over Tor
 
 roadmap:
   translated: "yes"
diff --git a/_i18n/ar/resources/user-guides/tor_wallet.md b/_i18n/ar/resources/user-guides/tor_wallet.md
new file mode 100644
index 0000000000000000000000000000000000000000..aa44ff4f9d7e25347e2175ab57a03eed12adbb3f
--- /dev/null
+++ b/_i18n/ar/resources/user-guides/tor_wallet.md
@@ -0,0 +1,86 @@
+{% assign version = '1.1.0' | split: '.' %}
+{% include disclaimer.html translated="false" version=page.version %}
+
+Below we'll show an example configuration that allows you to run a Monero daemon (eg on a home server or VPS) that you can connect to from another computer running your wallet.  We do this over the Tor anonymity network to retrieve the transaction information needed by your wallet.  The benefit of this approach is that the daemon (`monerod`) can stay on all of the time sending / receiving blocks, while the wallet can connect when needed and have access to the full blockchain. [Monerujo](https://www.monerujo.io/) should also work via [Orbot](https://guardianproject.info/apps/org.torproject.android/).  Because Tor hidden services provide encryption and authentication, you can be confident that your RPC credentials will not be sent in the clear.  Tor also solves problems often seen on home servers related to port-forwarding, IP addresses changing, etc -- it just works.  This setup will also obfuscate the fact that you are connecting to a remote Monero node. Tested with Monero `v0.15.0.1` connecting a Mac laptop wallet to a remote Linux node (Ubuntu 18.04.2).
+
+## Create a Tor hidden service for RPC
+
+Make sure [Tor is installed](https://community.torproject.org/relay/setup/bridge/debian-ubuntu/) and running correctly, then proceed.
+
+We only need to configure the RPC server to run as a hidden service here on port `18081`.
+
+File: `/etc/torrc`
+
+```
+HiddenServiceDir /var/lib/tor/monero-service/
+HiddenServicePort 18081 127.0.0.1:18081
+```
+Restart Tor:
+```
+sudo systemctl restart tor@default
+```
+
+Make sure Tor started correctly:
+```
+sudo systemctl status tor@default.service
+```
+
+If everything looks good, make a note of the hidden service (onion address) name:
+```
+sudo cat /var/lib/tor/monero-service/hostname
+```
+It will be something like 4dcj312uxag2r6ye.onion -- use this for `HIDDEN_SERVICE` below.
+
+### Configure Daemon to allow RPC
+
+In this example, we don't use Tor for interacting with the p2p network, just to connect to the monero node, so only RPC hidden service is needed.
+
+File: `~/.bitmonero/bitmonero.conf` (in the home directory of the Monero user)
+
+```
+no-igd=1
+restricted-rpc=1
+rpc-login=USERNAME:PASSWORD
+```
+(Make up a USERNAME and PASSWORD to use for RPC)
+
+Restart the Daemon: `monerod stop_daemon; sleep 10; monerod --detach`
+
+Make sure the daemon started correctly:
+```
+tail -f ~/.bitmonero/bitmonero.log
+```
+
+## Connecting to your node from a local wallet
+
+Make sure you have Tor running locally so you can connect to the Tor network. One simple way on the Mac is to just start the Tor browser and use its Tor daemon.
+
+Then test a simple RPC command, eg:
+```
+curl --socks5-hostname 127.0.0.1:9150 -u USERNAME:PASSWORD --digest -X POST http://HIDDEN_SERVICE.onion:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'
+```
+Replace `USERNAME`, `PASSWORD`, and `HIDDEN_SERVICE` with values from above.  Change `9150` to another port if needed by your local Tor daemon.
+
+When you execute the command, you should get some info about the remote daemon if everything is working correctly.  If not, add a ` -v ` to the beginning and try to debug why it's not connecting, check firewalls, password, etc.
+
+Once it is working, you can connect using your cli wallet:
+```
+./monero-wallet-cli --proxy 127.0.0.1:9150 --daemon-host HIDDEN_SERVICE.onion --trusted-daemon --daemon-login USERNAME:PASSWORD --wallet-file ~/PATH/TO/YOUR/WALLET
+```
+Replace values above as needed.
+
+## GUI
+
+If you are interested in experimenting with the GUI over Tor, you can try `torsocks` (note this may leak info -- do not rely on it if your life depends on maintaining anonymity).  Here is an example on MacOS, adjust as needed for the Linux GUI:
+```
+torsocks --port 9150 /Applications/monero-wallet-gui.app/Contents/MacOS/monero-wallet-gui
+```
+
+This will allow the GUI to communicate with the Tor network.  Once the GUI is open and a wallet loaded, you must configure it to connect to your Tor hidden service by adding your onion address to:  "Settings > Node > Remote node > Address".
+
+In future versions of the GUI, we expect to add direct Tor / I2P support so that `torsocks` + commandline are not needed.
+
+# Additional resources
+
+* [ANONYMITY_NETWORKS.md](https://github.com/monero-project/monero/blob/master/ANONYMITY_NETWORKS.md)
+* [Using Tor](https://github.com/monero-project/monero#using-tor) (Monero README)
diff --git a/_i18n/de.yml b/_i18n/de.yml
index 31b224d16cbe0b2b84d6ff96b54aeb16df36a78d..51e1ed340904afa10dc1dfff6571828e1d14c70f 100644
--- a/_i18n/de.yml
+++ b/_i18n/de.yml
@@ -482,6 +482,7 @@ user-guides:
   nicehash: Monero (XMR) ohne spezielle Hardware minen
   ledger-wallet-cli: Eine Wallet mit Ledger erstellen (Befehlszeile)
   multisig-messaging-system: Multisig transactions with MMS and CLI wallet
+  tor_wallet: Connecting your local wallet to your own daemon over Tor
 
 roadmap:
   translated: "yes"
diff --git a/_i18n/de/resources/user-guides/tor_wallet.md b/_i18n/de/resources/user-guides/tor_wallet.md
new file mode 100644
index 0000000000000000000000000000000000000000..aa44ff4f9d7e25347e2175ab57a03eed12adbb3f
--- /dev/null
+++ b/_i18n/de/resources/user-guides/tor_wallet.md
@@ -0,0 +1,86 @@
+{% assign version = '1.1.0' | split: '.' %}
+{% include disclaimer.html translated="false" version=page.version %}
+
+Below we'll show an example configuration that allows you to run a Monero daemon (eg on a home server or VPS) that you can connect to from another computer running your wallet.  We do this over the Tor anonymity network to retrieve the transaction information needed by your wallet.  The benefit of this approach is that the daemon (`monerod`) can stay on all of the time sending / receiving blocks, while the wallet can connect when needed and have access to the full blockchain. [Monerujo](https://www.monerujo.io/) should also work via [Orbot](https://guardianproject.info/apps/org.torproject.android/).  Because Tor hidden services provide encryption and authentication, you can be confident that your RPC credentials will not be sent in the clear.  Tor also solves problems often seen on home servers related to port-forwarding, IP addresses changing, etc -- it just works.  This setup will also obfuscate the fact that you are connecting to a remote Monero node. Tested with Monero `v0.15.0.1` connecting a Mac laptop wallet to a remote Linux node (Ubuntu 18.04.2).
+
+## Create a Tor hidden service for RPC
+
+Make sure [Tor is installed](https://community.torproject.org/relay/setup/bridge/debian-ubuntu/) and running correctly, then proceed.
+
+We only need to configure the RPC server to run as a hidden service here on port `18081`.
+
+File: `/etc/torrc`
+
+```
+HiddenServiceDir /var/lib/tor/monero-service/
+HiddenServicePort 18081 127.0.0.1:18081
+```
+Restart Tor:
+```
+sudo systemctl restart tor@default
+```
+
+Make sure Tor started correctly:
+```
+sudo systemctl status tor@default.service
+```
+
+If everything looks good, make a note of the hidden service (onion address) name:
+```
+sudo cat /var/lib/tor/monero-service/hostname
+```
+It will be something like 4dcj312uxag2r6ye.onion -- use this for `HIDDEN_SERVICE` below.
+
+### Configure Daemon to allow RPC
+
+In this example, we don't use Tor for interacting with the p2p network, just to connect to the monero node, so only RPC hidden service is needed.
+
+File: `~/.bitmonero/bitmonero.conf` (in the home directory of the Monero user)
+
+```
+no-igd=1
+restricted-rpc=1
+rpc-login=USERNAME:PASSWORD
+```
+(Make up a USERNAME and PASSWORD to use for RPC)
+
+Restart the Daemon: `monerod stop_daemon; sleep 10; monerod --detach`
+
+Make sure the daemon started correctly:
+```
+tail -f ~/.bitmonero/bitmonero.log
+```
+
+## Connecting to your node from a local wallet
+
+Make sure you have Tor running locally so you can connect to the Tor network. One simple way on the Mac is to just start the Tor browser and use its Tor daemon.
+
+Then test a simple RPC command, eg:
+```
+curl --socks5-hostname 127.0.0.1:9150 -u USERNAME:PASSWORD --digest -X POST http://HIDDEN_SERVICE.onion:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'
+```
+Replace `USERNAME`, `PASSWORD`, and `HIDDEN_SERVICE` with values from above.  Change `9150` to another port if needed by your local Tor daemon.
+
+When you execute the command, you should get some info about the remote daemon if everything is working correctly.  If not, add a ` -v ` to the beginning and try to debug why it's not connecting, check firewalls, password, etc.
