Most Popular
1500 questions
2
votes
2 answers
How to upgrade to whonix 7 while preserving our sensitive files?
I read on the Whonix website that in order to update from Whonix 5.6 to Whonix 7, I had to download the image again. While I have no problem with that, how can I update my virtual machine while preserving the files I currently have? Is it as simple…
affla34
- 21
- 1
2
votes
2 answers
How to report a Tor Browser crash
Using the most recent Tor Browser Bundle (5.0a3) I experience crashes. I am running Linux, however since there is now a .desktop used it doesn't show me anything in the terminal. Even when I run the command without --detach I do not end up knowing…
meee
- 1,212
- 2
- 9
- 21
2
votes
1 answer
Does strict transport security survive across restarts?
The TorBrowser will honor HSTS settings during a session, meaning that if you visit an HTTPS site and the HSTS flag is set, the browser will not allow an HTTP downgrade. Does this survive across restarts?
Indolering
- 161
- 5
2
votes
1 answer
Does the TorBrowser support certificate pinning?
To what level does Tor support certificate pinning (aka HPKP, key pinning)?
It is my understanding that HPKP is implemented as a cookie can be used as a "super cookie" and thus it would be cleared across restarts. The documentation on this is less…
Indolering
- 161
- 5
2
votes
2 answers
How secure are hidden services port bindings?
On my system I have a secure service that is bound to localhost for commands. I do not want it accessible to Tor. It's bound to one port, lets say 876.
I am running a hidden service that binds to one port, lets call it 12345. So 127.0.0.1:12345 is…
Dan
- 263
- 1
- 4
2
votes
1 answer
Using entry nodes with specific ports
Is there any way to tell the Tor daemon on my computer to only pick entry nodes with specific TCP ports? It seems like our ISP has started blocking Tor communication on its usual ports (443, 9001, etc). Once it finds a node with POP3 port 110 open -…
user3116571
- 21
- 3
2
votes
0 answers
How do overlay network nodes communicate without IP addresses?
I've been reading about how Tor and I2P use cryptographic addresses to send messages to other nodes, but how does this work? I looked through the documentation for each and neither is very clear on this. For two machines to communicate, you…
Matt
2
votes
2 answers
Can I track other users on Tor?
I'm an admin on a Windows 8.1 computer and I want to know if I can see what another user is doing on Tor. Would I just use Microsoft Family Safety? I know that the government can spy on Tor, but can I see what other users are doing? I am either a…
Leo Wilson
- 123
- 4
2
votes
3 answers
Proxy setting not working in tor
My proxy setting does not work in Tor.
I have no idea why. The same settings work
in Firefox. (the proxy is working. I keep
checking and changing it):
What am I doing wrong?
user3521033
- 21
- 1
- 2
2
votes
1 answer
Do 'window.innerWidth' and 'window.innerHeight' in CSS pass back the values to the webserver?
I have JavaScript turned off, and so no leakage of screen resolution to Panopticlick.eff.org fingerprint testing tool.
However, JonDonym's one - ip-check.info - has an alarming-looking vector down the bottom called 'Browser window'. Even with JS…
Anonymous
- 21
- 1
2
votes
1 answer
Why exactly is it not recommended to exclude relays?
I'm doing some research on Tor for a paper and stumbled upon this section on the Tor FAQ page, where it says how to choose or exclude certain nodes from your circuit. Below it says that it is not recommended to do this, but not explicitly…
Curtis
- 23
- 2
2
votes
0 answers
How do I tunnel SSH though tor(windows)
I'm using Windows.
Whats the best way to securely tunnel and use SSH though Tor, could you guide me to a right direction? I cannot risk stuffing this up and I cannot leak my real IP address, I'm using a VPN just in case.
Dylan
- 21
- 3
2
votes
5 answers
How do I revoke a .onion address?
Can I revoke a .onion address, to "open it" back up for registration?
It is possible, in the world of certificate authorities, to maintain revocation lists for keys that have been compromised or are no longer in use.
One can revoke an SSL…
Nathan Basanese
- 135
- 7
2
votes
3 answers
Why my relay is so slow?
I have a connection of 100mb/s and its going too slow, just look here: https://globe.torproject.org/#/search/query=A11BAE8F2676FF78727EE74949836E495D801D90
The relay is located in a OVH VPS
How can I use the complete bandwidth?
Thanks
2
votes
2 answers
Tor + I2P on a system and Is I2P better than TOR?
Greeting's, given recent events of FBI taking down silk road 2.0 and 3.0. I have few questions, please keep in mind that i'm not technologically too sound.
Is I2P better than TOR?
Can i have a system which will use I2P + TOR? Something like whonix…
Parth Maniar
- 131
- 1
- 3