Most Popular

1500 questions
4
votes
2 answers

c# make web request using Tor

I'm trying to create web request using tor.it's giving error "Unable to connect to the remote server" inner exception "No connection could be made because the target machine actively refused it 127.0.0.1:8118" tor browser working fine. Code: …
Nemi Chand
  • 89
  • 1
  • 1
  • 5
4
votes
1 answer

Why is "Block dangerous and deceptive content" not active?

Immediately after downloading the Tor browser I went to the options page and saw that the 'Block dangerous and deceptive content' box under 'Deceptive Content and Dangerous Software Protection' was not ticked. Is this the default setup? Would…
4
votes
1 answer

Is there a guide anywhere on how to safely set up a hidden service and lockdown the server so no info will leak?

I'm trying to set up a hidden service, but I'm primarily a web developer and not a security guy. I know quite a bit about computer security and I think I could probably configure Tor and iptables correctly, but it's not my primary focus so I'm…
user1586
  • 41
  • 1
4
votes
3 answers

Can Heartbleed in connection with Tor read all my 2GiB ram, or it is limited to the memory already allocated to the SSL process?

If I am using a Tor version that is infected with SSL Heartbleed (CVE-2014-0092) Can someone read my hall 2GiB ram? Or is the damage limited to the memory already allocated to the SSL process? In other words: if I copied sensitive document from Ms…
miuea
  • 51
  • 4
4
votes
4 answers

How to block all traffic except Tor on a Windows machine?

Windows 7 has a firewall. I have tried blocking all the traffic from a box except that of Tor and Firefox (which uses Tor). It doesn't work. Does anyone have any experience with this?
Jack Gundo
  • 41
  • 1
  • 2
4
votes
1 answer

Is it still true that each onion relay keeps an open TLS connection to every other relay? Why?

The original paper describing Tor says this on section 4: Each onion router maintains a TLS connection to every other onion router. That paper is from 2004, when there was a much smaller number of relays on the network. Now there are more than…
agentofuser
  • 207
  • 1
  • 4
4
votes
2 answers

Can someone in our local network find out that I use Tor browser?

My desktop is connected to our office network. If I use the Tor browser, can our IT trace that I'm the one using Tor in the office? Could the websites I visited using Tor browser also traced back?
user1456
  • 41
  • 1
  • 2
4
votes
3 answers

How to set an IP address from a specific state in the US?

Is it possible, and if so how, to set tor so that my entry and/or exit IP will be from a specific state in the US ? Idk like NY, FL, TX, CA... I already know how to choose a specific country, but i'd like to know if i can choose the state as well…
MCH
  • 41
  • 1
4
votes
1 answer

Why am I getting ads by Google

I use DuckDuckGo search and when I went to whatismyipaddress.com using Tor browser, some ads by Google popped up: Is my anonymity being compromised?
user23409
  • 41
  • 1
4
votes
1 answer

DNS over HTTPS and Tor

Mozilla Firefox has added the ability to use Trusted Recursive Resolver within Firefox. This means that it's now possible to route DNS queries over HTTPS without additional software. It was included in Firefox 62, which is what the most rent Tor…
user23257
4
votes
2 answers

What prevents someone from listing all the HSP's in the DHT and connecting to them?

I'm not clear on what is actually stored in the DHT, or the contents and purpose of the introduction message. If all of the hidden services are listed in a Distributed Hash Table, what prevents a modified client from directly connecting to a HSP, or…
4
votes
2 answers

Problem running Tor under Ubuntu

I followed the instructions to install Tor in Ubuntu 12.04 LTS. When I invoke Tor from the command line it proceeds to the point that I'm told that it has bootstrapped 100% and a circuit is established. But then I keep getting the warning, Got a…
user1398
  • 41
  • 2
4
votes
1 answer

How are Tor websites hosted?

I would like to understand how websites on the dark web hosted? What software is used for hosting? How is it different from hosting a normal website?
Robs
  • 143
  • 1
  • 4
4
votes
2 answers

What is best secure and anonymous OS for hosting Tor or I2P service?

What is best secure and anonymous OS for hosting Tor or I2P service ? ُEditing: i want server OS full support php and mysql I am confused in choosing ٍServer OS (Debian - Ubuntu - Centos - Redhat) thanks
user1397
  • 71
  • 1
  • 4
4
votes
0 answers

How to know the number of circuits through my Tor relay(OR)?

Can anyone tell me how to know how many circuits are being build through my Tor relay(OR)? I am using vidalia.
saurav
  • 777
  • 5
  • 18