+
+Once it is working, you can connect using your cli wallet:
+```
+./monero-wallet-cli --proxy 127.0.0.1:9150 --daemon-host HIDDEN_SERVICE.onion --trusted-daemon --daemon-login USERNAME:PASSWORD --wallet-file ~/PATH/TO/YOUR/WALLET
+```
+Replace values above as needed.
+
+## GUI
+
+If you are interested in experimenting with the GUI over Tor, you can try `torsocks` (note this may leak info -- do not rely on it if your life depends on maintaining anonymity).  Here is an example on MacOS, adjust as needed for the Linux GUI:
+```
+torsocks --port 9150 /Applications/monero-wallet-gui.app/Contents/MacOS/monero-wallet-gui
+```
+
+This will allow the GUI to communicate with the Tor network.  Once the GUI is open and a wallet loaded, you must configure it to connect to your Tor hidden service by adding your onion address to:  "Settings > Node > Remote node > Address".
+
+In future versions of the GUI, we expect to add direct Tor / I2P support so that `torsocks` + commandline are not needed.
+
+# Additional resources
+
+* [ANONYMITY_NETWORKS.md](https://github.com/monero-project/monero/blob/master/ANONYMITY_NETWORKS.md)
+* [Using Tor](https://github.com/monero-project/monero#using-tor) (Monero README)
diff --git a/_i18n/en.yml b/_i18n/en.yml
index acea81b028e53177df52d79c2ba4c4788740df88..8197c4e5037c44fb7b109540a5d5444908619d8b 100644
--- a/_i18n/en.yml
+++ b/_i18n/en.yml
@@ -486,6 +486,7 @@ user-guides:
   nicehash: How to mine Monero XMR without a mining equipment
   ledger-wallet-cli: How to generate a Ledger Monero wallet with the CLI (monero-wallet-cli)
   multisig-messaging-system: Multisig transactions with MMS and CLI wallet
+  tor_wallet: Connecting your local wallet to your own daemon over Tor
 
 roadmap:
   translated: "yes"
diff --git a/_i18n/en/resources/user-guides/tor_wallet.md b/_i18n/en/resources/user-guides/tor_wallet.md
new file mode 100644
index 0000000000000000000000000000000000000000..0c57495c6141571d784f732f549f30f385bb88cb
--- /dev/null
+++ b/_i18n/en/resources/user-guides/tor_wallet.md
@@ -0,0 +1,86 @@
+{% assign version = '1.1.0' | split: '.' %}
+{% include disclaimer.html translated="true" version=page.version %}
+
+Below we'll show an example configuration that allows you to run a Monero daemon (eg on a home server or VPS) that you can connect to from another computer running your wallet.  We do this over the Tor anonymity network to retrieve the transaction information needed by your wallet.  The benefit of this approach is that the daemon (`monerod`) can stay on all of the time sending / receiving blocks, while the wallet can connect when needed and have access to the full blockchain. [Monerujo](https://www.monerujo.io/) should also work via [Orbot](https://guardianproject.info/apps/org.torproject.android/).  Because Tor hidden services provide encryption and authentication, you can be confident that your RPC credentials will not be sent in the clear.  Tor also solves problems often seen on home servers related to port-forwarding, IP addresses changing, etc -- it just works.  This setup will also obfuscate the fact that you are connecting to a remote Monero node. Tested with Monero `v0.15.0.1` connecting a Mac laptop wallet to a remote Linux node (Ubuntu 18.04.2).
+
+## Create a Tor hidden service for RPC
+
+Make sure [Tor is installed](https://community.torproject.org/relay/setup/bridge/debian-ubuntu/) and running correctly, then proceed.
+
+We only need to configure the RPC server to run as a hidden service here on port `18081`.
+
+File: `/etc/torrc`
+
+```
+HiddenServiceDir /var/lib/tor/monero-service/
+HiddenServicePort 18081 127.0.0.1:18081
+```
+Restart Tor:
+```
+sudo systemctl restart tor@default
+```
+
+Make sure Tor started correctly:
+```
+sudo systemctl status tor@default.service
+```
+
+If everything looks good, make a note of the hidden service (onion address) name:
+```
+sudo cat /var/lib/tor/monero-service/hostname
+```
+It will be something like 4dcj312uxag2r6ye.onion -- use this for `HIDDEN_SERVICE` below.
+
+### Configure Daemon to allow RPC
+
+In this example, we don't use Tor for interacting with the p2p network, just to connect to the monero node, so only RPC hidden service is needed.
+
+File: `~/.bitmonero/bitmonero.conf` (in the home directory of the Monero user)
+
+```
+no-igd=1
+restricted-rpc=1
+rpc-login=USERNAME:PASSWORD
+```
+(Make up a USERNAME and PASSWORD to use for RPC)
+
+Restart the Daemon: `monerod stop_daemon; sleep 10; monerod --detach`
+
+Make sure the daemon started correctly:
+```
+tail -f ~/.bitmonero/bitmonero.log
+```
+
+## Connecting to your node from a local wallet
+
+Make sure you have Tor running locally so you can connect to the Tor network. One simple way on the Mac is to just start the Tor browser and use its Tor daemon.
+
+Then test a simple RPC command, eg:
+```
+curl --socks5-hostname 127.0.0.1:9150 -u USERNAME:PASSWORD --digest -X POST http://HIDDEN_SERVICE.onion:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'
+```
+Replace `USERNAME`, `PASSWORD`, and `HIDDEN_SERVICE` with values from above.  Change `9150` to another port if needed by your local Tor daemon.
+
+When you execute the command, you should get some info about the remote daemon if everything is working correctly.  If not, add a ` -v ` to the beginning and try to debug why it's not connecting, check firewalls, password, etc.
+
+Once it is working, you can connect using your cli wallet:
+```
+./monero-wallet-cli --proxy 127.0.0.1:9150 --daemon-host HIDDEN_SERVICE.onion --trusted-daemon --daemon-login USERNAME:PASSWORD --wallet-file ~/PATH/TO/YOUR/WALLET
+```
+Replace values above as needed.
+
+## GUI
+
+If you are interested in experimenting with the GUI over Tor, you can try `torsocks` (note this may leak info -- do not rely on it if your life depends on maintaining anonymity).  Here is an example on MacOS, adjust as needed for the Linux GUI:
+```
+torsocks --port 9150 /Applications/monero-wallet-gui.app/Contents/MacOS/monero-wallet-gui
+```
+
+This will allow the GUI to communicate with the Tor network.  Once the GUI is open and a wallet loaded, you must configure it to connect to your Tor hidden service by adding your onion address to:  "Settings > Node > Remote node > Address".
+
+In future versions of the GUI, we expect to add direct Tor / I2P support so that `torsocks` + commandline are not needed.
+
+# Additional resources
+
+* [ANONYMITY_NETWORKS.md](https://github.com/monero-project/monero/blob/master/ANONYMITY_NETWORKS.md)
+* [Using Tor](https://github.com/monero-project/monero#using-tor) (Monero README)
diff --git a/_i18n/es.yml b/_i18n/es.yml
index 327776673c04245707820caa88664a17731826ef..69673241e90b298968285e99136bd932d9f24c01 100644
--- a/_i18n/es.yml
+++ b/_i18n/es.yml
@@ -482,6 +482,7 @@ user-guides:
   nicehash: Cómo minar Monero XMR sin un equipo de minado
   ledger-wallet-cli: Cómo generar un monedero Ledger Monero con la consola de comandos (monero-wallet-cli)
   multisig-messaging-system: Multisig transactions with MMS and CLI wallet
+  tor_wallet: Connecting your local wallet to your own daemon over Tor
 
 roadmap:
   translated: "Yes"
diff --git a/_i18n/es/resources/user-guides/tor_wallet.md b/_i18n/es/resources/user-guides/tor_wallet.md
new file mode 100644
index 0000000000000000000000000000000000000000..aa44ff4f9d7e25347e2175ab57a03eed12adbb3f
--- /dev/null
+++ b/_i18n/es/resources/user-guides/tor_wallet.md
@@ -0,0 +1,86 @@
+{% assign version = '1.1.0' | split: '.' %}
+{% include disclaimer.html translated="false" version=page.version %}
+
+Below we'll show an example configuration that allows you to run a Monero daemon (eg on a home server or VPS) that you can connect to from another computer running your wallet.  We do this over the Tor anonymity network to retrieve the transaction information needed by your wallet.  The benefit of this approach is that the daemon (`monerod`) can stay on all of the time sending / receiving blocks, while the wallet can connect when needed and have access to the full blockchain. [Monerujo](https://www.monerujo.io/) should also work via [Orbot](https://guardianproject.info/apps/org.torproject.android/).  Because Tor hidden services provide encryption and authentication, you can be confident that your RPC credentials will not be sent in the clear.  Tor also solves problems often seen on home servers related to port-forwarding, IP addresses changing, etc -- it just works.  This setup will also obfuscate the fact that you are connecting to a remote Monero node. Tested with Monero `v0.15.0.1` connecting a Mac laptop wallet to a remote Linux node (Ubuntu 18.04.2).
+
+## Create a Tor hidden service for RPC
+
+Make sure [Tor is installed](https://community.torproject.org/relay/setup/bridge/debian-ubuntu/) and running correctly, then proceed.
+
+We only need to configure the RPC server to run as a hidden service here on port `18081`.
