Most Popular

1500 questions
9
votes
2 answers

Why do Tor hidden service operators bother with SSL/TLS encryption?

Tor hidden services have an asymmetric key pair. That seems like it ought to do the job of authenticating the server and securing the connection to the client. When Tor clients reach out to normal servers, the final traffic passes through the exit…
Ben N
  • 439
  • 2
  • 10
9
votes
2 answers

Tor plug-in for Chromium?

Is there a plug-in for Chromium to activate and deactivate Tor? I've found plug-ins to manage HTTP proxies, but not SOCKS5.
user742
  • 91
  • 1
  • 3
8
votes
2 answers

Can somebody force my Tor circuits to always start from his "guard node", to access my traffic?

The first node after "my browser" is always the same. I am worried to see that even when asking for "new identity" or "new circuit", it restarts always by the same IP address in France. I have no knowledge on the subject. I only use Tor because my…
clochette
  • 81
  • 1
8
votes
1 answer

When using custom keys, what permissions do "/var/lib/tor/hidden_service/" need?

I have generated a custom onion hostname and key using eschalot. Tor will run fine on the default hostname (the one Tor generated itself), but not with my custom domain. The problem is with the permissions in /var/lib/tor/hidden_service/ For this…
jpl42
  • 215
  • 2
  • 7
8
votes
1 answer

Tor.real and problems restarting Tor

I was surfing and the Tor Browser suddenly closed. Now when I restart it (latest version 5.0.4 Mac) it gives me a screen to Restart Tor and at bottom of page are Quit, Copy Tor Log to Clipboard, and Continue buttons. I've tried to paste the log into…
Steve
  • 91
  • 1
  • 3
8
votes
2 answers

Connect directly with Tor Browser (as in, bypass Tor)?

I recently decided to pay for CryptoStorm anonymous VPN as an extra layer to my privacy protection - so that all requests including UDP requests are automatically masked. As I understand it, all traffic through the VPN is routed through the Tor…
Robin Winslow
  • 183
  • 1
  • 5
8
votes
2 answers

Can using Tor make you a suspect?

When you are browsing regular WWW through Tor last node's (exit node's) IP is known to the server, also exit node's ISP can observe the traffic. So if somebody is browsing sites with illegal content (for example child pornography) and you happen to…
zduny
  • 183
  • 4
8
votes
2 answers

Rendezvous Point (RP) & Introduction Point (IP), code question

# grep -n onion_address src/or/rendservice.c 567: oc->rend_data->onion_address); 1373: strlcpy(launched->rend_data->onion_address, service->service_id, 1374: sizeof(launched->rend_data->onion_address)); 2364: …
strand
  • 151
  • 7
8
votes
2 answers

How do I create a launcher / script that opens an URL in TorBrowser (from the bundle)

If I do tor-browser_en-US/App/Firefox/firefox-bin http://example.com it opens in my regular Firefox browser. Is there a way to make a launcher/script that opens a link in the Tor Browser?
unhammer
  • 283
  • 3
  • 10
8
votes
2 answers

How can I download Tor within China to get over the Great Firewall?

I am trying to download Tor within China to use as VPN. However, I cannot access the Tor download page using the mainstream internet inside of China. I am blocked by the Great Firewall, and recent crackdowns on the internet. Are there any mirror…
8
votes
2 answers

Can Tor nodes know their position in the circuit?

It is documented which node knows what. I'm wondering if the nodes in the circuit know their own relative position. For normal three relay paths, they certainly can infer their position: the exit knows -since it's connecting outside- the middle…
John
8
votes
1 answer

Suddenly my Tor hidden service isn't available

I created a Tor hidden service (a server binded to localhost port and torrc config'd to use the 127.0.0.1 xxxx) for clients to connect to. It was working great for a month or so, and now no one can connect to it. I see it is still setup properly in…
shunerok
  • 81
  • 2
8
votes
1 answer

List of attacks that try to trick browser to not use SOCKS/Tor

I've heard it called "disbanding" attacks where the attacker induces a client into not routing a connection over Tor. Basically all of the things that the TBB protects against. Examples might be leaking DNS because it's using SOCKS4 or using WebRTC…
Lizbeth
  • 1,274
  • 6
  • 22
8
votes
2 answers

Get Tor bridges via email

I sent an email to bridges@bridges.torproject.org with "get bridges" as the body by using my gmail. I didn't receive any response. Is the service down? Is there something else I can do to get a list of bridges?
Farid Abdi
  • 111
  • 1
  • 2
  • 5
8
votes
3 answers

What implementations of Tor are there?

I have seen implementations such as the Tor Browser Bundle and a TorChat, based on the Tor network. I was wondering if there were any more of them out there?
user22