Most Popular

1500 questions
3
votes
1 answer

Two instances of Tor behave differently

I have a local and a server instance. My task: Run multiple Tor instances. On the local machine, I run Tor by means of command line: tor --RunAsDaemon 1 --CookieAuthentication 0 --HashedControlPassword "" \ --ControlPort 10001 --PidFile tor1.pid…
Roman Viv
  • 31
  • 1
3
votes
1 answer

Is it possible to have "username@site.onion" addresses and FULLY avoid DNS with email?

I'm only just starting to look into email on Tor - and so far I'm only finding either email hosts whose sites (including webmail login) are hosted on .onion addresses, or whose POP, IMAP and SMTP servers can clearly be connected to in the .onion…
user1006
3
votes
2 answers

Is exit node able to modify / add packets to a stream?

Is it possible for an exit node to modify the data stream of a circuit, for example could a cell such as a padding cell be send down the stream after the data have been transmitted ? I am thinking this is possible due to the binary modification…
user2962401
  • 447
  • 2
  • 7
3
votes
1 answer

Path selection constraints not working as expected

From Section 2.2 of the path specification We do not choose any router in the same family as another in the same path. (Two routers are in the same family if each one lists the other in the "family" entries of its descriptor.) On more…
user5341
3
votes
2 answers

IP address tracking by accessing personal accounts

If I use Tor to log into my personal accounts (gmail, facebook, hotmail) I know I won't be anonymous anymore but is there any way they can trace my IP address? Either my ISP or anyone else? I"m mostly concerned about someone finding my location…
inocente
  • 31
  • 1
3
votes
1 answer

When Tor starts Glib Critical message - what is it?

(process:4137): GLib-CRITICAL **: g_slice_set_config: assertion 'sys_page_size == 0' failed ubuntu 14.04.1 trusty What does the message mean?
guest
  • 81
  • 2
3
votes
2 answers

Can hidden services accept multiple simultanous connections?

When a webserver runs behind a hidden service, can it serve multiple HTTP requests at the same time, or will it only be able to handle one request at a time?
Maestro
  • 131
  • 2
3
votes
0 answers

PPTP VPN to Tor

I have a Mac OS X server with a PPTP VPN server running. I want to connect my iPhone to Tor by routing all traffic via my VPN server. How can I configure my server to route the outgoing traffic over Tor?
user1079160
  • 231
  • 1
  • 2
  • 3
3
votes
1 answer

Minimum Processor required?

I have an older computer I'd like to set Tor up on, but I'm trying to figure out if its Intel Pentium 2 will support it. I have 2GB of RAM, XP SP3, adequate graphic/audio cards, etc. I' just like to know if an Intel Pentium 2 will run it, and if so,…
Timtech
  • 135
  • 6
3
votes
2 answers

How to set up an obfs3 bridge on port 80 and/or 443?

While setting up obfs3 bridges on ports lower than 1024 seem to be tricky, some firewalls only allow connections on these certain ports. An in detail, step by step guide could help us here.
mrphs
  • 2,754
  • 4
  • 21
  • 34
3
votes
2 answers

What is identity correlation?

Can you describe please, what identity correlation is referring to? Why should I care? How can it be prevented?
adrelanos
  • 2,847
  • 2
  • 20
  • 35
3
votes
2 answers

What is the overall safest way to use Tor?

I have reason to believe that I my status or activities place me at particular risk. I would like to do everything that I can to keep safe while using Tor. I think that I should get a dedicated computer, but I don't know how to set it up, or stay…
flamsmark
  • 389
  • 2
  • 12
3
votes
1 answer

How many Tor-like networks are around?

I'm about an idea, onion routing. Are there a secret or governments or a half-secret projects with similar technology? For example, DARPA-BAA-10-69 is a project called "SAFER" (May 20, 2010). The goal of the Safer Warfighter Communications (SAFER)…
3
votes
1 answer

Which protocol has the better perfomance TAP or NTor

Just wondering, which protocol, TAP or NTor is less computationally intensive for a relay to process and why ? Thanks Rich
user2962401
  • 447
  • 2
  • 7
3
votes
1 answer

Can my ISP see that I am operating a hidden service?

Is my ISP able to see that I run a hidden service from the network traffic I make? My ISP does not allow me to use Tor according to their Terms of Service. The hidden service will do nothing illegal but I am still worried about them shutting us…
user1079160
  • 231
  • 1
  • 2
  • 3