+
+File: `/etc/torrc`
+
+```
+HiddenServiceDir /var/lib/tor/monero-service/
+HiddenServicePort 18081 127.0.0.1:18081
+```
+Restart Tor:
+```
+sudo systemctl restart tor@default
+```
+
+Make sure Tor started correctly:
+```
+sudo systemctl status tor@default.service
+```
+
+If everything looks good, make a note of the hidden service (onion address) name:
+```
+sudo cat /var/lib/tor/monero-service/hostname
+```
+It will be something like 4dcj312uxag2r6ye.onion -- use this for `HIDDEN_SERVICE` below.
+
+### Configure Daemon to allow RPC
+
+In this example, we don't use Tor for interacting with the p2p network, just to connect to the monero node, so only RPC hidden service is needed.
+
+File: `~/.bitmonero/bitmonero.conf` (in the home directory of the Monero user)
+
+```
+no-igd=1
+restricted-rpc=1
+rpc-login=USERNAME:PASSWORD
+```
+(Make up a USERNAME and PASSWORD to use for RPC)
+
+Restart the Daemon: `monerod stop_daemon; sleep 10; monerod --detach`
+
+Make sure the daemon started correctly:
+```
+tail -f ~/.bitmonero/bitmonero.log
+```
+
+## Connecting to your node from a local wallet
+
+Make sure you have Tor running locally so you can connect to the Tor network. One simple way on the Mac is to just start the Tor browser and use its Tor daemon.
+
+Then test a simple RPC command, eg:
+```
+curl --socks5-hostname 127.0.0.1:9150 -u USERNAME:PASSWORD --digest -X POST http://HIDDEN_SERVICE.onion:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'
+```
+Replace `USERNAME`, `PASSWORD`, and `HIDDEN_SERVICE` with values from above.  Change `9150` to another port if needed by your local Tor daemon.
+
+When you execute the command, you should get some info about the remote daemon if everything is working correctly.  If not, add a ` -v ` to the beginning and try to debug why it's not connecting, check firewalls, password, etc.
+
+Once it is working, you can connect using your cli wallet:
+```
+./monero-wallet-cli --proxy 127.0.0.1:9150 --daemon-host HIDDEN_SERVICE.onion --trusted-daemon --daemon-login USERNAME:PASSWORD --wallet-file ~/PATH/TO/YOUR/WALLET
+```
+Replace values above as needed.
+
+## GUI
+
+If you are interested in experimenting with the GUI over Tor, you can try `torsocks` (note this may leak info -- do not rely on it if your life depends on maintaining anonymity).  Here is an example on MacOS, adjust as needed for the Linux GUI:
+```
+torsocks --port 9150 /Applications/monero-wallet-gui.app/Contents/MacOS/monero-wallet-gui
+```
+
+This will allow the GUI to communicate with the Tor network.  Once the GUI is open and a wallet loaded, you must configure it to connect to your Tor hidden service by adding your onion address to:  "Settings > Node > Remote node > Address".
+
+In future versions of the GUI, we expect to add direct Tor / I2P support so that `torsocks` + commandline are not needed.
+
+# Additional resources
+
+* [ANONYMITY_NETWORKS.md](https://github.com/monero-project/monero/blob/master/ANONYMITY_NETWORKS.md)
+* [Using Tor](https://github.com/monero-project/monero#using-tor) (Monero README)
diff --git a/_i18n/fr.yml b/_i18n/fr.yml
index 71d0a4a209cecf168594dbf862f049723d6fab07..eb485681f18a8100407694e0fddac1ca5bd90c83 100644
--- a/_i18n/fr.yml
+++ b/_i18n/fr.yml
@@ -484,6 +484,7 @@ user-guides:
   nicehash: Comment miner Monero sans équipement d'extraction minière
   ledger-wallet-cli: Comment générer un portefeuille Monero Ledger avec la CLI (monero-wallet-cli)
   multisig-messaging-system: Transactions multi-signatures avec MMS et le portefeuille CLI
+  tor_wallet: Connecting your local wallet to your own daemon over Tor
 
 roadmap:
   translated: "yes"
diff --git a/_i18n/fr/resources/user-guides/tor_wallet.md b/_i18n/fr/resources/user-guides/tor_wallet.md
new file mode 100644
index 0000000000000000000000000000000000000000..aa44ff4f9d7e25347e2175ab57a03eed12adbb3f
--- /dev/null
+++ b/_i18n/fr/resources/user-guides/tor_wallet.md
@@ -0,0 +1,86 @@
+{% assign version = '1.1.0' | split: '.' %}
+{% include disclaimer.html translated="false" version=page.version %}
+
+Below we'll show an example configuration that allows you to run a Monero daemon (eg on a home server or VPS) that you can connect to from another computer running your wallet.  We do this over the Tor anonymity network to retrieve the transaction information needed by your wallet.  The benefit of this approach is that the daemon (`monerod`) can stay on all of the time sending / receiving blocks, while the wallet can connect when needed and have access to the full blockchain. [Monerujo](https://www.monerujo.io/) should also work via [Orbot](https://guardianproject.info/apps/org.torproject.android/).  Because Tor hidden services provide encryption and authentication, you can be confident that your RPC credentials will not be sent in the clear.  Tor also solves problems often seen on home servers related to port-forwarding, IP addresses changing, etc -- it just works.  This setup will also obfuscate the fact that you are connecting to a remote Monero node. Tested with Monero `v0.15.0.1` connecting a Mac laptop wallet to a remote Linux node (Ubuntu 18.04.2).
+
+## Create a Tor hidden service for RPC
+
+Make sure [Tor is installed](https://community.torproject.org/relay/setup/bridge/debian-ubuntu/) and running correctly, then proceed.
+
+We only need to configure the RPC server to run as a hidden service here on port `18081`.
+
+File: `/etc/torrc`
+
+```
+HiddenServiceDir /var/lib/tor/monero-service/
+HiddenServicePort 18081 127.0.0.1:18081
+```
+Restart Tor:
+```
+sudo systemctl restart tor@default
+```
+
+Make sure Tor started correctly:
+```
+sudo systemctl status tor@default.service
+```
+
+If everything looks good, make a note of the hidden service (onion address) name:
+```
+sudo cat /var/lib/tor/monero-service/hostname
+```
+It will be something like 4dcj312uxag2r6ye.onion -- use this for `HIDDEN_SERVICE` below.
+
+### Configure Daemon to allow RPC
+
+In this example, we don't use Tor for interacting with the p2p network, just to connect to the monero node, so only RPC hidden service is needed.
+
+File: `~/.bitmonero/bitmonero.conf` (in the home directory of the Monero user)
+
+```
+no-igd=1
+restricted-rpc=1
+rpc-login=USERNAME:PASSWORD
+```
+(Make up a USERNAME and PASSWORD to use for RPC)
+
+Restart the Daemon: `monerod stop_daemon; sleep 10; monerod --detach`
+
+Make sure the daemon started correctly:
+```
+tail -f ~/.bitmonero/bitmonero.log
+```
+
+## Connecting to your node from a local wallet
+
+Make sure you have Tor running locally so you can connect to the Tor network. One simple way on the Mac is to just start the Tor browser and use its Tor daemon.
+
+Then test a simple RPC command, eg:
+```
+curl --socks5-hostname 127.0.0.1:9150 -u USERNAME:PASSWORD --digest -X POST http://HIDDEN_SERVICE.onion:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'
+```
+Replace `USERNAME`, `PASSWORD`, and `HIDDEN_SERVICE` with values from above.  Change `9150` to another port if needed by your local Tor daemon.
+
+When you execute the command, you should get some info about the remote daemon if everything is working correctly.  If not, add a ` -v ` to the beginning and try to debug why it's not connecting, check firewalls, password, etc.
+
+Once it is working, you can connect using your cli wallet:
+```
+./monero-wallet-cli --proxy 127.0.0.1:9150 --daemon-host HIDDEN_SERVICE.onion --trusted-daemon --daemon-login USERNAME:PASSWORD --wallet-file ~/PATH/TO/YOUR/WALLET
+```
+Replace values above as needed.
+
+## GUI
+
+If you are interested in experimenting with the GUI over Tor, you can try `torsocks` (note this may leak info -- do not rely on it if your life depends on maintaining anonymity).  Here is an example on MacOS, adjust as needed for the Linux GUI:
+```
+torsocks --port 9150 /Applications/monero-wallet-gui.app/Contents/MacOS/monero-wallet-gui
+```
+
+This will allow the GUI to communicate with the Tor network.  Once the GUI is open and a wallet loaded, you must configure it to connect to your Tor hidden service by adding your onion address to:  "Settings > Node > Remote node > Address".
+
+In future versions of the GUI, we expect to add direct Tor / I2P support so that `torsocks` + commandline are not needed.
