Most Popular

1500 questions
3
votes
1 answer

Can I run a relay just part time?

I have been operating a potentially fast relay for a few days now. I only wish to run ~ 15 hrs. a day so I can shut off my laptop at night. I've been reading about Tor and relays for days now and haven't seen this addressed. On the average I begin…
bill
  • 31
  • 1
3
votes
1 answer

[warn]Proxy Client:unable to connect to xxx.xxx.xxx("TTL Expired")

I am trying to connect to Internet via Tor. Tor used to work before(even the bridges). But now when I try to connect via bridge,getting this error, Jul 25 18:30:35.000 [warn] Proxy Client: unable to connect to xxx.xxx.xxx. ("TTL expired") Jul 25…
3
votes
1 answer

What is the relationship between guard nodes and bridges?

What is the relationship between guard nodes and bridges when building Tor circuits? If I connect to the Tor network through a bridge, is the bridge acting as my guard node (such that there are still only three hops/tor nodes between me and the…
myrtle
  • 31
  • 1
  • 2
3
votes
2 answers

Tor/Tails Exit Node Connection Encryption

If I use a firewall (IPcop) to allow only HTTPS (443) traffic from the LAN/Tails box/Green NIC, and block all other protocols/traffic, is all traffic from the Exit Node guaranteed to be encrypted? Are all web requests in which the URL begins with…
Guest
  • 31
  • 2
3
votes
1 answer

Which one of the relay nodes need to get compromised for client de-anonymization?

Tor can't protect against traffic confirmation (also known as end-to-end correlation), where an attacker tries to confirm an hypothesis by monitoring the right locations in the network and then doing the math. The question is: Is it enough for the…
Roya
  • 3,240
  • 3
  • 19
  • 40
3
votes
2 answers

Creating streams to a hidden service

Looking for help understanding the following line from the rend-spec: 754 To open TCP connections to Bob's location-hidden service, Alice's OP sends 755 a RELAY_COMMAND_BEGIN cell along the established circuit, using the special 756 …
user2962401
  • 447
  • 2
  • 7
3
votes
0 answers

Is Tor sandboxed on mac os x?

I'm concerned that running a Tor relay may open my machine to attack vectors from bugs (there are always bugs) in the daemon. Using the default installer, will Tor run in an account with limited permissions on Mac OS X (network only?) or do I either…
Nick
  • 31
  • 1
3
votes
1 answer

How to best help site operators protect themselves from Tor based abuse?

The primary function of Tor, anonymity, is extremely valuable to many people around the globe. Unfortunately, it also makes Tor an easily abused tool for cybercriminals - among them spammers. There are several sites that have given up trying to…
Ivar
  • 1,660
  • 3
  • 13
  • 26
3
votes
1 answer

Example GET request for the rendezvous doc

Does anyone have an example of what GET request is needed to be send to the responsible HSDir server to retrieve the rendezvous2 document for a specified HS currently I have "GET HTTP/1.1\r\nHost:"+web_addresses+"\r\n\r\n" but do not think this is…
user2962401
  • 447
  • 2
  • 7
3
votes
4 answers

Does using Email to send bridges and pluggable transport bridges hinder anonymity?

Bridges can be advertised by Email to clients. This procedure hinders anonymity as in new revelations by Das Erste. May this procedure be halted until more anonymous ways are found and/or the procedure continues with the strict warning that it is…
Roya
  • 3,240
  • 3
  • 19
  • 40
3
votes
2 answers

Android can't connect after Orbot crash

Am I screwed? Installed Orbot, enabled transparent proxying, tried to connect, connection failed, Orbot crashed. Now, I can't connect at all. Tried resetting Orbot, re-booting, re-configuring. Just uninstalled Orbot. Now, I have no connection, and…
3
votes
1 answer

what is the Rendezvous point identity ID

I am currently reading the specification for rendezvous point and one little point has got me confused. When constructing a packet to send to from Alice's OP to Introduction Point it asks for the Rendezvous point identity ID, I have not found this…
user2962401
  • 447
  • 2
  • 7
3
votes
1 answer

How to disable access to a particular account via torbirdy

I have 3 mail accounts on thunderbird that connect to respective pop servers through torbirdy. I need to access one of these mail accounts without Tor for legal reasons. I have looked in my account settings and torbirdy preferences to make this…
Chanchal
  • 31
  • 1
3
votes
4 answers

How can I prevent my Tor relay from being used to access hidden services?

I've recently started running a Tor relay. However, upon further investigation I realized that I enable criminals and people of poor moral character to host hidden tor services where they publish pictures/videos of rape, child pornography, GF…
Matrix
  • 133
  • 3
3
votes
1 answer

Tails Live CD checksum

If you made USB stick in Linux with the official method, then you first insert the USB stick of Tails Live OS, then run "Disks" from the menu, you can see the USB stick, click it and at the right side of window shows the paragraph about the volumes,…
diar
  • 39
  • 2