Most Popular

1500 questions
2
votes
2 answers

How to upgrade to whonix 7 while preserving our sensitive files?

I read on the Whonix website that in order to update from Whonix 5.6 to Whonix 7, I had to download the image again. While I have no problem with that, how can I update my virtual machine while preserving the files I currently have? Is it as simple…
affla34
  • 21
  • 1
2
votes
2 answers

How to report a Tor Browser crash

Using the most recent Tor Browser Bundle (5.0a3) I experience crashes. I am running Linux, however since there is now a .desktop used it doesn't show me anything in the terminal. Even when I run the command without --detach I do not end up knowing…
meee
  • 1,212
  • 2
  • 9
  • 21
2
votes
1 answer

Does strict transport security survive across restarts?

The TorBrowser will honor HSTS settings during a session, meaning that if you visit an HTTPS site and the HSTS flag is set, the browser will not allow an HTTP downgrade. Does this survive across restarts?
Indolering
  • 161
  • 5
2
votes
1 answer

Does the TorBrowser support certificate pinning?

To what level does Tor support certificate pinning (aka HPKP, key pinning)? It is my understanding that HPKP is implemented as a cookie can be used as a "super cookie" and thus it would be cleared across restarts. The documentation on this is less…
Indolering
  • 161
  • 5
2
votes
2 answers

How secure are hidden services port bindings?

On my system I have a secure service that is bound to localhost for commands. I do not want it accessible to Tor. It's bound to one port, lets say 876. I am running a hidden service that binds to one port, lets call it 12345. So 127.0.0.1:12345 is…
Dan
  • 263
  • 1
  • 4
2
votes
1 answer

Using entry nodes with specific ports

Is there any way to tell the Tor daemon on my computer to only pick entry nodes with specific TCP ports? It seems like our ISP has started blocking Tor communication on its usual ports (443, 9001, etc). Once it finds a node with POP3 port 110 open -…
2
votes
0 answers

How do overlay network nodes communicate without IP addresses?

I've been reading about how Tor and I2P use cryptographic addresses to send messages to other nodes, but how does this work? I looked through the documentation for each and neither is very clear on this. For two machines to communicate, you…
Matt
2
votes
2 answers

Can I track other users on Tor?

I'm an admin on a Windows 8.1 computer and I want to know if I can see what another user is doing on Tor. Would I just use Microsoft Family Safety? I know that the government can spy on Tor, but can I see what other users are doing? I am either a…
Leo Wilson
  • 123
  • 4
2
votes
3 answers

Proxy setting not working in tor

My proxy setting does not work in Tor. I have no idea why. The same settings work in Firefox. (the proxy is working. I keep checking and changing it): What am I doing wrong?
user3521033
  • 21
  • 1
  • 2
2
votes
1 answer

Do 'window.innerWidth' and 'window.innerHeight' in CSS pass back the values to the webserver?

I have JavaScript turned off, and so no leakage of screen resolution to Panopticlick.eff.org fingerprint testing tool. However, JonDonym's one - ip-check.info - has an alarming-looking vector down the bottom called 'Browser window'. Even with JS…
2
votes
1 answer

Why exactly is it not recommended to exclude relays?

I'm doing some research on Tor for a paper and stumbled upon this section on the Tor FAQ page, where it says how to choose or exclude certain nodes from your circuit. Below it says that it is not recommended to do this, but not explicitly…
Curtis
  • 23
  • 2
2
votes
0 answers

How do I tunnel SSH though tor(windows)

I'm using Windows. Whats the best way to securely tunnel and use SSH though Tor, could you guide me to a right direction? I cannot risk stuffing this up and I cannot leak my real IP address, I'm using a VPN just in case.
Dylan
  • 21
  • 3
2
votes
5 answers

How do I revoke a .onion address?

Can I revoke a .onion address, to "open it" back up for registration? It is possible, in the world of certificate authorities, to maintain revocation lists for keys that have been compromised or are no longer in use. One can revoke an SSL…
2
votes
3 answers

Why my relay is so slow?

I have a connection of 100mb/s and its going too slow, just look here: https://globe.torproject.org/#/search/query=A11BAE8F2676FF78727EE74949836E495D801D90 The relay is located in a OVH VPS How can I use the complete bandwidth? Thanks
2
votes
2 answers

Tor + I2P on a system and Is I2P better than TOR?

Greeting's, given recent events of FBI taking down silk road 2.0 and 3.0. I have few questions, please keep in mind that i'm not technologically too sound. Is I2P better than TOR? Can i have a system which will use I2P + TOR? Something like whonix…
Parth Maniar
  • 131
  • 1
  • 3