Most Popular
1500 questions
3
votes
1 answer
Two instances of Tor behave differently
I have a local and a server instance. My task: Run multiple Tor instances.
On the local machine, I run Tor by means of command line:
tor --RunAsDaemon 1 --CookieAuthentication 0 --HashedControlPassword "" \
--ControlPort 10001 --PidFile tor1.pid…
Roman Viv
- 31
- 1
3
votes
1 answer
Is it possible to have "username@site.onion" addresses and FULLY avoid DNS with email?
I'm only just starting to look into email on Tor - and so far I'm only finding either email hosts whose sites (including webmail login) are hosted on .onion addresses, or whose POP, IMAP and SMTP servers can clearly be connected to in the .onion…
user1006
3
votes
2 answers
Is exit node able to modify / add packets to a stream?
Is it possible for an exit node to modify the data stream of a circuit, for example could a cell such as a padding cell be send down the stream after the data have been transmitted ?
I am thinking this is possible due to the binary modification…
user2962401
- 447
- 2
- 7
3
votes
1 answer
Path selection constraints not working as expected
From Section 2.2 of the path specification
We do not choose any router in the same family as another in the same
path. (Two routers are in the same family if each one lists the other
in the "family" entries of its descriptor.)
On more…
user5341
3
votes
2 answers
IP address tracking by accessing personal accounts
If I use Tor to log into my personal accounts (gmail, facebook, hotmail) I know I won't be anonymous anymore but is there any way they can trace my IP address? Either my ISP or anyone else?
I"m mostly concerned about someone finding my location…
inocente
- 31
- 1
3
votes
1 answer
When Tor starts Glib Critical message - what is it?
(process:4137): GLib-CRITICAL **: g_slice_set_config: assertion 'sys_page_size == 0' failed
ubuntu 14.04.1 trusty
What does the message mean?
guest
- 81
- 2
3
votes
2 answers
Can hidden services accept multiple simultanous connections?
When a webserver runs behind a hidden service, can it serve multiple HTTP requests at the same time, or will it only be able to handle one request at a time?
Maestro
- 131
- 2
3
votes
0 answers
PPTP VPN to Tor
I have a Mac OS X server with a PPTP VPN server running. I want to connect my iPhone to Tor by routing all traffic via my VPN server.
How can I configure my server to route the outgoing traffic over Tor?
user1079160
- 231
- 1
- 2
- 3
3
votes
1 answer
Minimum Processor required?
I have an older computer I'd like to set Tor up on, but I'm trying to figure out if its Intel Pentium 2 will support it. I have 2GB of RAM, XP SP3, adequate graphic/audio cards, etc. I' just like to know if an Intel Pentium 2 will run it, and if so,…
Timtech
- 135
- 6
3
votes
2 answers
How to set up an obfs3 bridge on port 80 and/or 443?
While setting up obfs3 bridges on ports lower than 1024 seem to be tricky, some firewalls only allow connections on these certain ports.
An in detail, step by step guide could help us here.
mrphs
- 2,754
- 4
- 21
- 34
3
votes
2 answers
What is identity correlation?
Can you describe please, what identity correlation is referring to?
Why should I care?
How can it be prevented?
adrelanos
- 2,847
- 2
- 20
- 35
3
votes
2 answers
What is the overall safest way to use Tor?
I have reason to believe that I my status or activities place me at particular risk. I would like to do everything that I can to keep safe while using Tor. I think that I should get a dedicated computer, but I don't know how to set it up, or stay…
flamsmark
- 389
- 2
- 12
3
votes
1 answer
How many Tor-like networks are around?
I'm about an idea, onion routing.
Are there a secret or governments or a half-secret projects with similar technology?
For example, DARPA-BAA-10-69 is a project called "SAFER" (May 20, 2010).
The goal of the Safer Warfighter Communications (SAFER)…
polar bear on the white snow
- 421
- 3
- 11
3
votes
1 answer
Which protocol has the better perfomance TAP or NTor
Just wondering, which protocol, TAP or NTor is less computationally intensive for a relay to process and why ?
Thanks Rich
user2962401
- 447
- 2
- 7
3
votes
1 answer
Can my ISP see that I am operating a hidden service?
Is my ISP able to see that I run a hidden service from the network traffic I make?
My ISP does not allow me to use Tor according to their Terms of Service. The hidden service will do nothing illegal but I am still worried about them shutting us…
user1079160
- 231
- 1
- 2
- 3