Most Popular

1500 questions
12
votes
1 answer

Why is Tor written in C?

Why is Tor implemented in the C programming language? Was that decision a matter of luck or taste of Tor's inventors? Are there any advantages of implementing this kind of technology in C?
alaf
  • 2,536
  • 3
  • 17
  • 26
12
votes
3 answers

How to programmatically detect a hidden service

Is there some magical way which I can programmatically detect whether a hidden service exists, is up, or is dead, other than trying to connect to it through the Tor socks protocol? I can connect using Python socks module. I wonder if there's some…
Harry R
  • 121
  • 3
12
votes
1 answer

How do entry guards protect against a service location attack?

The paper Locating Hidden Servers mentions three attacks that can reveal the location of hidden servers. Among those is the service location attack. The paper states that the Tor network's use of entry guards is an effective countermeasure. How do…
pmocek
  • 566
  • 3
  • 13
12
votes
1 answer

Hidden .onion service with 2048 bit (or 4096 bit) RSA private key -- how to host it?

2048 bit RSA is proven to be more secure than 1024 bit, so with the help of Scallion I have generated a pair of hidden service hostname + 2048 bit private key for it (there were 1024b 2048b and 4096b options, I decided to choose the middle) Now, I…
user3025
  • 155
  • 7
12
votes
2 answers

"The Tor Browser Bundle should not be run as root" Why?

I tried to run Tor browser bundle as a root but it it didn't start and I got the above quoted error message. I'm not sure why? and I'm also wondering if there is away to make that possible. Thanks,
flora
  • 141
  • 1
  • 1
  • 3
12
votes
1 answer

How can one make Tor faster, when willing to to sacrifice anonymity?

It's clear, with special configs of this kind, anonymity will suffer. But if one is aware of that and willing to accept that... How can one make Tor faster? How can one use only fast relays? Will that actually help?
adrelanos
  • 2,847
  • 2
  • 20
  • 35
12
votes
0 answers

How can I use Tor from networks whose operators attempt to block Tor use?

How can I use Tor from networks whose operators attempt to block Tor use? For example, I previously used Tor from my school's network to avoid restriction of my Web browsing based on keywords, but now attempts to use Tor on their wireless network…
Skyler 440
  • 1,133
  • 1
  • 9
  • 9
12
votes
2 answers

How many hidden services can I run on a single Tor instance?

I'm planning to run a service that will rely on hidden-services for anonymous data routing. Hence I will need to host a large number of them, sometimes in the same place. I have ideas about how to scale the application that will be hosted, but I am…
12
votes
2 answers

Is it safe to import bookmarks?

Is is safe to import bookmarks from another browser into the Tor Browser? How can I import my bookmarks if it is safe? I have not tried anything because I am not sure
Abe
  • 121
  • 1
  • 3
12
votes
4 answers

Are short-lived relays useful to the Tor network?

I have some dedicated servers which are not used at the moment. However this can change on a weekly basis. Would it be useful to the Tor network for me to configure them as relays during the times they are not used for other purposes? If so, should…
Jens Kubieziel
  • 8,630
  • 5
  • 35
  • 116
12
votes
2 answers

How should one explain Tor to a non-technical audience?

How should I explain the operation of Tor to a reasonably-intelligent but non-technical audience? I'm looking for a way to introduce folks to Tor in a way that helps them to understand its basic operation without overwhelming them.
12
votes
3 answers

How can a new circuit happen without closing all tabs?

Using the current version (3.5) of the Tor Browser Bundle, how can we switch to a new circuit without losing all tabs and activity? I understand the reason of "New Identity" means everything is closed, for if you wish to change to a new activity…
Marahai
  • 121
  • 1
  • 3
11
votes
1 answer

What are the minimum requirements for running a relay?

If I want to create a bunch of Tor relays running Linux with various VPS providers and want to save on cost, what is the minimum hardware config that I can get away with while still effectively relaying traffic?
directedition
  • 211
  • 2
  • 3
11
votes
5 answers

Is there a way to defend oneself against a timing attack?

Is there a way for an end user to protect oneself against the timing attack when using Tor? For those, who are not familiar with it, a timing attack involves an adversary populating the Tor cloud with the nodes under their control, with the goal to…
v010dya
  • 340
  • 2
  • 9
11
votes
2 answers

How many distinct Tor circuits are possible?

Given the current relay census, and assuming a standard Tor Browser Bundle installation, approximately how many distinct Tor circuits are possible? Once entry guards have been chosen, approximately how many distinct circuits are possible using those…
mirimir
  • 3,017
  • 1
  • 19
  • 29