Most Popular
1500 questions
4
votes
3 answers
Multiple adversaries able to deploy large numbers of relays; do they dilute each other's effectiveness?
I note that when researchers analyse some particular types of attacks on Tor security, they assume a SINGLE adversary who is capable of deploying a significant number of relays that will eventually be selected as guards and exit relays. If that is a…
Quentin
- 41
- 1
4
votes
3 answers
How does Tor transparent proxying work?
I would like to configure my wireless router as an "anonymizing middlebox" for guests. I have read the directions here.
The tutorial, as I understand:
Creates a wireless network and assigns it to a firewall zone named 'transtor'.
It then adds rules…
matega
- 171
- 1
- 1
- 7
4
votes
2 answers
using pluggable transport 'obfs3', but we can't find a pluggable transport proxy supporting 'obfs3'
root@alireza:# apt-cache policy tor obfsproxy
tor:
Installed: 0.2.4.23-1
Candidate: 0.2.4.23-1
Version table:
*** 0.2.4.23-1 0
500 http://ftp.debian.org/debian/ testing/main amd64 Packages
100 /var/lib/dpkg/status
obfsproxy:
…
alireza
- 143
- 5
4
votes
1 answer
Orbot settings for Wifi with proxy!
I need to use a proxy in order to use Wifi at the office.
For 'Tor browser bundle' (on my laptop) I know where to write the Wifi proxy settings,
but where do I enter them when using orbot? (on samsung GT-s7102).
Sidbk01
- 41
- 1
- 2
4
votes
1 answer
Why does my Tor Cloud bridge receive more traffic than it sends?
I am running a Tor Cloud EC2 instance. From the log files, it looks like it receives more traffic than it sends. What causes this?
user72
4
votes
3 answers
Does caploader able to identify Tor traffic in the network?
I found this blog post which says that they were able to identify Tor traffic by using a software called caploader? Have any one tried this software? I wasn't able to try it by myself as the protocol identification feature is not activated in the…
Flora9
- 71
- 3
4
votes
1 answer
Create hidden service of remote virtual host
I need to create a hidden service of a website accessible thru my home lan network, from my PC (192.168.1.54) where Tor is also running, I connect to mywebsite.com,
mywebsite.com points to 192.168.1.56 (I know cause I've pinged it). The problem is…
pinco
- 41
- 1
4
votes
2 answers
Can Tor connections between hidden services be aggregated using ifenslave? (... and might Mevade be doing this?)
Using ifenslave on two endpoint Linux servers, it's possible to aggregate (aka bond or team) multiple tun or tap interfaces (e.g., tun0, tun1, ...) into a single link, combining bandwidth (less overhead) and improving reliability. SSH or OpenVPN can…
mirimir
- 3,017
- 1
- 19
- 29
4
votes
1 answer
How to request new circuit from within workstation?
I'm using Whonix Gateway and Workstation. I can request a new tor circuit in the Gateway via arm, I press "n". How can I do this in the Workstation terminal?
siamii
- 141
- 2
4
votes
2 answers
Tor Browser Bundle on Mac - how to run obfsproxy?
I have downloaded and installed the Tor browser bundle v. 3.6.3 for Mac
Website says Obfsproxy is standard included in that one - which is correct- it works in Tor Browser.
But I need to run it independently for use with OpenVPN.
On Windows this is…
Volov
- 43
- 3
4
votes
1 answer
What are the dangers of possible Mac OSX backdoor?
Many people say that Mac OSX has a backdoor in it. It probably does, why wouldn't it? It's closed source therefore it would be stupid for Apple not to put in a special access route.
The question is what implications does this have on anonymity/Tor?…
Correl55
- 41
- 1
4
votes
2 answers
Obfsproxy problem in ubuntu
I have problem with Tor and obfsproxy for using bridges on ubuntu 14.04. Tor could not start obfsproxy and always return permission denied.
tail -f /var/log/tor/log
Aug 01 13:06:30.000 [notice] Tor 0.2.4.23 (git-05b81fcd2a655c5a) opening new log…
S.Yavari
- 93
- 5
4
votes
3 answers
What is the best Way To Run Tor (Operating Systems)?
What do you think is the best way to run Tor. And I know its not Windows.
But as for Linux, what is the best way to run TBB. Your everyday desktop, a second computer, a USB Live os such as a live CD or Puppy, Slax, Tails, or DSL?
What about Virtual…
Jim
- 41
- 1
- 2
4
votes
1 answer
Which Tor Browser settings can leak my IP address when changed?
Are there Tor Browser settings that, when changed, can lead to my IP address being leaked?
user72
4
votes
2 answers
Tor and viruses
I was wondering if you can get a virus by opening some websites of the deep web using Tor? With some links it's hard to tell if they are legit or not, recently I came across some website saying that "exploit was successful" and nothing more...so, it…
Scarednoob
- 43
- 1
- 1
- 3