Most Popular
1500 questions
9
votes
2 answers
Why do Tor hidden service operators bother with SSL/TLS encryption?
Tor hidden services have an asymmetric key pair. That seems like it ought to do the job of authenticating the server and securing the connection to the client. When Tor clients reach out to normal servers, the final traffic passes through the exit…
Ben N
- 439
- 2
- 10
9
votes
2 answers
Tor plug-in for Chromium?
Is there a plug-in for Chromium to activate and deactivate Tor?
I've found plug-ins to manage HTTP proxies, but not SOCKS5.
user742
- 91
- 1
- 3
8
votes
2 answers
Can somebody force my Tor circuits to always start from his "guard node", to access my traffic?
The first node after "my browser" is always the same.
I am worried to see that even when asking for "new identity" or "new circuit", it restarts always by the same IP address in France. I have no knowledge on the subject. I only use Tor because my…
clochette
- 81
- 1
8
votes
1 answer
When using custom keys, what permissions do "/var/lib/tor/hidden_service/" need?
I have generated a custom onion hostname and key using eschalot. Tor will run fine on the default hostname (the one Tor generated itself), but not with my custom domain.
The problem is with the permissions in /var/lib/tor/hidden_service/
For this…
jpl42
- 215
- 2
- 7
8
votes
1 answer
Tor.real and problems restarting Tor
I was surfing and the Tor Browser suddenly closed. Now when I restart it (latest version 5.0.4 Mac) it gives me a screen to Restart Tor and at bottom of page are Quit, Copy Tor Log to Clipboard, and Continue buttons.
I've tried to paste the log into…
Steve
- 91
- 1
- 3
8
votes
2 answers
Connect directly with Tor Browser (as in, bypass Tor)?
I recently decided to pay for CryptoStorm anonymous VPN as an extra layer to my privacy protection - so that all requests including UDP requests are automatically masked. As I understand it, all traffic through the VPN is routed through the Tor…
Robin Winslow
- 183
- 1
- 5
8
votes
2 answers
Can using Tor make you a suspect?
When you are browsing regular WWW through Tor last node's (exit node's) IP is known to the server, also exit node's ISP can observe the traffic.
So if somebody is browsing sites with illegal content (for example child pornography) and you happen to…
zduny
- 183
- 4
8
votes
2 answers
Rendezvous Point (RP) & Introduction Point (IP), code question
# grep -n onion_address src/or/rendservice.c
567: oc->rend_data->onion_address);
1373: strlcpy(launched->rend_data->onion_address, service->service_id,
1374: sizeof(launched->rend_data->onion_address));
2364: …
strand
- 151
- 7
8
votes
2 answers
How do I create a launcher / script that opens an URL in TorBrowser (from the bundle)
If I do tor-browser_en-US/App/Firefox/firefox-bin http://example.com it opens in my regular Firefox browser. Is there a way to make a launcher/script that opens a link in the Tor Browser?
unhammer
- 283
- 3
- 10
8
votes
2 answers
How can I download Tor within China to get over the Great Firewall?
I am trying to download Tor within China to use as VPN. However, I cannot access the Tor download page using the mainstream internet inside of China. I am blocked by the Great Firewall, and recent crackdowns on the internet.
Are there any mirror…
JianguoHisiang
- 83
- 4
8
votes
2 answers
Can Tor nodes know their position in the circuit?
It is documented which node knows what.
I'm wondering if the nodes in the circuit know their own relative position. For normal three relay paths, they certainly can infer their position: the exit knows -since it's connecting outside- the middle…
John
8
votes
1 answer
Suddenly my Tor hidden service isn't available
I created a Tor hidden service (a server binded to localhost port and torrc config'd to use the 127.0.0.1 xxxx) for clients to connect to. It was working great for a month or so, and now no one can connect to it. I see it is still setup properly in…
shunerok
- 81
- 2
8
votes
1 answer
List of attacks that try to trick browser to not use SOCKS/Tor
I've heard it called "disbanding" attacks where the attacker induces a client into not routing a connection over Tor. Basically all of the things that the TBB protects against.
Examples might be leaking DNS because it's using SOCKS4 or using WebRTC…
Lizbeth
- 1,274
- 6
- 22
8
votes
2 answers
Get Tor bridges via email
I sent an email to bridges@bridges.torproject.org with "get bridges" as the body by using my gmail. I didn't receive any response.
Is the service down? Is there something else I can do to get a list of bridges?
Farid Abdi
- 111
- 1
- 2
- 5
8
votes
3 answers
What implementations of Tor are there?
I have seen implementations such as the Tor Browser Bundle and a TorChat, based on the Tor network. I was wondering if there were any more of them out there?
user22