+
+# Additional resources
+
+* [ANONYMITY_NETWORKS.md](https://github.com/monero-project/monero/blob/master/ANONYMITY_NETWORKS.md)
+* [Using Tor](https://github.com/monero-project/monero#using-tor) (Monero README)
diff --git a/_i18n/it.yml b/_i18n/it.yml
index a9aeba91d961a436b486006c8152e585a1c409ac..49b85ce4ea7e6060900a7a6b767467bdf5a0abff 100644
--- a/_i18n/it.yml
+++ b/_i18n/it.yml
@@ -481,6 +481,7 @@ user-guides:
   nicehash: Come minare Monero XMR senza equipaggimento per minatori
   ledger-wallet-cli: Come generare un portafoglio Leger Monero con la CLI (monero-wallet-cli)
   multisig-messaging-system: Transazione multifirma con MMS e portafoglio CLI
+  tor_wallet: Connecting your local wallet to your own daemon over Tor
 
 roadmap:
   translated: "yes"
diff --git a/_i18n/it/resources/user-guides/tor_wallet.md b/_i18n/it/resources/user-guides/tor_wallet.md
new file mode 100644
index 0000000000000000000000000000000000000000..aa44ff4f9d7e25347e2175ab57a03eed12adbb3f
--- /dev/null
+++ b/_i18n/it/resources/user-guides/tor_wallet.md
@@ -0,0 +1,86 @@
+{% assign version = '1.1.0' | split: '.' %}
+{% include disclaimer.html translated="false" version=page.version %}
+
+Below we'll show an example configuration that allows you to run a Monero daemon (eg on a home server or VPS) that you can connect to from another computer running your wallet.  We do this over the Tor anonymity network to retrieve the transaction information needed by your wallet.  The benefit of this approach is that the daemon (`monerod`) can stay on all of the time sending / receiving blocks, while the wallet can connect when needed and have access to the full blockchain. [Monerujo](https://www.monerujo.io/) should also work via [Orbot](https://guardianproject.info/apps/org.torproject.android/).  Because Tor hidden services provide encryption and authentication, you can be confident that your RPC credentials will not be sent in the clear.  Tor also solves problems often seen on home servers related to port-forwarding, IP addresses changing, etc -- it just works.  This setup will also obfuscate the fact that you are connecting to a remote Monero node. Tested with Monero `v0.15.0.1` connecting a Mac laptop wallet to a remote Linux node (Ubuntu 18.04.2).
+
+## Create a Tor hidden service for RPC
+
+Make sure [Tor is installed](https://community.torproject.org/relay/setup/bridge/debian-ubuntu/) and running correctly, then proceed.
+
+We only need to configure the RPC server to run as a hidden service here on port `18081`.
+
+File: `/etc/torrc`
+
+```
+HiddenServiceDir /var/lib/tor/monero-service/
+HiddenServicePort 18081 127.0.0.1:18081
+```
+Restart Tor:
+```
+sudo systemctl restart tor@default
+```
+
+Make sure Tor started correctly:
+```
+sudo systemctl status tor@default.service
+```
+
+If everything looks good, make a note of the hidden service (onion address) name:
+```
+sudo cat /var/lib/tor/monero-service/hostname
+```
+It will be something like 4dcj312uxag2r6ye.onion -- use this for `HIDDEN_SERVICE` below.
+
+### Configure Daemon to allow RPC
+
+In this example, we don't use Tor for interacting with the p2p network, just to connect to the monero node, so only RPC hidden service is needed.
+
+File: `~/.bitmonero/bitmonero.conf` (in the home directory of the Monero user)
+
+```
+no-igd=1
+restricted-rpc=1
+rpc-login=USERNAME:PASSWORD
+```
+(Make up a USERNAME and PASSWORD to use for RPC)
+
+Restart the Daemon: `monerod stop_daemon; sleep 10; monerod --detach`
+
+Make sure the daemon started correctly:
+```
+tail -f ~/.bitmonero/bitmonero.log
+```
+
+## Connecting to your node from a local wallet
+
+Make sure you have Tor running locally so you can connect to the Tor network. One simple way on the Mac is to just start the Tor browser and use its Tor daemon.
+
+Then test a simple RPC command, eg:
+```
+curl --socks5-hostname 127.0.0.1:9150 -u USERNAME:PASSWORD --digest -X POST http://HIDDEN_SERVICE.onion:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'
+```
+Replace `USERNAME`, `PASSWORD`, and `HIDDEN_SERVICE` with values from above.  Change `9150` to another port if needed by your local Tor daemon.
+
+When you execute the command, you should get some info about the remote daemon if everything is working correctly.  If not, add a ` -v ` to the beginning and try to debug why it's not connecting, check firewalls, password, etc.
+
+Once it is working, you can connect using your cli wallet:
+```
+./monero-wallet-cli --proxy 127.0.0.1:9150 --daemon-host HIDDEN_SERVICE.onion --trusted-daemon --daemon-login USERNAME:PASSWORD --wallet-file ~/PATH/TO/YOUR/WALLET
+```
+Replace values above as needed.
+
+## GUI
+
+If you are interested in experimenting with the GUI over Tor, you can try `torsocks` (note this may leak info -- do not rely on it if your life depends on maintaining anonymity).  Here is an example on MacOS, adjust as needed for the Linux GUI:
+```
+torsocks --port 9150 /Applications/monero-wallet-gui.app/Contents/MacOS/monero-wallet-gui
+```
+
+This will allow the GUI to communicate with the Tor network.  Once the GUI is open and a wallet loaded, you must configure it to connect to your Tor hidden service by adding your onion address to:  "Settings > Node > Remote node > Address".
+
+In future versions of the GUI, we expect to add direct Tor / I2P support so that `torsocks` + commandline are not needed.
+
+# Additional resources
+
+* [ANONYMITY_NETWORKS.md](https://github.com/monero-project/monero/blob/master/ANONYMITY_NETWORKS.md)
+* [Using Tor](https://github.com/monero-project/monero#using-tor) (Monero README)
diff --git a/_i18n/nl.yml b/_i18n/nl.yml
index 0b48bcd8fd7fc3fc05a7365313a64e2dc4950dc3..cf927692462440fb5ae1823035537c11e58f50b0 100644
--- a/_i18n/nl.yml
+++ b/_i18n/nl.yml
@@ -483,6 +483,7 @@ user-guides:
   nicehash: Monero (XMR) minen zonder miningapparatuur
   ledger-wallet-cli: Een Monero-portemonnee op een Ledger maken met de opdrachtregel (monero-wallet-cli)
   multisig-messaging-system: Multisig transactions with MMS and CLI wallet
+  tor_wallet: Connecting your local wallet to your own daemon over Tor
 
 roadmap:
   translated: "yes"
diff --git a/_i18n/nl/resources/user-guides/tor_wallet.md b/_i18n/nl/resources/user-guides/tor_wallet.md
new file mode 100644
index 0000000000000000000000000000000000000000..aa44ff4f9d7e25347e2175ab57a03eed12adbb3f
--- /dev/null
+++ b/_i18n/nl/resources/user-guides/tor_wallet.md
@@ -0,0 +1,86 @@
+{% assign version = '1.1.0' | split: '.' %}
+{% include disclaimer.html translated="false" version=page.version %}
+
+Below we'll show an example configuration that allows you to run a Monero daemon (eg on a home server or VPS) that you can connect to from another computer running your wallet.  We do this over the Tor anonymity network to retrieve the transaction information needed by your wallet.  The benefit of this approach is that the daemon (`monerod`) can stay on all of the time sending / receiving blocks, while the wallet can connect when needed and have access to the full blockchain. [Monerujo](https://www.monerujo.io/) should also work via [Orbot](https://guardianproject.info/apps/org.torproject.android/).  Because Tor hidden services provide encryption and authentication, you can be confident that your RPC credentials will not be sent in the clear.  Tor also solves problems often seen on home servers related to port-forwarding, IP addresses changing, etc -- it just works.  This setup will also obfuscate the fact that you are connecting to a remote Monero node. Tested with Monero `v0.15.0.1` connecting a Mac laptop wallet to a remote Linux node (Ubuntu 18.04.2).
+
+## Create a Tor hidden service for RPC
+
+Make sure [Tor is installed](https://community.torproject.org/relay/setup/bridge/debian-ubuntu/) and running correctly, then proceed.
+
+We only need to configure the RPC server to run as a hidden service here on port `18081`.
+
+File: `/etc/torrc`
+
+```
+HiddenServiceDir /var/lib/tor/monero-service/
+HiddenServicePort 18081 127.0.0.1:18081
+```
+Restart Tor:
+```
+sudo systemctl restart tor@default
+```
+
+Make sure Tor started correctly:
+```
+sudo systemctl status tor@default.service
+```
+
+If everything looks good, make a note of the hidden service (onion address) name:
+```
+sudo cat /var/lib/tor/monero-service/hostname
+```
+It will be something like 4dcj312uxag2r6ye.onion -- use this for `HIDDEN_SERVICE` below.
+
+### Configure Daemon to allow RPC
+
+In this example, we don't use Tor for interacting with the p2p network, just to connect to the monero node, so only RPC hidden service is needed.
+
+File: `~/.bitmonero/bitmonero.conf` (in the home directory of the Monero user)
+
+```
+no-igd=1
+restricted-rpc=1
+rpc-login=USERNAME:PASSWORD
+```
+(Make up a USERNAME and PASSWORD to use for RPC)
+
+Restart the Daemon: `monerod stop_daemon; sleep 10; monerod --detach`
+
+Make sure the daemon started correctly:
+```
+tail -f ~/.bitmonero/bitmonero.log
+```
+
+## Connecting to your node from a local wallet
+
+Make sure you have Tor running locally so you can connect to the Tor network. One simple way on the Mac is to just start the Tor browser and use its Tor daemon.
+
+Then test a simple RPC command, eg:
+```
+curl --socks5-hostname 127.0.0.1:9150 -u USERNAME:PASSWORD --digest -X POST http://HIDDEN_SERVICE.onion:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'
+```
+Replace `USERNAME`, `PASSWORD`, and `HIDDEN_SERVICE` with values from above.  Change `9150` to another port if needed by your local Tor daemon.
