Most Popular

1500 questions
2
votes
2 answers

Running Tor in /opt

I'm looking at using the Tor browser bundle, and the instructions have one run the bundle as a normal user (in my case, on Debian Jessie). This would seem to expose the Tor files to tampering in a way that is not the case with iceweasel. Q1: …
Senrabdet
  • 21
  • 3
2
votes
1 answer

How to run multiple Tor browsers simultaneously on Windows?

I tried this I successfully made a copy of the tor folder working with different IPs on both tors, but what do I do for the third copy of the tor folder? What control port and stock port should I put on the third browser? I need …
2
votes
1 answer

How can I enable Tor on Chrome

I am using Ubuntu. Downloaded the latest version of Tor from here. But when I execute ./start-tor-browser from terminal it starts in firefox. How can I enable it in Chrome? Also how can I launch Tor without using terminal?
user9895
2
votes
2 answers

torrc on a Mac?

It isn't completely obvious where the torrc file needs to reside on a Mac (say, 10.6). In Settings->Advanced, it appears to be in Applications/TorBrowser_en-US/Library/Vidalia/torrc. But there is also a USER/.tor directory. Also, FWIW, whenever I…
user637
  • 21
  • 1
  • 1
  • 2
2
votes
1 answer

Allowing socks request for anonymous connections to a private address?

I want to ask you how I can allow socks request for anonymous connections. I'm using it with metasploit and socat but its always reject connection. So every time I want to exploit an OS with metasploit and socat, it doesnt work. You can see it in…
john
  • 21
  • 2
2
votes
2 answers

Would ssh hidden service be very slow?

Over at one of the guides on setting up hidden ssh service via tor, http://mancoosi.org/~abate/hidden-ssh-service-tor, it's claimed that due to all the layers of indirection it'll be really slow. and then ssh-way youronionhost.onion server . The…
cnst
  • 121
  • 6
2
votes
2 answers

Which would be more secure a VPN or Tor?

Theoretically, which would be capable of providing the highest level of anonymity, Tor or a VPN?
Jon
  • 67
  • 8
2
votes
2 answers

How can I check for a website's behavior towards Tor, compared to its normal behavior?

Some websites completely block Tor (for example, Yelp gives a 503), while some allow me to browse, but not use more advanced functionality (Wikipedia allows me to read content but not edit it, for obvious reasons). I'd like to obtain a list of…
2
votes
1 answer

Anonymous VPS Permitting Exit Nodes?

I want to run some exit nodes to give back to the community. Are there any lists of VPS providers in U.S. or Europe who allow anonymous VPS purchase, preferably through cryptocurrency, who also allow exit nodes? Since exit nodes seem to be the…
2
votes
2 answers

ISP, WiFi, Tracking

I run Tor on my laptop and my phone. I have Verizon Wireless for a service provider. My laptop Internet connection is tethered through my cell phone. So I just run Tor on my laptop. Can Verizon or any other ISP track browsing history or searches?…
2
votes
1 answer

Tor can not connect when trying to use ExitNodes from Iran

I'm visiting a website that only is available from Iran, and I want to use Tor and I want Tor to use an exit node from Iran, So, I put this on the torrc file: ExitNodes {ir} StrictNodes 1 But, I get this error and Tor can't connect. Here is the Tor…
2
votes
0 answers

Website seems to know location / Orbot & Orfox

I have been using orbot/orfox on an android/cyanogen tablet. However, a website seems to still know my location. I would like to prevent this, but I'm not sure what I'm doing wrong. I am not torifying apps, only using orfox. I will start a new orbot…
user9734
  • 21
  • 2
2
votes
1 answer

Problems running proxychains on Tails 1.6 does not find firefox

I boot Tails 1.6 with persistence and with admin password in order to install proxychains then I install via apt-get an edit the /etc/proxychains.conf to add socks5 after Tor, I save the changes and proceed to run proxychains firefox from the…
frankless
  • 21
  • 1
  • 3
2
votes
1 answer

Error when executing "Tor Browser"

First: I've never used Tor Browser or similar applications, so please forgive my noobness. I'm pretty sure I've done everything correctly, but I still can't seem to connect. I've downloaded the newest version of Tor. I've disabled firewall and…
adcindy
  • 21
  • 1
  • 2
2
votes
1 answer

Usage and purpose of variable-length cells?

The Tor protocol version 1 uses 512-byte cells to obfuscate traffic patterns: Traffic flowing down the circuit is sent in fixed-size ``cells'', which are unwrapped by a symmetric key at each node (like the layers of an onion) and relayed…
serv-inc
  • 387
  • 1
  • 18