Most Popular

1500 questions
5
votes
1 answer

Can I mix country name and nickname in ExcludeNodes line?

When I want to block tor nodes, can I mix country name and nickname and fingerprint or must I only use one of them? ExcludeNodes {de},{dk},{se},{fi},PiratenParteiNRW,358F99684C6AF99282C6909247CACF5B66DA947D additional info after answer: thank you…
bobrock
  • 161
  • 6
5
votes
2 answers

Should I run fast Tor relay or a stable relay is fine?

I recently started a Tor Relay on my own VPS. It has 500GB bandwidths each month, and I limited bandwidth rate to 1500 KBytes. I don't know which one is better for Tor network: Running a fast relay that exhausts it's bandwidth in two weeks (like…
amin
  • 51
  • 2
5
votes
1 answer

Compiling Tor on Windows, what is needed?

The current stable version of Tor, 0.2.3.25 works well on Win98/ME/2000. The present 0.2.4 versions require XP or newer. I'd like to compile the 0.2.4 versions to run on Win98 through Win 2000. What do I need to compile Tor on Windows?
Herbalist
  • 495
  • 3
  • 12
5
votes
1 answer

How to map specific .onion addresses to static local virtual IP address?

I noticed that when using iptables_torify to force connections through TOR that .onion addresses are mapped to local virtual IPs in the 10.66.x.x range. This is indicated in the torrc file: VirtualAddrNetwork…
5
votes
2 answers

Editing Wikipedia on Tor without creating an account?

It is widely known that editing Wikipedia on Tor IP addresses is systematically banned, to avoid vandalization from abusive users looking for no-risk anonymous editing, for their own wikipedia-unfriendly reasons. Wikipedia provide a very helpful…
user1006
5
votes
1 answer

Tor over VPN - http status code 404 not found

[warn] Received http status code 404 ("Not found") from server 'x.x.x.x:9001' while fetching "/tor/keys/fp/(40-key-characters and numbers)". Is there a way to allow the keys? Is it important to have the keys for that session?
guest
  • 81
  • 2
5
votes
2 answers

What's the correct syntax for listing multiple ExitNodes?

In my torrc file, I'd like to exclude certain exit nodes from specific countries, like for example France and Germany. What's the correct syntax for this in torrc? I've found that when I try to list multiple country codes this way for either…
greatwolf
  • 245
  • 3
  • 9
5
votes
1 answer

Tor compiling error - undefined symbols in libor-crypto.a

So I'm trying to (re-)compile Tor 0.2.3.25 (gzipped tarball) on my OS X 10.5.8 system (with GCC 4.0.1) and it's currently dying horribly here: gcc -g -O2 -D_FORTIFY_SOURCE=2 -fstack-protector-all -Wstack-protector -fwrapv --param ssp-buffer-size=1…
Ben
  • 196
  • 6
5
votes
3 answers

How can I set up the most useful Tor node?

I've heard of Torservers and Noisetor. I've considered donating to them, but I want to avoid consolidating the Tor network in those two organizations, so I'd like to operate my own Tor node. (I also think it might be more interesting and educational…
flamsmark
  • 389
  • 2
  • 12
5
votes
1 answer

How many directory servers are there in the Tor networks?

I recently become interested in researching about the Tor network, and do want to do some research about it. I was heard that there are around 10 directory servers which are hard-coded into the Tor Browser Bundle. So could anyone please tell me what…
2523fewqf23f
  • 545
  • 1
  • 3
  • 12
5
votes
1 answer

Proxy after Tor in Tails

A lot of sites are blocking Tor IP or I must fight with capchta. So can I use proxy after Tor in Tails? For connection tails->tor->proxy->www. If not proxy, maybe ssh tunnel is possible?
ovol
  • 51
  • 1
  • 2
5
votes
1 answer

How to protect against DoS but not harm Tor users

Often when websites want to protect themselves against Denial-of-Service attacks, they will limit the number of requests one IP address can make in a given span of time. Sometimes this practice adversely affects Tor users because the high volume of…
mttpgn
  • 638
  • 3
  • 9
5
votes
2 answers

Does Tor team have plans to implement post-quantum asymmetrical encryption schemes?

There is information that NSA is building quantum computer. Since it would make it possible to crack RSA using Shor's algorithm and we unlikely to know if they will successfully build it and start using, this becomes serious security problem. Would…
5
votes
1 answer

Which one is preferable :electrum or blockchain.info in the sense of anonymity?

What is better option, electrum or blockchain.info when using Tor, regarding anonymity? I read here: http://www.coindesk.com/bitcoin-tor-anonymity-can-busted-2500-month/ that it's possible to deanonymize Tor user who uses bitcoin protocol. But,…
user5101
  • 51
  • 1
5
votes
2 answers

Is it posible to choose what entry node you want to use?

If I know of an entry node that I know the device running it is not malicious or being watched, do I have the ability to only use that as an entry point? And would this be potentially more secure than using a random node that could be run by a…