Most Popular
1500 questions
4
votes
1 answer
I want to setup my own Tor implemintation, what should I take for?
I have download latest source.
Am I must to change default hard-coded 9 nodes and default ports 9001,9030 only?
How much nodes should I setup around the world for small group of confederates?
polar bear on the white snow
- 421
- 3
- 11
4
votes
1 answer
How to implement transparent proxy on OS X?
I run Tor on my MacBook Air, which has two interfaces: USB Ethernet Adapter and Wifi. I want to use my MacBook as transparent proxy so that it can share the Tor connection through Wifi for cell phones.
I follow the instructions on TransparentProxy,…
Leaves
- 41
- 2
4
votes
3 answers
How can I get consensus data from Directory authority servers for research purpose?
Dear All Experts out there!
I am doing some researches about the Tor Network, and want to frequently download the consensus data from the Directory Authority Servers (let say 5 minutes each).
Thanks to Roya, I know exactly how many Directory…
2523fewqf23f
- 545
- 1
- 3
- 12
4
votes
2 answers
Tails Tor not starting
New user to Tails but when it starts up it says it cannot sync network time, so Tor doesn't start. How do I manually get it sorted via terminal or am I doing something wrong? Have tried MAC spoofing on and off. Internet is working, so at a loss? I'm…
Frank
- 41
- 1
- 1
- 2
4
votes
1 answer
Where along the path is encryption used?
This question is born out of two questions that I saw coming up.
Is the connection between my computer and the Tor network encrypted?
How does Tor encrypt my traffic before it sends it to the server? Does it even do that?
Please explain, where…
bastik
- 2,684
- 18
- 28
4
votes
2 answers
Access local router in Tor Browser?
I have Tor Browser installed with virtually default settings, nothing advanced tweaked at all like proxy, security or network settings.
I just tried to access 192.168.0.1 from within my computer's Tor Browser and noticed it wouldn't work:
I can…
user1006
4
votes
1 answer
Would Tor remain anonymous in a post-quantum future?
I'm writing a near-future sci-fi novel where general quantum computing has been developed and SSL has been replaced with a security protocol based on quantum key distribution (QKD). Tor would still be able to establish circuits based on QKD. What…
Allan Rempel
- 41
- 1
4
votes
1 answer
What does "[warn] Query '[scrubbed]' didn't have valid rend desc in cache. Failing." mean?
I am transferring files over Tor and I am seeing the following message in my Tor log file.
Can someone explain what it means?
[warn] Query '[scrubbed]' didn't have valid rend desc in cache. Failing.
Manas B
- 565
- 1
- 4
- 7
4
votes
1 answer
Is Tor image friendly?
Are there any security concerns if multiple copies of a single Tor installation are used simultaneously? I ask this question in the context of virtual machine images or containers.
Worded differently, does Tor generate secret information that should…
urubi
- 143
- 2
4
votes
1 answer
What does "Permanent "Allow" commands in private windows" in Noscript 2.6.9.10 employed in Tor browser mean?
Tor browser version 4.0.3 employes Noscript version 2.6.9.10 and one has observed a new drop in command in this Noscript version. Namely: "Permanent "Allow" commands in private windows".
What is the purpose of this drop in command in Noscript and…
Roya
- 3,240
- 3
- 19
- 40
4
votes
1 answer
Is TorBirdy also securing requests by Thunderbird to PGP keyservers?
I use Icedove/Thunderbird on Debian together with TorBirdy. And it works very well. Now I created a new keypair and uploaded it to a keyserver and asked myself if TorBirdy is taking care of this connection also. Does anyone know?
Michael
- 485
- 1
- 4
- 11
4
votes
1 answer
How Guard Discovery attack in Tor network works?
How Guard Discovery attack works?
What steps an attacker need to perform in order to discover the guard relay of the HS?
How easy this attack can be realized in the real world?
What are the countermeasures?
programings
- 267
- 1
- 9
4
votes
2 answers
Why do index descriptors use hashes?
According to the Directory Specification:
Descriptors were indexed by their digests, in order to prevent malicious caches from giving different versions of a router descriptor to different clients.
But the hashes for the descriptors can be so…
Kar
- 141
- 2
4
votes
1 answer
Why is the amount of incoming/outgoing traffic different on a non-exit relay?
I noticed something when letting a relay (non exit) run for a few days: The amount of traffic sent is larger than the amount received.
This is confirmed by looking at the tor log and also by looking at ifconfig.
Examples of one day:
[...]I've sent…
leepfrog
- 183
- 6
4
votes
2 answers
Strange window anomalies when starting Tor Browser
I recently updated to Tor Browser 4.0 and found that this new version has a number of oddities in the realm of how it draws its window. Please examine the attached screenshots.
This screenshot shows how the Tor Browser window first shows up on my…
user1128
- 306
- 1
- 3
- 16