+
+When you execute the command, you should get some info about the remote daemon if everything is working correctly.  If not, add a ` -v ` to the beginning and try to debug why it's not connecting, check firewalls, password, etc.
+
+Once it is working, you can connect using your cli wallet:
+```
+./monero-wallet-cli --proxy 127.0.0.1:9150 --daemon-host HIDDEN_SERVICE.onion --trusted-daemon --daemon-login USERNAME:PASSWORD --wallet-file ~/PATH/TO/YOUR/WALLET
+```
+Replace values above as needed.
+
+## GUI
+
+If you are interested in experimenting with the GUI over Tor, you can try `torsocks` (note this may leak info -- do not rely on it if your life depends on maintaining anonymity).  Here is an example on MacOS, adjust as needed for the Linux GUI:
+```
+torsocks --port 9150 /Applications/monero-wallet-gui.app/Contents/MacOS/monero-wallet-gui
+```
+
+This will allow the GUI to communicate with the Tor network.  Once the GUI is open and a wallet loaded, you must configure it to connect to your Tor hidden service by adding your onion address to:  "Settings > Node > Remote node > Address".
+
+In future versions of the GUI, we expect to add direct Tor / I2P support so that `torsocks` + commandline are not needed.
+
+# Additional resources
+
+* [ANONYMITY_NETWORKS.md](https://github.com/monero-project/monero/blob/master/ANONYMITY_NETWORKS.md)
+* [Using Tor](https://github.com/monero-project/monero#using-tor) (Monero README)
diff --git a/_i18n/pl.yml b/_i18n/pl.yml
index 01a919bc43252ed874ce74252d695cfe4a8d6b6f..ee924e2d00d425ae280596a168440974e74f629b 100644
--- a/_i18n/pl.yml
+++ b/_i18n/pl.yml
@@ -483,6 +483,7 @@ user-guides:
   nicehash: Jak wydobywać Monero (XMR) bez sprzętu wydobywczego
   ledger-wallet-cli: How to generate a Ledger Monero wallet with the CLI (monero-wallet-cli)
   multisig-messaging-system: Multisig transactions with MMS and CLI wallet
+  tor_wallet: Connecting your local wallet to your own daemon over Tor
 
 roadmap:
   translated: "yes"
diff --git a/_i18n/pl/resources/user-guides/tor_wallet.md b/_i18n/pl/resources/user-guides/tor_wallet.md
new file mode 100644
index 0000000000000000000000000000000000000000..aa44ff4f9d7e25347e2175ab57a03eed12adbb3f
--- /dev/null
+++ b/_i18n/pl/resources/user-guides/tor_wallet.md
@@ -0,0 +1,86 @@
+{% assign version = '1.1.0' | split: '.' %}
+{% include disclaimer.html translated="false" version=page.version %}
+
+Below we'll show an example configuration that allows you to run a Monero daemon (eg on a home server or VPS) that you can connect to from another computer running your wallet.  We do this over the Tor anonymity network to retrieve the transaction information needed by your wallet.  The benefit of this approach is that the daemon (`monerod`) can stay on all of the time sending / receiving blocks, while the wallet can connect when needed and have access to the full blockchain. [Monerujo](https://www.monerujo.io/) should also work via [Orbot](https://guardianproject.info/apps/org.torproject.android/).  Because Tor hidden services provide encryption and authentication, you can be confident that your RPC credentials will not be sent in the clear.  Tor also solves problems often seen on home servers related to port-forwarding, IP addresses changing, etc -- it just works.  This setup will also obfuscate the fact that you are connecting to a remote Monero node. Tested with Monero `v0.15.0.1` connecting a Mac laptop wallet to a remote Linux node (Ubuntu 18.04.2).
+
+## Create a Tor hidden service for RPC
+
+Make sure [Tor is installed](https://community.torproject.org/relay/setup/bridge/debian-ubuntu/) and running correctly, then proceed.
+
+We only need to configure the RPC server to run as a hidden service here on port `18081`.
+
+File: `/etc/torrc`
+
+```
+HiddenServiceDir /var/lib/tor/monero-service/
+HiddenServicePort 18081 127.0.0.1:18081
+```
+Restart Tor:
+```
+sudo systemctl restart tor@default
+```
+
+Make sure Tor started correctly:
+```
+sudo systemctl status tor@default.service
+```
+
+If everything looks good, make a note of the hidden service (onion address) name:
+```
+sudo cat /var/lib/tor/monero-service/hostname
+```
+It will be something like 4dcj312uxag2r6ye.onion -- use this for `HIDDEN_SERVICE` below.
+
+### Configure Daemon to allow RPC
+
+In this example, we don't use Tor for interacting with the p2p network, just to connect to the monero node, so only RPC hidden service is needed.
+
+File: `~/.bitmonero/bitmonero.conf` (in the home directory of the Monero user)
+
+```
+no-igd=1
+restricted-rpc=1
+rpc-login=USERNAME:PASSWORD
+```
+(Make up a USERNAME and PASSWORD to use for RPC)
+
+Restart the Daemon: `monerod stop_daemon; sleep 10; monerod --detach`
+
+Make sure the daemon started correctly:
+```
+tail -f ~/.bitmonero/bitmonero.log
+```
+
+## Connecting to your node from a local wallet
+
+Make sure you have Tor running locally so you can connect to the Tor network. One simple way on the Mac is to just start the Tor browser and use its Tor daemon.
+
+Then test a simple RPC command, eg:
+```
+curl --socks5-hostname 127.0.0.1:9150 -u USERNAME:PASSWORD --digest -X POST http://HIDDEN_SERVICE.onion:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'
+```
+Replace `USERNAME`, `PASSWORD`, and `HIDDEN_SERVICE` with values from above.  Change `9150` to another port if needed by your local Tor daemon.
+
+When you execute the command, you should get some info about the remote daemon if everything is working correctly.  If not, add a ` -v ` to the beginning and try to debug why it's not connecting, check firewalls, password, etc.
+
+Once it is working, you can connect using your cli wallet:
+```
+./monero-wallet-cli --proxy 127.0.0.1:9150 --daemon-host HIDDEN_SERVICE.onion --trusted-daemon --daemon-login USERNAME:PASSWORD --wallet-file ~/PATH/TO/YOUR/WALLET
+```
+Replace values above as needed.
+
+## GUI
+
+If you are interested in experimenting with the GUI over Tor, you can try `torsocks` (note this may leak info -- do not rely on it if your life depends on maintaining anonymity).  Here is an example on MacOS, adjust as needed for the Linux GUI:
+```
+torsocks --port 9150 /Applications/monero-wallet-gui.app/Contents/MacOS/monero-wallet-gui
+```
+
+This will allow the GUI to communicate with the Tor network.  Once the GUI is open and a wallet loaded, you must configure it to connect to your Tor hidden service by adding your onion address to:  "Settings > Node > Remote node > Address".
+
+In future versions of the GUI, we expect to add direct Tor / I2P support so that `torsocks` + commandline are not needed.
+
+# Additional resources
+
+* [ANONYMITY_NETWORKS.md](https://github.com/monero-project/monero/blob/master/ANONYMITY_NETWORKS.md)
+* [Using Tor](https://github.com/monero-project/monero#using-tor) (Monero README)
diff --git a/_i18n/pt-br.yml b/_i18n/pt-br.yml
index ba3edcae1b0135649c22d98dc4483501501c9247..1b253d0a764224ce878522c8f721b15301bcbe15 100644
--- a/_i18n/pt-br.yml
+++ b/_i18n/pt-br.yml
@@ -482,6 +482,7 @@ user-guides:
   nicehash: Como minerar Monero XMR sem equipamento de mineração
   ledger-wallet-cli: Como criar uma carteira Monero na Ledger usando o CLI (monero-wallet-cli)
   multisig-messaging-system: Multisig transactions with MMS and CLI wallet
+  tor_wallet: Connecting your local wallet to your own daemon over Tor
 
 roadmap:
   translated: "yes"
diff --git a/_i18n/pt-br/resources/user-guides/tor_wallet.md b/_i18n/pt-br/resources/user-guides/tor_wallet.md
new file mode 100644
index 0000000000000000000000000000000000000000..aa44ff4f9d7e25347e2175ab57a03eed12adbb3f
--- /dev/null
+++ b/_i18n/pt-br/resources/user-guides/tor_wallet.md
@@ -0,0 +1,86 @@
+{% assign version = '1.1.0' | split: '.' %}
+{% include disclaimer.html translated="false" version=page.version %}
+
+Below we'll show an example configuration that allows you to run a Monero daemon (eg on a home server or VPS) that you can connect to from another computer running your wallet.  We do this over the Tor anonymity network to retrieve the transaction information needed by your wallet.  The benefit of this approach is that the daemon (`monerod`) can stay on all of the time sending / receiving blocks, while the wallet can connect when needed and have access to the full blockchain. [Monerujo](https://www.monerujo.io/) should also work via [Orbot](https://guardianproject.info/apps/org.torproject.android/).  Because Tor hidden services provide encryption and authentication, you can be confident that your RPC credentials will not be sent in the clear.  Tor also solves problems often seen on home servers related to port-forwarding, IP addresses changing, etc -- it just works.  This setup will also obfuscate the fact that you are connecting to a remote Monero node. Tested with Monero `v0.15.0.1` connecting a Mac laptop wallet to a remote Linux node (Ubuntu 18.04.2).
+
+## Create a Tor hidden service for RPC
+
+Make sure [Tor is installed](https://community.torproject.org/relay/setup/bridge/debian-ubuntu/) and running correctly, then proceed.
