Most Popular
1500 questions
4
votes
1 answer
Do exit node operators risk being charged with downloading or trafficking child porn?
One of the most common reasons I hear for not running an exit relay is the risk of it being used to access child porn and the owner of the exit node being accused or charged with downloading or trafficking the material. How significant is this risk?…
Herbalist
- 495
- 3
- 12
4
votes
2 answers
ExitPolicy to local machine
There is a comment in the torrc man page that exit policies can target the local machine or private networks, like say :
ExitPolicy accept 127.0.0.1:80
ExitPolicy reject private:*
Does anyone actually do this? How would one actually exploit it? …
Jeff Burdges
- 485
- 2
- 13
4
votes
1 answer
How can I run multiple obfuscated services on a machine?
I would like to add an OpenVPN service (for personal use) to a machine I already have an obfuscated Tor bridge running on (for shared use). I would like the option to access this VPN through obfsproxy, while still allowing for Tor to have its own…
joncam
- 375
- 2
- 9
4
votes
1 answer
Why doesn't Tor Browser disable cookies?
Why doesn't the Tor Browser (4.5.1), even on the highest security setting disable cookies? They could be used to trace a user, potentially making it possible to build a profile.
meee
- 1,212
- 2
- 9
- 21
4
votes
1 answer
Multiple instances of Tor w/ Tor Browser since v4.5
I'm aware this has already been asked, but with an update to Tor browser it seems a bit more difficult to manage. See here: How to run multiple Tor browsers with different IPs?
It requires editing TorButton preferences, which is no longer an easy…
PoorBob
- 169
- 1
- 8
4
votes
2 answers
Tor Browser keeps kicking me off Ebay
I tried to logon on to Ebay but it refuses to allow me to login to my account. I sign in with my username and pw, but then it immediately logs out. Is this the result of Ebay blocking the Tor browser, or am is this Tor blocking some security flaw…
anonyMuss
- 41
- 1
- 2
4
votes
2 answers
How to configure my own application to use Tor?
I'm trying to write a little application which connects to the internet over Tor. The application uses the zeromq messaging library to get some information from another server and it's basically only one file that runs.
On the TorifyHOWTO page I…
hubbtwea
- 411
- 2
- 5
- 6
4
votes
1 answer
How do I manually setup a relay on OS X?
Manually configuring a Tor Relay on OS X
(Yosemite, Tor 0.2.5.11)
Since Vidalia has been deprecated the EFF videos and other documentation about running a relay outside of the Tor Browser Bundle are no longer up to date for OS X.
General google…
Zach Alberico
- 161
- 1
- 8
4
votes
3 answers
Relay getting traffic showing as unreachable?
UPDATE: See my answer below for instructions, I added a Dynamic DNS and added that as the "Address" in torrc. Once I did that I got the "Self-testing indicates your ORPort is reachable. Excellent." message.
I recently started a relay and it appears…
PopSmith
- 101
- 5
4
votes
2 answers
How to call Tor browser using Selenium using Java?
How to call Tor browser using Selenium testing framework using Java?
I have downloaded Tor and I have started IDE with Selenium JARs included.
I want to open Tor browser using selenium with Java and want to work on web URL.
user445
4
votes
1 answer
What does it mean to protect / unprotect a cookie?
In the Tor button menu, there is a "Cookie Protections" item, which opens up a dialog that lists all my cookies, and allows me to protect or unprotect each (and specify whether new cookies should be protected or unprotected by default).
What does…
Mhysa
- 43
- 3
4
votes
2 answers
How do you access a second USB drive from Tails?
I am running Tails 1.3.1 off of a USB stick and want to save files onto a second USB stick from the Tor Browser. I can see and access files that were on the second USB stick from the file browser but cannot access it through the save dialog in Tor…
needtouseUSB
- 41
- 1
- 1
- 2
4
votes
1 answer
How to verify Tor Browser Bundle (TBB) 3.x?
Downloading
sha256sums.txt
downloading one or more signatures
the archive itself
Then verifying each signature one by one. Then creating the sha256 of the archive. Then looking into the sha256sums.txt file if the sha256 sum matches. These are a…
adrelanos
- 2,847
- 2
- 20
- 35
4
votes
1 answer
Issues with Tails and a high dpi screen
I am booting from Tails using a usb. I can start up the machine fine, but everything looks very small. My resolution is 2880x1800 with a dpi of 220, but it is detected as 2880x1800 with a dpi of 94.
I have tried using xrandr to change the dpi but…
Jack
- 41
- 1
4
votes
2 answers
How is the identity encoded to display the fingerprint
I am looking to encode the identity of a router retrieved from the consensus to give me it's finger print, what is the encoding method used to transform the identity to the fingerprint ?
Thanks
user1685880
- 61
- 1