Most Popular

1500 questions
2
votes
3 answers

I only wish to hide my IP from services like Spotify? Is Tor good for that?

If I'm in certain countries I can no longer access services like Netflix and spotify etc. Tor seems to hide IP addresses completely and I'm wondering if these services I want to access will even work if no IP address is detected. If Tor is…
Peter
  • 21
  • 2
2
votes
2 answers

Why Tor node maintains TLS keys with every other Tor node?

I read that Tor proxy maintains key with each Tor node for encryption. Then, why does a Tor node maintains TLS keys with other Tor nodes?
user3857907
  • 61
  • 1
  • 4
2
votes
1 answer

What does tor proxy and tor directory stores?

Does tor proxy includes keys that it shares with all tor nodes for encryption?who stores information about all tor nodes in the route?
2
votes
2 answers

How is data encrypted and decrypted in onion routing?

I read that onion proxy adds a layer of abstraction for each onion router in a route,and each onion router just removes a layer of encryption then does onion proxy knows about all onion routers in the route? and does onion routers just decrypts the…
2
votes
1 answer

Bridges *within* repressive countries? Good or bad?

Is it a good idea to establish bridges within repressive countries (China, Iran, etc.), or a bad idea? On one hand, having the bridge within the country removes the "foreign" stigma from that IP address for purposes of filtering/censorship. On the…
2
votes
1 answer

Can I install Tor on debian vps and then use the vps IP address: 9150 to connect my cellphone or another computer to Tor network?

I successfully installed Tor on my debian vps. Is there a way to connect my cell phone or another computer to Tor network using my vps? If there is a way, how should I set it up to work?
szkin
  • 21
  • 1
2
votes
1 answer

Does the onion routers know their position in the circuit?

I am making a java implementation of onion routing. The routers in the path on decrypting the received data , are able to device their position in the circuit by knowing the length of the received data. Is it acceptable that routers know their…
2
votes
1 answer

If I run a relay on my home network should I use it as my guard node?

Started running a relay from my home network. Getting a bit of traffic now. Wondering if it would be beneficial to run my Tor connections through it. It seems to be able to mask my use of Tor. If I understand correctly, I can use Entry Nodes in the…
fakeoaks1
  • 21
  • 1
2
votes
0 answers

Setting up a Tor bridge?

I have a Windows server I hardly use, and I decided that I wanted to use it to run a Tor bridge. I've been trying all morning to figure out how to set it up to no avail. Most of the tutorials I've found online want me to install the Tor Vidalia…
2
votes
0 answers

How to use Tor via VPN and with help of bridges?

When I tried to use Tor with VPN it worked at my home network but when I tried at my university it can't open as they have blocked Tor so I have to use VPN which I'm sure they haven't blocked, but when I Try to execute Tor didn't start.
heeyy
  • 21
  • 1
2
votes
0 answers

Can clear activity be linked to hidden activity?

I'm using whonix for a good deal of activity but I'm very new to it and Linux. will using my computer for personal information while not running whonix or tor compromise my anonymity? What about at the same time? Is it possible if I use my computer…
Drrift
  • 21
  • 2
2
votes
2 answers

Equation: The Death Star of Malware Galaxy, How much does it compromise Tails?

Equation: The Death Star of Malware Galaxy https://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/ reported to compromise the firmware of hard drive and reprogram the hard drive's firmware according to Malware…
Roya
  • 3,240
  • 3
  • 19
  • 40
2
votes
2 answers

Uniqueness of your PC comparing Tor vs JonDo

When checking my PC on Panopticlick, I could see that even using Tor does not make my PC more anonymous... ...using JonDo, however, and visiting Panopticlick, my PC was less identifiably unique than when using Tor. JonDo mentions things like using…
Anomalous
  • 21
  • 2
2
votes
1 answer

How do I know Tor does not publish my identifiable information in to the public?

Can anyone tell me how and where can I check to make sure Tor is secured, without leak? And Tor does not publish my identifiable login information in to the public.
pitoukhmer
  • 21
  • 2
2
votes
1 answer

Tor not starting

Tor had been working fine for a while, but I modified the torrc file and tried to restart and now it will not start again. I removed the edit but now it still will not start. Terminal Output: [root@EU1 ~]# /etc/init.d/tor status tor is not…
CarlosAllende
  • 131
  • 1
  • 1
  • 4