Most Popular
1500 questions
                
                    2
                    
            votes
                
                2 answers
            
        Running Tor in /opt
I'm looking at using the Tor browser bundle, and the instructions have one run the bundle as a normal user (in my case, on Debian Jessie).  This would seem to expose the Tor files to tampering in a way that is not the case with iceweasel.   
Q1: …
         
    
    
        Senrabdet
        
- 21
- 3
                    2
                    
            votes
                
                1 answer
            
        How to run multiple Tor browsers simultaneously on Windows?
I tried  this  I successfully made a  copy of  the tor  folder  working  with different IPs on both tors,  but  what do I do for  the  third copy of the  tor  folder?  What  control port and  stock port should  I put on the third browser?
I need …
         
    
    
        Maulik Lathiya
        
- 31
- 2
                    2
                    
            votes
                
                1 answer
            
        How can I enable Tor on Chrome
I am using Ubuntu. Downloaded the latest version of Tor from here. But when I execute ./start-tor-browser from terminal it starts in firefox. How can I enable it in Chrome?
Also how can I launch Tor without using terminal? 
        user9895
                    2
                    
            votes
                
                2 answers
            
        torrc on a Mac?
It isn't completely obvious where the torrc file needs to reside on a Mac (say, 10.6). In Settings->Advanced, it appears to be in Applications/TorBrowser_en-US/Library/Vidalia/torrc. But there is also a USER/.tor directory.
Also, FWIW, whenever I…
         
    
    
        user637
        
- 21
- 1
- 1
- 2
                    2
                    
            votes
                
                1 answer
            
        Allowing socks request for anonymous connections to a private address?
I want to ask you how I can allow socks request for anonymous connections. I'm using it with metasploit and socat but its always reject connection. So every time I want to exploit an OS with metasploit and socat, it doesnt work. 
You can see it in…
         
    
    
        john
        
- 21
- 2
                    2
                    
            votes
                
                2 answers
            
        Would ssh hidden service be very slow?
Over at one of the guides on setting up hidden ssh service via tor, http://mancoosi.org/~abate/hidden-ssh-service-tor, it's claimed that due to all the layers of indirection it'll be really slow.
and then ssh-way youronionhost.onion server . The…
         
    
    
        cnst
        
- 121
- 6
                    2
                    
            votes
                
                2 answers
            
        Which would be more secure a VPN or Tor?
Theoretically, which would be capable of providing the highest level of anonymity, Tor or a VPN?
         
    
    
        Jon
        
- 67
- 8
                    2
                    
            votes
                
                2 answers
            
        How can I check for a website's behavior towards Tor, compared to its normal behavior?
Some websites completely block Tor (for example, Yelp gives a 503), while some allow me to browse, but not use more advanced functionality (Wikipedia allows me to read content but not edit it, for obvious reasons).
I'd like to obtain a list of…
         
    
    
        Tarun Verma
        
- 21
- 2
                    2
                    
            votes
                
                1 answer
            
        Anonymous VPS Permitting Exit Nodes?
I want to run some exit nodes to give back to the community. Are there any lists of VPS providers in U.S. or Europe who allow anonymous VPS purchase, preferably through cryptocurrency, who also allow exit nodes?
Since exit nodes seem to be the…
         
    
    
        Nikki Akasha
        
- 21
- 4
                    2
                    
            votes
                
                2 answers
            
        ISP, WiFi, Tracking
I run Tor on my laptop and my phone. I have Verizon Wireless for a service provider. My laptop Internet connection is tethered through my cell phone. So I just run Tor on my laptop. Can Verizon or any other ISP track browsing history or searches?…
         
    
    
        hvacguy1962
        
- 21
- 1
                    2
                    
            votes
                
                1 answer
            
        Tor can not connect when trying to use ExitNodes from Iran
I'm visiting a website that only is available from Iran, and I want to use Tor and I want Tor to use an exit node from Iran, So, I put this on the torrc file:
ExitNodes {ir}
StrictNodes 1
But, I get this error and Tor can't connect. Here is the Tor…
         
    
    
        Alireza Fallah
        
- 123
- 4
                    2
                    
            votes
                
                0 answers
            
        Website seems to know location / Orbot & Orfox
I have been using orbot/orfox on an android/cyanogen tablet. However, a website seems to still know my location. I would like to prevent this, but I'm not sure what I'm doing wrong.
I am not torifying apps, only using orfox. I will start a new orbot…
         
    
    
        user9734
        
- 21
- 2
                    2
                    
            votes
                
                1 answer
            
        Problems running proxychains on Tails 1.6 does not find firefox
I boot Tails 1.6 with persistence and with admin password in order to install proxychains then I install via apt-get an edit the /etc/proxychains.conf to add socks5 after Tor, I save the changes and proceed to run  proxychains firefox from the…
         
    
    
        frankless
        
- 21
- 1
- 3
                    2
                    
            votes
                
                1 answer
            
        Error when executing "Tor Browser"
First:  I've never used Tor Browser or similar applications, so please forgive my noobness.  
I'm pretty sure I've done everything correctly, but I still can't seem to connect.  I've downloaded the newest version of Tor.
I've disabled firewall and…
         
    
    
        adcindy
        
- 21
- 1
- 2
                    2
                    
            votes
                
                1 answer
            
        Usage and purpose of variable-length cells?
The Tor protocol version 1 uses 512-byte cells to obfuscate traffic patterns:
Traffic flowing down the circuit is sent in fixed-size ``cells'',
  which are unwrapped by a symmetric key at each node (like the layers
  of an onion) and relayed…
         
    
    
        serv-inc
        
- 387
- 1
- 18