Most Popular

1500 questions
3
votes
2 answers

Encrypt traffic between my onion site and exit relays

Is it possible to encrypt all traffic between the last relay and my hidden service site? (I have tried to use an ssl certificate and configure tor like that: HiddenServicePort 443 127.0.0.1:443 but it don't work)
user1394
3
votes
2 answers

Relay remains unmeasured for over 30 days

I run a relay in my home network. The relay runs on my router (self build opnsense machine). Details of my relay indicate that initially it progressed the usual live cycle of a relay. Then all connections drop. Consensus rates dropped and it stopped…
HATEthePLOT
  • 167
  • 6
3
votes
2 answers

Tor Browser-how to verify signature?

Downloaded the file for Win7, also Gpg4Win. Mentioned .asc file did not accompany Tor, in spite of the description on the Torsite. Other ways of verification I could not find. Nevertheless I followed the description involving Gpg4Win under "How to…
user63888
  • 73
  • 2
  • 2
  • 6
3
votes
3 answers

Can Tor really hide my location when I access websites that has the tracing function?

I'm totally new to Tor. I'm kind of stalking some people's blogs and I don't want to let them know. For example if I access someone's wordpress blog (which can trace your locations) using Tor, is it gonna hide my location and what's the blogger…
user28473
  • 31
  • 1
3
votes
1 answer

Tor ExitNodes as ip address is not working

Tor ExitNodes accept ISO country code or Ip address.. Trying to connect Tor ExitNode like.. ExitNodes {X.X.0.0/16},{X.X.0.0/20} StrictExitNodes 1. but it's not working. so it is not possible or i'm doing wrong..
Nemi Chand
  • 89
  • 1
  • 1
  • 5
3
votes
1 answer

'Web Audio API is not supported in this browser' error as a part of WebGL build

I'm trying to open a WebGL build with an integrated audio in it, basically a WebGL Unity build. I am using 9.5 alpha release as the latest stable version doesn't allow wasm anyhow but now even though the WebGL build triggers it throws this error…
whyeverwhy
  • 31
  • 2
3
votes
2 answers

Batch use curl/wget/aria2c with Tor and open a new Tor route for each download?

Can I use curl/wget/aria2c with Tor for batch downloads and appearing from a new exit node for each download? That is, I want to feed curl/wget/aria2c 1000 links to download over http(s) that each appear from a new, random, exit node (since it is…
d-b
  • 141
  • 4
3
votes
2 answers

Are there hosts for hidden services?

I am exploring putting up a simple page as a hidden service advertising business formation and nominee services. Does anyone offer hosted pages? I think I don't really need an entire site, just a way of communicating our services as a bridge between…
liaison
  • 31
  • 2
3
votes
1 answer

How a client maintains a list of guard nodes, from among hundreds of guard nodes, for creating a circuit?

It is said that a client maintains a list of guard nodes for certain time for making a circuit. I want to know how many number of guard nodes they make in a list? How often they change these guard nodes and how do they maintain a list from hundred…
saurav
  • 777
  • 5
  • 18
3
votes
2 answers

Confused with user running tor (Address already in use. Is Tor already running?)

after long consideration I just made the decision to run a tor relay. Thinking of the Internet of my childhood in the 1990s. Installed on a fresh armbian stretch, edited some settings in /etc/tor/torrc and rebooted. Tor seems to be running fine…
Beres
  • 35
  • 3
3
votes
2 answers

How to protect Tor proxy with a password?

I want to set up a personal Tor SOCKS5 proxy on my Linux VPS to use it on mobile devices and whatnot. Apparently, Tor can only protect its control port, SOCKS5 stays open. How do I set a lightweight, password-protected Tor SOCKS5 proxy? Seems like I…
Roffen
  • 56
  • 1
  • 5
3
votes
1 answer

How did the FBI find the IP address of the Freedom Hosting servers?

The FBI took over the Freedom Hosting servers, which were located in France, and arrested the guy (Eric Eoin Marques) running Freedom Hosting. They then proceed to serve malware to anyone who connected to a site hosted by Freedom Hosting. How did…
3
votes
1 answer

Tor Client limit bandwidth

Is there any way to limit the bandwidth used by Tor as a client? I use Tor as a client and I want to limit the bandwidth used by Tor without any additional application. Is that possible?
BlackMatrix
  • 143
  • 6
3
votes
1 answer

How is 'Exit Probability' calculated?

Tools like Atlas graphs an Exit Node's 'Exit Probability': https://atlas.torproject.org/#details/E93F05C9A7112544A2F132CBB7F6701877140F2A How is the Exit Probability calculated? (Bonus for a link to the code.) Do exit probabilities add up nicely to…
Tom Ritter
  • 691
  • 5
  • 15
3
votes
2 answers

Is logging into accounts on Tor secure (from a technical viewpoint)?

Reading about the Heartbleed Bug, and the NSA having readable access to the Tor network, I can't really answer this question myself. Is logging into any account on a website using https, in technical terms, as secure as just browsing the…
Stefan
  • 131
  • 4