Most Popular
1500 questions
3
votes
1 answer
Can a relay decide which protocol to use (TAP or ntor)?
I've just started studying Tor and I came across TAP and ntor protocols. Just want to clear up that are these protocols decided at the time of circuit creation or each relay can decide on its own that which protocol to use?
Manoj Vadehra
- 133
- 5
3
votes
1 answer
How is a Tor hidden service mapped to the 80 bit hash of the service's public key?
How does the name of a Tor hidden service (zzzz.onion) encode the 80 bit hash mentioned below?
"permanent-id" is the permanent identifier of the hidden service,
consisting of 80 bits. It can be calculated by computing the hash value
of the public…
Nick ODell
- 167
- 7
3
votes
1 answer
Setting tor hidden service in /etc/hosts
ok so I wasn't receiving updates for drupal so I decided to go to /etc/hosts
and added my hostname like so
127.0.0.1 something.onion
I restarted tor and drupal now can receive updates again anyways does this cause any issues? Is it dangerous to do…
hugh
- 31
- 1
3
votes
1 answer
How does Tor know which HSDir to connect to?
How does Tor know which HSDir to connect to to find the address in the hash table?
Let's say the address is ro3jr3nvvn2223cd.onion
How does tor know which HSDir will store this in their hash table?
Surely Tor cannot check every HSDir to see if it…
Ben
- 41
- 1
- 3
3
votes
3 answers
why do I get "Access Denied" at certain web sites when I didn't last year?
I'm using Tor Browser 4.5a5 (based on Mozilla Firefox 31.6.0)
on Windows 7/64, home router environment.
Several iterations back, I could access http://www.foxnews.com/ .
Now, no matter how many times I get new identity, I see the error:
Access…
rocky-x
- 31
- 1
- 1
- 2
3
votes
1 answer
Can bookmarks set in the TBB (or Firefox) be used for Fingerprinting? Is it safe to use bookmarks?
Bookmarks are (for me) a handy feature to keep track of notable sites in the internet.
Does the Tor Browser Bundle (and does that differ from the way Firefox behaves?)
offer the bookmarks saved during sessions to webservices to be read?
How actually…
concurrere
- 31
- 2
3
votes
1 answer
Relay bandwidth reporting frequency
I've been running a middle relay on a Raspberry Pi for some time now. Recently, I switched out my first generation Pi for a 2nd generation model B. I installed Tor on the new Pi and moved the keys accordingly. The relay came up again just fine, and…
Joost
- 137
- 6
3
votes
2 answers
How to install a Transport Plugin on OnionPi
so I got Onion Pi from Adafruit running on my RaspberryPi2 and I can connect and everything. Problem is I'm living in China and most tor traffic is blocked by the great firewall. However, I did successfully connect using the meek-amazon transport…
user7052
3
votes
3 answers
Are there tor exit nodes (country specific) that are not listed in the tor node list?
Sometimes I have to use Tor as a proxy server to let myself appear in a specific country. This can be done by editing the torrc.
Problem is: Some websites are blocking traffic from Tor. I presume they are using the list provided by Tor Project to…
kelmat
- 131
- 1
3
votes
1 answer
How to properly build static binary of Tor on Ubuntu 13.04?
Is there a guide to build static version of Tor from latest source on Ubuntu 13.04?
I'm looking for ldd output:
not a dynamic executable
There is main problem that I have remembered, openssl-dev doesn't contain static part, only shared version of…
polar bear on the white snow
- 421
- 3
- 11
3
votes
6 answers
How does the tor hash-password option work?
I'm trying to write a little python GUI to make interaction with tor control easier on windows, to make using hidden services easier. I'd like to be able to use a password to authenticate, but tor.exe --hash-password mypassword didn't print out…
3uc1id
- 133
- 1
- 1
- 4
3
votes
1 answer
Why does my Tor talk to activate.adobe.com?
As shown in the attached picture, can anyone give me a hint why my Tor.exe talk to the host of Adobe? while I am not using Tor to access or use any Adobe services. does my PC get hacked or injected by virus?
2523fewqf23f
- 545
- 1
- 3
- 12
3
votes
1 answer
Does all direct clients have to talk to Directory Authorities to fetch the consensus at the first step?
I just read a description on Tor Metrics stating that: "These estimates are derived from the number of directory requests counted on directory authorities and mirrors".
So my question is already stated above, but in more details: "does a…
2523fewqf23f
- 545
- 1
- 3
- 12
3
votes
2 answers
What is most likely cause of page injections while using Tor?
So, I have a connection from my Linux-64-tor-2.6.3 TBB browser to an entry node in a foreign country. That country is a very long way from here. The node is running the latest Tor, so it's using a ECDHE* (supposedly strong) encryption cipher…
Jake
- 31
- 1
3
votes
2 answers
Continue running middle relay with Vidalia 0.2.21 (Tor 2.4.23)?
The Vidalia bundles are still advertised in the TBB3 FAQ, but no longer available to download. What should Windows users who want to run a middle relay do? Conversely, should operators stop running relay that were set up with the last downloadable…
Cathryne
- 43
- 3