Most Popular

1500 questions
4
votes
1 answer

Tor no longer secure, but can this be fixed?

In a recent episode of a podcast called Security Now (#493: Tor: Not so Anonymous), they claimed that traffic can be delayed in unique ways to identify which client IP address on one side of the Tor onion is communicating with which server IP on the…
Selfy
  • 143
  • 2
4
votes
1 answer

Blocked Tor exit nodes

I know of several services that block traffic from Tor exit nodes including, as of a couple of months ago, the Australian Legal Information Institute. It's a sad state of affairs given that there are people whose countries block their access to…
CrimsonDark
  • 774
  • 2
  • 5
  • 23
4
votes
2 answers

whonix and location of hidden_service?

I am newbie, first time I try whonix, I didn't find in workstation hidden_service in torrc file and gateway station show me /etc/tor/torrc but there is nothing, I added two lines: HiddenServiceDir /var/lib/tor/hidden_service/ HiddenServicePort 80…
bobrock
  • 161
  • 6
4
votes
1 answer

Does the current version of Tor work with Citrix/terminal services?

I have tried in the past to use Tor in multi user environments like Citrix but it only worked for one user at a time. Has this changed with later versions? If not does anyone know if it could be looked into?
4
votes
2 answers

I want to host multiple hidden services on my apache

HiddenServiceDir /home/username/hiddenservice19/ HiddenServicePort 80 127.0.0.1:80 HiddenServiceDir /home/username/hiddenservice18/ HiddenServicePort 80 127.0.0.1:67 After restarting Tor it creates those 2 files, I get my onion address and I can…
jones
  • 41
  • 2
4
votes
2 answers

Website blocking Tor Traffic

I am trying to access a website with Tor and recently it began rejecting my traffic with "Gateway GEO - IP Alert This request is blocked by the SonicWall Gateway GEO IP service." I looked around and it seems this website has blocked all Tor…
luckylux
  • 41
  • 1
  • 2
4
votes
2 answers

How many times does client fetch the consensus file from directory authorities?

I am wondering that how many times a client "talks" to Directory Server (say, it can be a hard-coded Directory Authority Server, or just a normal Directory Server) to fetch the consensus file, knowing that the consensus file is changed, and…
2523fewqf23f
  • 545
  • 1
  • 3
  • 12
4
votes
2 answers

Marketing methods employed by Tor hidden services?

I am just curious to know about the marketing methods being employed by Tor hidden services .These .onion domain sites cannot be indexed by normal search engines like google etc nor they can be used by browsers of the clearnet like chrome,IE etc.…
Anonymousscum
  • 141
  • 2
  • 7
4
votes
1 answer

Same DNS server for many different Tor 'idenitities'

In my browser (Iceweasel), which is running with Tor via proxychains, I changed my IP address a good few times, by restarting Tor. Each time, I did the standard test at dnsleaktest.com and, the result was the exact same DNS server from level 3…
Totem
  • 143
  • 5
4
votes
1 answer

Is Tor Browser vulnerable to tracking via HSTS Super Cookies?

Is Tor Browser vulnerable to the HSTS Super Cookies tracking technique described here? (Initial experimentation with Tor Browser 4.0.3 suggests it's not: I get a different tracking id after selecting "New identity" and revisiting the page)
greenwave
  • 41
  • 1
4
votes
3 answers

Create a wifi hotspot by a laptop which pass all traffic through Tor (Windows)

I know the product Anonabox which turns a normal connection into wireless Tor traffic. Because the process of creating a wifi access point is relatively easy, I'm wondering is there a way I could route all traffics of the wifi access point through…
user2294520
  • 73
  • 2
  • 5
4
votes
1 answer

How many 'peers' will be served by the average exit relay at any given time?

If the NSA is listening and recording at the (very often unecrypted) end where the Tor exit relay meets the Internet, noting all the fingerprinting information (as the webserver interacts with the Tor exit relay) which we strive so much to minimize,…
user1006
4
votes
2 answers

Two Internet connections - how bind/lock Tor to use only one of them?

As the title says - I have two network interfaces on my computer and I want to bind/lock Tor to strictly use only one of them. How do I achieve that? I tried doing it with the application "ForceBindIP" ( http://old.r1ch.net/stuff/forcebindip/ ), but…
4
votes
2 answers

Tor use frequent entry nodes after each launch

After launching Tor I can see in my firewall logs there are always few IPs that i'm connecting to. Is this something normal? These are entry nodes right? But why always the same? Does Tor cache something? I think on windows this problem doesn't…
nora
  • 43
  • 2
4
votes
1 answer

Would anoNet-style darknets of Tor hidden services be workable?

Reading user329's question about running a secure email network using SMTP over Tor, I was wondering how standard email transport could be implemented among hidden services. And then I remembered anoNet. Wikipedia says: "anoNet is a decentralized…
mirimir
  • 3,017
  • 1
  • 19
  • 29