+
+We only need to configure the RPC server to run as a hidden service here on port `18081`.
+
+File: `/etc/torrc`
+
+```
+HiddenServiceDir /var/lib/tor/monero-service/
+HiddenServicePort 18081 127.0.0.1:18081
+```
+Restart Tor:
+```
+sudo systemctl restart tor@default
+```
+
+Make sure Tor started correctly:
+```
+sudo systemctl status tor@default.service
+```
+
+If everything looks good, make a note of the hidden service (onion address) name:
+```
+sudo cat /var/lib/tor/monero-service/hostname
+```
+It will be something like 4dcj312uxag2r6ye.onion -- use this for `HIDDEN_SERVICE` below.
+
+### Configure Daemon to allow RPC
+
+In this example, we don't use Tor for interacting with the p2p network, just to connect to the monero node, so only RPC hidden service is needed.
+
+File: `~/.bitmonero/bitmonero.conf` (in the home directory of the Monero user)
+
+```
+no-igd=1
+restricted-rpc=1
+rpc-login=USERNAME:PASSWORD
+```
+(Make up a USERNAME and PASSWORD to use for RPC)
+
+Restart the Daemon: `monerod stop_daemon; sleep 10; monerod --detach`
+
+Make sure the daemon started correctly:
+```
+tail -f ~/.bitmonero/bitmonero.log
+```
+
+## Connecting to your node from a local wallet
+
+Make sure you have Tor running locally so you can connect to the Tor network. One simple way on the Mac is to just start the Tor browser and use its Tor daemon.
+
+Then test a simple RPC command, eg:
+```
+curl --socks5-hostname 127.0.0.1:9150 -u USERNAME:PASSWORD --digest -X POST http://HIDDEN_SERVICE.onion:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'
+```
+Replace `USERNAME`, `PASSWORD`, and `HIDDEN_SERVICE` with values from above.  Change `9150` to another port if needed by your local Tor daemon.
+
+When you execute the command, you should get some info about the remote daemon if everything is working correctly.  If not, add a ` -v ` to the beginning and try to debug why it's not connecting, check firewalls, password, etc.
+
+Once it is working, you can connect using your cli wallet:
+```
+./monero-wallet-cli --proxy 127.0.0.1:9150 --daemon-host HIDDEN_SERVICE.onion --trusted-daemon --daemon-login USERNAME:PASSWORD --wallet-file ~/PATH/TO/YOUR/WALLET
+```
+Replace values above as needed.
+
+## GUI
+
+If you are interested in experimenting with the GUI over Tor, you can try `torsocks` (note this may leak info -- do not rely on it if your life depends on maintaining anonymity).  Here is an example on MacOS, adjust as needed for the Linux GUI:
+```
+torsocks --port 9150 /Applications/monero-wallet-gui.app/Contents/MacOS/monero-wallet-gui
+```
+
+This will allow the GUI to communicate with the Tor network.  Once the GUI is open and a wallet loaded, you must configure it to connect to your Tor hidden service by adding your onion address to:  "Settings > Node > Remote node > Address".
+
+In future versions of the GUI, we expect to add direct Tor / I2P support so that `torsocks` + commandline are not needed.
+
+# Additional resources
+
+* [ANONYMITY_NETWORKS.md](https://github.com/monero-project/monero/blob/master/ANONYMITY_NETWORKS.md)
+* [Using Tor](https://github.com/monero-project/monero#using-tor) (Monero README)
diff --git a/_i18n/ru.yml b/_i18n/ru.yml
index a9af4806fba70e768f64a21a5459ed21256258c1..f3a880820b09149c37355f7cbb392fc40a469542 100644
--- a/_i18n/ru.yml
+++ b/_i18n/ru.yml
@@ -474,6 +474,7 @@ user-guides:
   nicehash: Как заниматься майнингом Monero, не имея оборудования для майнинга
   ledger-wallet-cli: Как создать Ledger Monero кошелек с помощью CLI (monero-wallet-cli)
   multisig-messaging-system: Multisig-транзакции с MMS и CLI кошельком
+  tor_wallet: Connecting your local wallet to your own daemon over Tor
 
 roadmap:
   translated: "yes"
diff --git a/_i18n/ru/resources/user-guides/tor_wallet.md b/_i18n/ru/resources/user-guides/tor_wallet.md
new file mode 100644
index 0000000000000000000000000000000000000000..aa44ff4f9d7e25347e2175ab57a03eed12adbb3f
--- /dev/null
+++ b/_i18n/ru/resources/user-guides/tor_wallet.md
@@ -0,0 +1,86 @@
+{% assign version = '1.1.0' | split: '.' %}
+{% include disclaimer.html translated="false" version=page.version %}
+
+Below we'll show an example configuration that allows you to run a Monero daemon (eg on a home server or VPS) that you can connect to from another computer running your wallet.  We do this over the Tor anonymity network to retrieve the transaction information needed by your wallet.  The benefit of this approach is that the daemon (`monerod`) can stay on all of the time sending / receiving blocks, while the wallet can connect when needed and have access to the full blockchain. [Monerujo](https://www.monerujo.io/) should also work via [Orbot](https://guardianproject.info/apps/org.torproject.android/).  Because Tor hidden services provide encryption and authentication, you can be confident that your RPC credentials will not be sent in the clear.  Tor also solves problems often seen on home servers related to port-forwarding, IP addresses changing, etc -- it just works.  This setup will also obfuscate the fact that you are connecting to a remote Monero node. Tested with Monero `v0.15.0.1` connecting a Mac laptop wallet to a remote Linux node (Ubuntu 18.04.2).
+
+## Create a Tor hidden service for RPC
+
+Make sure [Tor is installed](https://community.torproject.org/relay/setup/bridge/debian-ubuntu/) and running correctly, then proceed.
+
+We only need to configure the RPC server to run as a hidden service here on port `18081`.
+
+File: `/etc/torrc`
+
+```
+HiddenServiceDir /var/lib/tor/monero-service/
+HiddenServicePort 18081 127.0.0.1:18081
+```
+Restart Tor:
+```
+sudo systemctl restart tor@default
+```
+
+Make sure Tor started correctly:
+```
+sudo systemctl status tor@default.service
+```
+
+If everything looks good, make a note of the hidden service (onion address) name:
+```
+sudo cat /var/lib/tor/monero-service/hostname
+```
+It will be something like 4dcj312uxag2r6ye.onion -- use this for `HIDDEN_SERVICE` below.
+
+### Configure Daemon to allow RPC
+
+In this example, we don't use Tor for interacting with the p2p network, just to connect to the monero node, so only RPC hidden service is needed.
+
+File: `~/.bitmonero/bitmonero.conf` (in the home directory of the Monero user)
+
+```
+no-igd=1
+restricted-rpc=1
+rpc-login=USERNAME:PASSWORD
+```
+(Make up a USERNAME and PASSWORD to use for RPC)
+
+Restart the Daemon: `monerod stop_daemon; sleep 10; monerod --detach`
+
+Make sure the daemon started correctly:
+```
+tail -f ~/.bitmonero/bitmonero.log
+```
+
+## Connecting to your node from a local wallet
+
+Make sure you have Tor running locally so you can connect to the Tor network. One simple way on the Mac is to just start the Tor browser and use its Tor daemon.
+
+Then test a simple RPC command, eg:
+```
+curl --socks5-hostname 127.0.0.1:9150 -u USERNAME:PASSWORD --digest -X POST http://HIDDEN_SERVICE.onion:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'
+```
+Replace `USERNAME`, `PASSWORD`, and `HIDDEN_SERVICE` with values from above.  Change `9150` to another port if needed by your local Tor daemon.
+
+When you execute the command, you should get some info about the remote daemon if everything is working correctly.  If not, add a ` -v ` to the beginning and try to debug why it's not connecting, check firewalls, password, etc.
+
+Once it is working, you can connect using your cli wallet:
+```
+./monero-wallet-cli --proxy 127.0.0.1:9150 --daemon-host HIDDEN_SERVICE.onion --trusted-daemon --daemon-login USERNAME:PASSWORD --wallet-file ~/PATH/TO/YOUR/WALLET
+```
+Replace values above as needed.
+
+## GUI
+
+If you are interested in experimenting with the GUI over Tor, you can try `torsocks` (note this may leak info -- do not rely on it if your life depends on maintaining anonymity).  Here is an example on MacOS, adjust as needed for the Linux GUI:
+```
+torsocks --port 9150 /Applications/monero-wallet-gui.app/Contents/MacOS/monero-wallet-gui
+```
+
+This will allow the GUI to communicate with the Tor network.  Once the GUI is open and a wallet loaded, you must configure it to connect to your Tor hidden service by adding your onion address to:  "Settings > Node > Remote node > Address".
+
+In future versions of the GUI, we expect to add direct Tor / I2P support so that `torsocks` + commandline are not needed.
