Most Popular
1500 questions
2
votes
2 answers
How secure are hidden services port bindings?
On my system I have a secure service that is bound to localhost for commands. I do not want it accessible to Tor. It's bound to one port, lets say 876.
I am running a hidden service that binds to one port, lets call it 12345. So 127.0.0.1:12345 is…
Dan
- 253
- 1
- 4
2
votes
1 answer
Using entry nodes with specific ports
Is there any way to tell the Tor daemon on my computer to only pick entry nodes with specific TCP ports? It seems like our ISP has started blocking Tor communication on its usual ports (443, 9001, etc). Once it finds a node with POP3 port 110 open -…
user3116571
- 21
- 3
2
votes
0 answers
How do overlay network nodes communicate without IP addresses?
I've been reading about how Tor and I2P use cryptographic addresses to send messages to other nodes, but how does this work? I looked through the documentation for each and neither is very clear on this. For two machines to communicate, you…
Matt
2
votes
2 answers
Can I track other users on Tor?
I'm an admin on a Windows 8.1 computer and I want to know if I can see what another user is doing on Tor. Would I just use Microsoft Family Safety? I know that the government can spy on Tor, but can I see what other users are doing? I am either a…
Leo Wilson
- 123
- 4
2
votes
3 answers
Proxy setting not working in tor
My proxy setting does not work in Tor.
I have no idea why. The same settings work
in Firefox. (the proxy is working. I keep
checking and changing it):
What am I doing wrong?
user3521033
- 21
- 1
- 2
2
votes
1 answer
Do 'window.innerWidth' and 'window.innerHeight' in CSS pass back the values to the webserver?
I have JavaScript turned off, and so no leakage of screen resolution to Panopticlick.eff.org fingerprint testing tool.
However, JonDonym's one - ip-check.info - has an alarming-looking vector down the bottom called 'Browser window'. Even with JS…
Anonymous
- 21
- 1
2
votes
1 answer
Why exactly is it not recommended to exclude relays?
I'm doing some research on Tor for a paper and stumbled upon this section on the Tor FAQ page, where it says how to choose or exclude certain nodes from your circuit. Below it says that it is not recommended to do this, but not explicitly…
Curtis
- 23
- 2
2
votes
0 answers
How do I tunnel SSH though tor(windows)
I'm using Windows.
Whats the best way to securely tunnel and use SSH though Tor, could you guide me to a right direction? I cannot risk stuffing this up and I cannot leak my real IP address, I'm using a VPN just in case.
Dylan
- 21
- 3
2
votes
5 answers
How do I revoke a .onion address?
Can I revoke a .onion address, to "open it" back up for registration?
It is possible, in the world of certificate authorities, to maintain revocation lists for keys that have been compromised or are no longer in use.
One can revoke an SSL…
Nathan Basanese
- 135
- 7
2
votes
3 answers
Why my relay is so slow?
I have a connection of 100mb/s and its going too slow, just look here: https://globe.torproject.org/#/search/query=A11BAE8F2676FF78727EE74949836E495D801D90
The relay is located in a OVH VPS
How can I use the complete bandwidth?
Thanks
2
votes
2 answers
Tor + I2P on a system and Is I2P better than TOR?
Greeting's, given recent events of FBI taking down silk road 2.0 and 3.0. I have few questions, please keep in mind that i'm not technologically too sound.
Is I2P better than TOR?
Can i have a system which will use I2P + TOR? Something like whonix…
Parth Maniar
- 131
- 1
- 3
2
votes
2 answers
How does the exit node relay data back to originator?
I read some of the answers on the forum trying to understand how a server talks back to client through TOR, and from what I understand nodes keep a record for a while of the next and previous node to forward the data. If a particular node is a part…
ellis
- 21
- 1
2
votes
0 answers
Using TOR multiple times (Tor in Tor)
What if i run tor trough tor?
I have seen it somewhere stating that it can destroy your anonimity but i doubt it.
All the other circuit is going to do is protect the end nodes anonimity like its a client, right?
And running tor to vpn easily links…
OFFICER
- 21
- 1
2
votes
0 answers
Using obfs4; Tor fails to connect
5/30/2015 10:37:51 AM.300 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
5/30/2015 10:37:51 AM.300 [NOTICE] Opening Socks listener on 127.0.0.1:9150
5/30/2015…
Carl C. Kik
- 21
- 2
2
votes
1 answer
How to install TAILS as the primary OS on my Hardisk?
Before you refer me to it, i have read this
I would like to know how I can install TAILS as the primary (ideally the only, as I would like to wipe others) OS on a windows computer. I have access to computers other than the one I wish to run TAILS…
user7531
- 21
- 2