Most Popular
1500 questions
9
votes
4 answers
Is it possible to run a secure email network using SMTP over Tor?
I have thought about some of the security issues inherent in email.
For example that even if the body is encrypted the headers are plain text so metadata is available.
I was wondering if this could be mitigated by using Tor and SMTP hidden…
user329
- 138
- 1
- 6
9
votes
3 answers
How to tell my Tor Browser to use a certain relay as entry point?
I am running a Tor relay on a remote server that is hosted in a professional server farm about 1000 km away from my home. I am absolutely sure, that this Tor relay is secure because I am root on this server (which is a virtual root server), because…
Hubert Schölnast
- 195
- 2
- 17
9
votes
1 answer
How to take control of a Tor hidden service if you have the private key?
I'm pretty new to Tor and don't know much about it.
I was wondering how one would take control of a Tor hidden service if they had the private key.
There's a darknet website called "DOXBIN" that was seized by the FBI about a week ago; the owners…
jokexel
- 91
- 1
- 2
9
votes
4 answers
How can I configure my network so that when Tor is running no other traffic can leave the box?
One of the fundamentals of Tor is that it can only really hide you if, when Tor is enabled and in use, you're using it exclusively.
Agents wishing to de-anonymize you can examine requests to different endpoints and look for common or synchronized…
jmort253
- 296
- 3
- 11
9
votes
1 answer
Most .onion sites I am trying to access are unavailable: Why and how can I solve this?
I think that 80% of the onion sites I'm trying to reach are most of the time (if not always) unavailable. It tells me that
Firefox can't estabilish a connection to the server at *****.onion
and
The site could be temporarily unavailable or too…
VIPaul
- 93
- 1
- 1
- 4
9
votes
7 answers
Sending anonymous email
I need to send a completely anonymous email, with no trace of myself, my IP and my computer. Can I send it via Tor using an ordinary email server, ie, gmail, yahoo, whatever?
PLEASE, I'm an ordinary mortal and don't understand about programming or…
neon
- 91
- 1
- 1
- 2
9
votes
2 answers
Why does Tor publish IP addresses of exit nodes?
I am new to Tor and currently trying to understand the architecture of onion routing. However, I came across this TorDNSEL which makes it possible (for a tool using TorDNSEL) to detect whether traffic is coming from Tor exit node or not? This way…
S. Holmes
- 105
- 1
- 4
9
votes
1 answer
What is the difference between NTor and TAP?
Recently I read that Tor switched from TAP handshake requests to NTor handshake requests. This seems to improve the performance and doesn't put such a high load on relays (because of Mevade). However I couldn't find a description what TAP and NTor…
Jens Kubieziel
- 8,630
- 5
- 35
- 116
9
votes
2 answers
How does the pluggable transport version of TBB affect browsing?
Does using the pluggable transport Tor Browser Bundle with an Obfs3 bridge affect browsing speed in a noticeable way?
I am interested in using an Obfusproxy to hide my Tor usage form my ISP but I want to evaluate the effect on browsing speed.
I…
IceyEC
- 1,495
- 1
- 14
- 22
9
votes
1 answer
Can intermediary nodes learn the length of a circuit?
This should be impossible because of the layered encryption, but some documentation suggests that this can somehow be done.
From Section 5.6 [1] of tor's specification
When speaking v2 of the link protocol or later, clients MUST only send
EXTEND…
user3117216
- 91
- 1
9
votes
1 answer
How many clients are typically using Tor simultaneously? How many circuits are simultaneously in use?
From Tor Metrics: Users, I get that there are currently about 2.4 million "directly connecting users". And in Questions and answers about user statistics, I see:
Q: So, are these distinct users per day, average number of users connected
over the…
mirimir
- 3,017
- 1
- 19
- 29
9
votes
6 answers
Releasing a controversial movie torrent using Tor Network for security
I live in a dictatorship and use the Tor Network to get around censorship. I read that Torrenting over Tor Network is not good because of high Internet usage and it slows everything down. For a short time, I ran a Tor exit node and noticed half the…
AnonIris
- 91
- 2
9
votes
4 answers
How can I use Tor without my ISP knowing?
I guess my first question should be, does my ISP know when I'm using Tor? I read somewhere that they do. In that case, the anonymity offered by Tor is rather limited. If someone suspects I posted something naughty, they only need to check with my…
Jason Williams
- 91
- 1
- 1
- 2
9
votes
1 answer
How to anonymize the programs from the terminal?
How to anonymize the programs from your terminal (such as wget, curl, etc.)?
kenorb
- 1,193
- 4
- 13
- 34
9
votes
1 answer
Why is a longer guard rotation period with fewer guards better than the other way around?
Tor introduced guards, which are - oversimplified said - relays the client picks and holds for some time as the first hop, to protect the client against the so-called 'predecessor attack'. Entry guards prevent the client from connecting to the…
bastik
- 2,684
- 18
- 28