+
+# Additional resources
+
+* [ANONYMITY_NETWORKS.md](https://github.com/monero-project/monero/blob/master/ANONYMITY_NETWORKS.md)
+* [Using Tor](https://github.com/monero-project/monero#using-tor) (Monero README)
diff --git a/_i18n/tr.yml b/_i18n/tr.yml
index 56d6a9961bbac56cf441c26e35c5ef4e60dc94b0..abc43b86a69f6bf3e57a0c593477b5b919a9f8de 100644
--- a/_i18n/tr.yml
+++ b/_i18n/tr.yml
@@ -482,6 +482,7 @@ user-guides:
   nicehash: Madencilik ekipmanı olmadan Monero XMR madenciliği yapımı
   ledger-wallet-cli: CLI (monero-wallet-cli) ile Ledger Monero cüzdanı üretimi
   multisig-messaging-system: MMS ve CLI cüzdanla çoklu-imza işlemleri
+  tor_wallet: Connecting your local wallet to your own daemon over Tor
 
 roadmap:
   translated: "yes"
diff --git a/_i18n/tr/resources/user-guides/tor_wallet.md b/_i18n/tr/resources/user-guides/tor_wallet.md
new file mode 100644
index 0000000000000000000000000000000000000000..aa44ff4f9d7e25347e2175ab57a03eed12adbb3f
--- /dev/null
+++ b/_i18n/tr/resources/user-guides/tor_wallet.md
@@ -0,0 +1,86 @@
+{% assign version = '1.1.0' | split: '.' %}
+{% include disclaimer.html translated="false" version=page.version %}
+
+Below we'll show an example configuration that allows you to run a Monero daemon (eg on a home server or VPS) that you can connect to from another computer running your wallet.  We do this over the Tor anonymity network to retrieve the transaction information needed by your wallet.  The benefit of this approach is that the daemon (`monerod`) can stay on all of the time sending / receiving blocks, while the wallet can connect when needed and have access to the full blockchain. [Monerujo](https://www.monerujo.io/) should also work via [Orbot](https://guardianproject.info/apps/org.torproject.android/).  Because Tor hidden services provide encryption and authentication, you can be confident that your RPC credentials will not be sent in the clear.  Tor also solves problems often seen on home servers related to port-forwarding, IP addresses changing, etc -- it just works.  This setup will also obfuscate the fact that you are connecting to a remote Monero node. Tested with Monero `v0.15.0.1` connecting a Mac laptop wallet to a remote Linux node (Ubuntu 18.04.2).
+
+## Create a Tor hidden service for RPC
+
+Make sure [Tor is installed](https://community.torproject.org/relay/setup/bridge/debian-ubuntu/) and running correctly, then proceed.
+
+We only need to configure the RPC server to run as a hidden service here on port `18081`.
+
+File: `/etc/torrc`
+
+```
+HiddenServiceDir /var/lib/tor/monero-service/
+HiddenServicePort 18081 127.0.0.1:18081
+```
+Restart Tor:
+```
+sudo systemctl restart tor@default
+```
+
+Make sure Tor started correctly:
+```
+sudo systemctl status tor@default.service
+```
+
+If everything looks good, make a note of the hidden service (onion address) name:
+```
+sudo cat /var/lib/tor/monero-service/hostname
+```
+It will be something like 4dcj312uxag2r6ye.onion -- use this for `HIDDEN_SERVICE` below.
+
+### Configure Daemon to allow RPC
+
+In this example, we don't use Tor for interacting with the p2p network, just to connect to the monero node, so only RPC hidden service is needed.
+
+File: `~/.bitmonero/bitmonero.conf` (in the home directory of the Monero user)
+
+```
+no-igd=1
+restricted-rpc=1
+rpc-login=USERNAME:PASSWORD
+```
+(Make up a USERNAME and PASSWORD to use for RPC)
+
+Restart the Daemon: `monerod stop_daemon; sleep 10; monerod --detach`
+
+Make sure the daemon started correctly:
+```
+tail -f ~/.bitmonero/bitmonero.log
+```
+
+## Connecting to your node from a local wallet
+
+Make sure you have Tor running locally so you can connect to the Tor network. One simple way on the Mac is to just start the Tor browser and use its Tor daemon.
+
+Then test a simple RPC command, eg:
+```
+curl --socks5-hostname 127.0.0.1:9150 -u USERNAME:PASSWORD --digest -X POST http://HIDDEN_SERVICE.onion:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'
+```
+Replace `USERNAME`, `PASSWORD`, and `HIDDEN_SERVICE` with values from above.  Change `9150` to another port if needed by your local Tor daemon.
+
+When you execute the command, you should get some info about the remote daemon if everything is working correctly.  If not, add a ` -v ` to the beginning and try to debug why it's not connecting, check firewalls, password, etc.
+
+Once it is working, you can connect using your cli wallet:
+```
+./monero-wallet-cli --proxy 127.0.0.1:9150 --daemon-host HIDDEN_SERVICE.onion --trusted-daemon --daemon-login USERNAME:PASSWORD --wallet-file ~/PATH/TO/YOUR/WALLET
+```
+Replace values above as needed.
+
+## GUI
+
+If you are interested in experimenting with the GUI over Tor, you can try `torsocks` (note this may leak info -- do not rely on it if your life depends on maintaining anonymity).  Here is an example on MacOS, adjust as needed for the Linux GUI:
+```
+torsocks --port 9150 /Applications/monero-wallet-gui.app/Contents/MacOS/monero-wallet-gui
+```
+
+This will allow the GUI to communicate with the Tor network.  Once the GUI is open and a wallet loaded, you must configure it to connect to your Tor hidden service by adding your onion address to:  "Settings > Node > Remote node > Address".
+
+In future versions of the GUI, we expect to add direct Tor / I2P support so that `torsocks` + commandline are not needed.
+
+# Additional resources
+
+* [ANONYMITY_NETWORKS.md](https://github.com/monero-project/monero/blob/master/ANONYMITY_NETWORKS.md)
+* [Using Tor](https://github.com/monero-project/monero#using-tor) (Monero README)
diff --git a/_i18n/zh-cn.yml b/_i18n/zh-cn.yml
index 92b821d479782688fda485347ae900fbea802ce1..983d68b956c1f149e264203f8b8bd222e449f977 100644
--- a/_i18n/zh-cn.yml
+++ b/_i18n/zh-cn.yml
@@ -481,6 +481,7 @@ user-guides:
   nicehash: 如何在没有挖矿设备的情况下挖掘门罗币
   ledger-wallet-cli: 如何用命令行钱包(CLI)制作一个Ledger硬件钱包的门罗币钱包
   multisig-messaging-system: Multisig transactions with MMS and CLI wallet
+  tor_wallet: Connecting your local wallet to your own daemon over Tor
 
 roadmap:
   translated: "yes"
diff --git a/_i18n/zh-cn/resources/user-guides/tor_wallet.md b/_i18n/zh-cn/resources/user-guides/tor_wallet.md
new file mode 100644
index 0000000000000000000000000000000000000000..aa44ff4f9d7e25347e2175ab57a03eed12adbb3f
--- /dev/null
+++ b/_i18n/zh-cn/resources/user-guides/tor_wallet.md
@@ -0,0 +1,86 @@
+{% assign version = '1.1.0' | split: '.' %}
+{% include disclaimer.html translated="false" version=page.version %}
+
+Below we'll show an example configuration that allows you to run a Monero daemon (eg on a home server or VPS) that you can connect to from another computer running your wallet.  We do this over the Tor anonymity network to retrieve the transaction information needed by your wallet.  The benefit of this approach is that the daemon (`monerod`) can stay on all of the time sending / receiving blocks, while the wallet can connect when needed and have access to the full blockchain. [Monerujo](https://www.monerujo.io/) should also work via [Orbot](https://guardianproject.info/apps/org.torproject.android/).  Because Tor hidden services provide encryption and authentication, you can be confident that your RPC credentials will not be sent in the clear.  Tor also solves problems often seen on home servers related to port-forwarding, IP addresses changing, etc -- it just works.  This setup will also obfuscate the fact that you are connecting to a remote Monero node. Tested with Monero `v0.15.0.1` connecting a Mac laptop wallet to a remote Linux node (Ubuntu 18.04.2).
+
+## Create a Tor hidden service for RPC
+
+Make sure [Tor is installed](https://community.torproject.org/relay/setup/bridge/debian-ubuntu/) and running correctly, then proceed.
+
+We only need to configure the RPC server to run as a hidden service here on port `18081`.
+
+File: `/etc/torrc`
+
+```
+HiddenServiceDir /var/lib/tor/monero-service/
+HiddenServicePort 18081 127.0.0.1:18081
+```
+Restart Tor:
+```
+sudo systemctl restart tor@default
+```
+
+Make sure Tor started correctly:
+```
+sudo systemctl status tor@default.service
+```
+
+If everything looks good, make a note of the hidden service (onion address) name:
+```
+sudo cat /var/lib/tor/monero-service/hostname
+```
+It will be something like 4dcj312uxag2r6ye.onion -- use this for `HIDDEN_SERVICE` below.
+
+### Configure Daemon to allow RPC
+
+In this example, we don't use Tor for interacting with the p2p network, just to connect to the monero node, so only RPC hidden service is needed.
+
+File: `~/.bitmonero/bitmonero.conf` (in the home directory of the Monero user)
+
+```
+no-igd=1
+restricted-rpc=1
+rpc-login=USERNAME:PASSWORD
+```
+(Make up a USERNAME and PASSWORD to use for RPC)
+
+Restart the Daemon: `monerod stop_daemon; sleep 10; monerod --detach`
+
+Make sure the daemon started correctly:
+```
+tail -f ~/.bitmonero/bitmonero.log
+```
+
+## Connecting to your node from a local wallet
+
+Make sure you have Tor running locally so you can connect to the Tor network. One simple way on the Mac is to just start the Tor browser and use its Tor daemon.
