Most Popular
1500 questions
3
votes
1 answer
Can I run a relay just part time?
I have been operating a potentially fast relay for a few days now. I only wish to run ~ 15 hrs. a day so I can shut off my laptop at night. I've been reading about Tor and relays for days now and haven't seen this addressed. On the average I begin…
bill
- 31
- 1
3
votes
1 answer
[warn]Proxy Client:unable to connect to xxx.xxx.xxx("TTL Expired")
I am trying to connect to Internet via Tor. Tor used to work before(even the bridges). But now when I try to connect via bridge,getting this error,
Jul 25 18:30:35.000 [warn] Proxy Client: unable to connect to xxx.xxx.xxx. ("TTL expired")
Jul 25…
Nishaanth Yuvan
- 71
- 1
- 4
3
votes
1 answer
What is the relationship between guard nodes and bridges?
What is the relationship between guard nodes and bridges when building Tor circuits?
If I connect to the Tor network through a bridge, is the bridge acting as my guard node (such that there are still only three hops/tor nodes between me and the…
myrtle
- 31
- 1
- 2
3
votes
2 answers
Tor/Tails Exit Node Connection Encryption
If I use a firewall (IPcop) to allow only HTTPS (443) traffic from the LAN/Tails box/Green NIC, and block all other protocols/traffic, is all traffic from the Exit Node guaranteed to be encrypted?
Are all web requests in which the URL begins with…
Guest
- 31
- 2
3
votes
1 answer
Which one of the relay nodes need to get compromised for client de-anonymization?
Tor can't protect against traffic confirmation (also known as end-to-end correlation), where an attacker tries to confirm an hypothesis by monitoring the right locations in the network and then doing the math. The question is: Is it enough for the…
Roya
- 3,240
- 3
- 19
- 40
3
votes
2 answers
Creating streams to a hidden service
Looking for help understanding the following line from the rend-spec:
754 To open TCP connections to Bob's location-hidden service, Alice's OP sends
755 a RELAY_COMMAND_BEGIN cell along the established circuit, using the special
756 …
user2962401
- 447
- 2
- 7
3
votes
0 answers
Is Tor sandboxed on mac os x?
I'm concerned that running a Tor relay may open my machine to attack vectors from bugs (there are always bugs) in the daemon. Using the default installer, will Tor run in an account with limited permissions on Mac OS X (network only?) or do I either…
Nick
- 31
- 1
3
votes
1 answer
How to best help site operators protect themselves from Tor based abuse?
The primary function of Tor, anonymity, is extremely valuable to many people around the globe. Unfortunately, it also makes Tor an easily abused tool for cybercriminals - among them spammers.
There are several sites that have given up trying to…
Ivar
- 1,660
- 3
- 13
- 26
3
votes
1 answer
Example GET request for the rendezvous doc
Does anyone have an example of what GET request is needed to be send to the responsible HSDir server to retrieve the rendezvous2 document for a specified HS
currently I have
"GET HTTP/1.1\r\nHost:"+web_addresses+"\r\n\r\n"
but do not think this is…
user2962401
- 447
- 2
- 7
3
votes
4 answers
Does using Email to send bridges and pluggable transport bridges hinder anonymity?
Bridges can be advertised by Email to clients. This procedure hinders anonymity as in new revelations by Das Erste. May this procedure be halted until more anonymous ways are found and/or the procedure continues with the strict warning that it is…
Roya
- 3,240
- 3
- 19
- 40
3
votes
2 answers
Android can't connect after Orbot crash
Am I screwed? Installed Orbot, enabled transparent proxying, tried to connect, connection failed, Orbot crashed.
Now, I can't connect at all.
Tried resetting Orbot, re-booting, re-configuring. Just uninstalled Orbot. Now, I have no connection, and…
Ardvark Twist
- 31
- 2
3
votes
1 answer
what is the Rendezvous point identity ID
I am currently reading the specification for rendezvous point and one little point has got me confused.
When constructing a packet to send to from Alice's OP to Introduction Point it asks for the Rendezvous point identity ID, I have not found this…
user2962401
- 447
- 2
- 7
3
votes
1 answer
How to disable access to a particular account via torbirdy
I have 3 mail accounts on thunderbird that connect to respective pop servers through torbirdy. I need to access one of these mail accounts without Tor for legal reasons. I have looked in my account settings and torbirdy preferences to make this…
Chanchal
- 31
- 1
3
votes
4 answers
How can I prevent my Tor relay from being used to access hidden services?
I've recently started running a Tor relay. However, upon further investigation I realized that I enable criminals and people of poor moral character to host hidden tor services where they publish pictures/videos of rape, child pornography, GF…
Matrix
- 133
- 3
3
votes
1 answer
Tails Live CD checksum
If you made USB stick in Linux with the official method, then you first insert the USB stick of Tails Live OS, then run "Disks" from the menu, you can see the USB stick, click it and at the right side of window shows the paragraph about the volumes,…
diar
- 39
- 2