Most Popular

1500 questions
9
votes
1 answer

What does the Tor Browser Bundle do to prevent the linking of sessions?

What changes are made to the Tor Brower Bundle or what does it ship with to prevent a website from linking user session together, including fingerprinting on the device such as browser or system characteristics? Tor does not aim to hide the fact…
bastik
  • 2,684
  • 18
  • 28
9
votes
2 answers

How can I verify my relay is working?

This is the first time I'm running a relay. Doing it on a raspbian, and I've got some short questions. Be ready: I'm a newb. I'm only controlling my raspberry via SSH, so no GUIs. I opened ports on my firewall. /var/log/tor/log tells me there is a…
user3393
9
votes
3 answers

How do I uninstall Tor browser from Windows 7?

I need to get detailed instructions how to completely remove Tor browser from Windows 7.
frank
  • 99
  • 1
  • 1
  • 2
9
votes
3 answers

Low power self-maintaining Tor relay

Over the summer, I'm looking into depositing Tor relays (not exit nodes!) with my friends in family in the form of something that they can plug in and forget about. I've read about the Rasberry Pi being an excellent platform for a low-power relay,…
Seanny123
  • 465
  • 2
  • 10
9
votes
1 answer

In what ways can private relays be used?

There are applications where private relays, not listed in public consensus directories, would perhaps be useful. For example, one might use four-relay circuits with private entry guards and exit relays. In How to create a private exit node?, weasel…
mirimir
  • 3,017
  • 1
  • 19
  • 29
9
votes
3 answers

Is it secure to set the contact information when building up a Tor relay?

When I am setting up a tor relay, one option is to determine the contact information as an email address. Is it secure considering information harvesting by NSA for instance or would be better to hide it?
9
votes
4 answers

Freenet distributed hosting model: Could it be ported to Tor?

I've always wondered why Tor uses a server-based model of content storage rather than a Freenet-style, distributed, encrypted, plausible-denial model. It seems that it would be much more robust and secure, almost like an anonymous BitTorrent, if…
Ducks
  • 674
  • 4
  • 12
9
votes
2 answers

Can you make Tor change servers every time I refresh a page?

I'm trying to build a bot but I need it that Tor will change servers every time I refresh the page. I could also use one if I get to manually change it using a command line. Any suggestions?
9
votes
1 answer

RDP over Tor - safe?

I am considering using remote desktop protocol(RDP) over Tor, to circumvent my country's blockade of RDP and also get the most of anonymity. I just tested a RDP connection with proxy chains remmina. (Proxy chains configured to avoid DNS leaks and…
AbduLLaH
  • 91
  • 1
  • 2
9
votes
2 answers

How can I protect myself against GCHQ's attempts to de-anonymise me?

Given the latest revelations about GCHQ's methods to de-anonymise Tor users, how can I keep myself safe? From the document: We will never be able to de-anonymize all Tor users all the time [but] with manual analysis we can de-anonymize a very small…
Tom Medley
  • 972
  • 2
  • 9
  • 16
9
votes
2 answers

Could I run the hidden service software(e.g webserver) in a different system than the one Tor is running?

Running a hidden service in a secure way can be a really complicated matter. Ideally the system where the hidden service software (e.g. a web server) lives should not have a publicly routable IP address on any of its network interfaces and should…
alaf
  • 2,536
  • 3
  • 17
  • 26
9
votes
3 answers

How do I make Tor use IPv6 for connecting to other peers?

Even if I put the following, it still only makes IPv4 connections to the outside world: ORPort [::]:9001 IPv6Only OutboundBindAddress [::] Bridge []:9001 ClientUseIPv6 1 ClientPreferIPv6ORPort 1 I'm using…
todd
  • 139
  • 2
  • 4
9
votes
3 answers

What can I do to reduce risk of malicious traffic leaving my exit relay besides setting the exit policy?

I am considering running an exit relay. Unfortunately this opens possibility of legal issues and traffic restrictions from my Internet Service Provider. See Abuse FAQ and Legal FAQ. There is a nice blog article recommending what to do: Tips for…
9
votes
4 answers

May I do security inspection on exit relays?

If I decide to run an exit relay may I run security inspection (Intrusion Prevention System, anti-spam, anti-malware etc.) on the traffic leaving the Tor network? Would this be considered legally and ethically correct? Can I let the Tor users know…
9
votes
1 answer

Can you confirm that my IP address was a Tor relay a few months ago?

Let's assume I received a letter today that accuses me of downloading an illegal file, posting something inappropriate in a forum, or hacking into a system. And that happened a few months ago. But I was running a Tor relay on the IP address stated…
karsten
  • 1,419
  • 1
  • 10
  • 16