+
+Then test a simple RPC command, eg:
+```
+curl --socks5-hostname 127.0.0.1:9150 -u USERNAME:PASSWORD --digest -X POST http://HIDDEN_SERVICE.onion:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'
+```
+Replace `USERNAME`, `PASSWORD`, and `HIDDEN_SERVICE` with values from above.  Change `9150` to another port if needed by your local Tor daemon.
+
+When you execute the command, you should get some info about the remote daemon if everything is working correctly.  If not, add a ` -v ` to the beginning and try to debug why it's not connecting, check firewalls, password, etc.
+
+Once it is working, you can connect using your cli wallet:
+```
+./monero-wallet-cli --proxy 127.0.0.1:9150 --daemon-host HIDDEN_SERVICE.onion --trusted-daemon --daemon-login USERNAME:PASSWORD --wallet-file ~/PATH/TO/YOUR/WALLET
+```
+Replace values above as needed.
+
+## GUI
+
+If you are interested in experimenting with the GUI over Tor, you can try `torsocks` (note this may leak info -- do not rely on it if your life depends on maintaining anonymity).  Here is an example on MacOS, adjust as needed for the Linux GUI:
+```
+torsocks --port 9150 /Applications/monero-wallet-gui.app/Contents/MacOS/monero-wallet-gui
+```
+
+This will allow the GUI to communicate with the Tor network.  Once the GUI is open and a wallet loaded, you must configure it to connect to your Tor hidden service by adding your onion address to:  "Settings > Node > Remote node > Address".
+
+In future versions of the GUI, we expect to add direct Tor / I2P support so that `torsocks` + commandline are not needed.
+
+# Additional resources
+
+* [ANONYMITY_NETWORKS.md](https://github.com/monero-project/monero/blob/master/ANONYMITY_NETWORKS.md)
+* [Using Tor](https://github.com/monero-project/monero#using-tor) (Monero README)
diff --git a/_i18n/zh-tw.yml b/_i18n/zh-tw.yml
index 6f5f763174ff4a23951af1ce4fa635fc58d51ad1..b1ed224bd83c440c0d72a17079ecc930472ed9d4 100644
--- a/_i18n/zh-tw.yml
+++ b/_i18n/zh-tw.yml
@@ -482,6 +482,7 @@ user-guides:
   nicehash: 如何在不使用挖礦裝置的情況下挖取門羅幣
   ledger-wallet-cli: 如何使用 CLI 錢包產生 Ledger 錢包 (monero-wallet-cli)
   multisig-messaging-system: 如何使用 MMS 與 CLI 錢包進行多重簽名交易
+  tor_wallet: Connecting your local wallet to your own daemon over Tor
 
 roadmap:
   translated: "yes"
diff --git a/_i18n/zh-tw/resources/user-guides/tor_wallet.md b/_i18n/zh-tw/resources/user-guides/tor_wallet.md
new file mode 100644
index 0000000000000000000000000000000000000000..aa44ff4f9d7e25347e2175ab57a03eed12adbb3f
--- /dev/null
+++ b/_i18n/zh-tw/resources/user-guides/tor_wallet.md
@@ -0,0 +1,86 @@
+{% assign version = '1.1.0' | split: '.' %}
+{% include disclaimer.html translated="false" version=page.version %}
+
+Below we'll show an example configuration that allows you to run a Monero daemon (eg on a home server or VPS) that you can connect to from another computer running your wallet.  We do this over the Tor anonymity network to retrieve the transaction information needed by your wallet.  The benefit of this approach is that the daemon (`monerod`) can stay on all of the time sending / receiving blocks, while the wallet can connect when needed and have access to the full blockchain. [Monerujo](https://www.monerujo.io/) should also work via [Orbot](https://guardianproject.info/apps/org.torproject.android/).  Because Tor hidden services provide encryption and authentication, you can be confident that your RPC credentials will not be sent in the clear.  Tor also solves problems often seen on home servers related to port-forwarding, IP addresses changing, etc -- it just works.  This setup will also obfuscate the fact that you are connecting to a remote Monero node. Tested with Monero `v0.15.0.1` connecting a Mac laptop wallet to a remote Linux node (Ubuntu 18.04.2).
+
+## Create a Tor hidden service for RPC
+
+Make sure [Tor is installed](https://community.torproject.org/relay/setup/bridge/debian-ubuntu/) and running correctly, then proceed.
+
+We only need to configure the RPC server to run as a hidden service here on port `18081`.
+
+File: `/etc/torrc`
+
+```
+HiddenServiceDir /var/lib/tor/monero-service/
+HiddenServicePort 18081 127.0.0.1:18081
+```
+Restart Tor:
+```
+sudo systemctl restart tor@default
+```
+
+Make sure Tor started correctly:
+```
+sudo systemctl status tor@default.service
+```
+
+If everything looks good, make a note of the hidden service (onion address) name:
+```
+sudo cat /var/lib/tor/monero-service/hostname
+```
+It will be something like 4dcj312uxag2r6ye.onion -- use this for `HIDDEN_SERVICE` below.
+
+### Configure Daemon to allow RPC
+
+In this example, we don't use Tor for interacting with the p2p network, just to connect to the monero node, so only RPC hidden service is needed.
+
+File: `~/.bitmonero/bitmonero.conf` (in the home directory of the Monero user)
+
+```
+no-igd=1
+restricted-rpc=1
+rpc-login=USERNAME:PASSWORD
+```
+(Make up a USERNAME and PASSWORD to use for RPC)
+
+Restart the Daemon: `monerod stop_daemon; sleep 10; monerod --detach`
+
+Make sure the daemon started correctly:
+```
+tail -f ~/.bitmonero/bitmonero.log
+```
+
+## Connecting to your node from a local wallet
+
+Make sure you have Tor running locally so you can connect to the Tor network. One simple way on the Mac is to just start the Tor browser and use its Tor daemon.
+
+Then test a simple RPC command, eg:
+```
+curl --socks5-hostname 127.0.0.1:9150 -u USERNAME:PASSWORD --digest -X POST http://HIDDEN_SERVICE.onion:18081/json_rpc -d '{"jsonrpc":"2.0","id":"0","method":"get_info"}' -H 'Content-Type: application/json'
+```
+Replace `USERNAME`, `PASSWORD`, and `HIDDEN_SERVICE` with values from above.  Change `9150` to another port if needed by your local Tor daemon.
+
+When you execute the command, you should get some info about the remote daemon if everything is working correctly.  If not, add a ` -v ` to the beginning and try to debug why it's not connecting, check firewalls, password, etc.
+
+Once it is working, you can connect using your cli wallet:
+```
+./monero-wallet-cli --proxy 127.0.0.1:9150 --daemon-host HIDDEN_SERVICE.onion --trusted-daemon --daemon-login USERNAME:PASSWORD --wallet-file ~/PATH/TO/YOUR/WALLET
+```
+Replace values above as needed.
+
+## GUI
+
+If you are interested in experimenting with the GUI over Tor, you can try `torsocks` (note this may leak info -- do not rely on it if your life depends on maintaining anonymity).  Here is an example on MacOS, adjust as needed for the Linux GUI:
+```
+torsocks --port 9150 /Applications/monero-wallet-gui.app/Contents/MacOS/monero-wallet-gui
+```
+
+This will allow the GUI to communicate with the Tor network.  Once the GUI is open and a wallet loaded, you must configure it to connect to your Tor hidden service by adding your onion address to:  "Settings > Node > Remote node > Address".
+
+In future versions of the GUI, we expect to add direct Tor / I2P support so that `torsocks` + commandline are not needed.
+
+# Additional resources
+
+* [ANONYMITY_NETWORKS.md](https://github.com/monero-project/monero/blob/master/ANONYMITY_NETWORKS.md)
+* [Using Tor](https://github.com/monero-project/monero#using-tor) (Monero README)
diff --git a/resources/user-guides/index.md b/resources/user-guides/index.md
index 80fe0078db0d12ee112b60a85a49fce127937b25..b6a9f4f99904ca701733b6d779b3c3fc68921b26 100644
--- a/resources/user-guides/index.md
+++ b/resources/user-guides/index.md
@@ -63,6 +63,7 @@ title: titles.userguides
                             <p><a href="{{site.baseurl}}/resources/user-guides/prove-payment.html">{% t user-guides.prove-payment %}</a></p>
                             <p><a href="{{site.baseurl}}/resources/user-guides/ledger-wallet-cli.html">{% t user-guides.ledger-wallet-cli %}</a></p>
                             <p><a href="{{site.baseurl}}/resources/user-guides/multisig-messaging-system.html">{% t user-guides.multisig-messaging-system %}</a></p>
+                            <p><a href="{{site.baseurl}}/resources/user-guides/tor_wallet.html">{% t user-guides.tor_wallet %}</a></p>
                         </div>
                     </div>
                 </div>
diff --git a/resources/user-guides/tor_wallet.md b/resources/user-guides/tor_wallet.md
new file mode 100644
index 0000000000000000000000000000000000000000..b603ce116dc714180946cec325dc8d8478d5f5ee
--- /dev/null
+++ b/resources/user-guides/tor_wallet.md
@@ -0,0 +1,13 @@
+---
+layout: user-guide
+title: "Connecting your local wallet to your own daemon over Tor"
+permalink: /resources/user-guides/tor_wallet.html
+mainVersion:
+  - "1"
+  - "1"
+  - "0"
+---
+
+{% t global.lang_tag %}
+<h1>{% t user-guides.tor_wallet %}</h1>
+{% tf resources/user-guides/tor_wallet.md %}