/r/TOR
News and discussion about the Tor anonymity software. New to Tor? Please read the Tor FAQ!
Protect your privacy. Defend yourself against network surveillance and traffic analysis. Get Tor.
This subreddit is for news, questions, opinions and tips about Tor.
Please read our Frequently Asked Questions before posting.
Community guidelines:
This is a very frequently asked question we see in this subreddit. You generally do not need to use a VPN in conjunction with Tor, and you may even hurt your anonymity by doing so. However, a VPN may help if Tor is censored by your network. Please see the Tor Wiki for more details.
The Tor Project recommends Onion Browser. See onionbrowser.com.
If you can't access Tor Project's website: Send an email to gettor@torproject.org In the body of the mail, write the name of your operating system (such as Windows, macOS, or Linux). You will receive a reply with instructions.
The proper capitalization is "Tor". The subreddit's name is incorrectly capitalized as "TOR" and cannot be changed due to Reddit's technical limitations. Please read the Tor Project FAQ for more information.
/r/tor is not managed or endorsed by The Tor Project.
/r/TOR
For using Tor on Linux Chromebooks:
vpd-s clears serial numbers of chromebooks
Can this be used to protect tor users?
I've been using TOR for years now, and I've never ran a priv net with it. But I was wondering::
I thought about running TOR on a VM, finally, but then thought about the possible effects of a priv net. Would it running outside the VM OR inside the VM make any difference? Would it increase or decrease my privacy? Or would it do nothing per usual?
I'm doing some research and some experiments, from what I discovered Tor works differently from the past and differently if you are visiting clearnet sites or hidden services. I found different sites or video that explain the tor path in a different way and I want to know what is correct and what is wrong.
Someone say that the tor path is:
client --> entry node --> middle node --> exit node --> site (that could be clearnet site or HS)
Someone say that the tor path is:
client --> entry node --> middle node --> exit node --> exit node --> middle node --> entry node --> HS
Someone say that the tor path is:
Client → Entry node → Middle Node → Rendezvous Point → Introduction Point → Hidden Service
So basically my question is:
When I visit an HS do I have a exit node or not? Do I have 3 hops and the last one is more or less an exit node but by the fact that it is not properly exit from the tor network it is not called exit node?
From what I discover since 2019 Tor introduces the Vanguard security measure that consists in nodes (maybe host by tor, I don't know) that are considered safe and tor change this node with a particular rotation in terms of time. If you are an HS that needs to be online for a long time you need to use the full vanguard and if you are an HS that needs to be online for a short period of time you can use Vanguard-Lite (that implement only 1 vanguard node instead of two), and with this update the new tor path is:
Client → Entry Guard → Vanguard → Middle Node → Rendezvous Point → Introduction Point → Hidden Service
Client → Entry Guard → Vanguard 1 → Vanguard 2 → Middle Node → Rendezvous Point → Introduction Point → Hidden Service
Is that correct? Is vanguard used only for HS or with clearnet sites too?
I tried to search informations on https://spec.torproject.org, but I really don't understand anything.
Can anyone point me in the direction of how to navigate getting TOR onto my MacBook as someone who is obviously not very tech savvy.
Can you host your own web site/server and still have the privacy benefits? Like complete anonymity?
I understand hosting a tor site is almost the same as hosting a normal web server, just slightly different configurations. I just want to host a simple single page site, almost like a document (Google docs) but with strong privacy features.
Quite a while ago I had installed tor from the website. I can't remember which search engine I was using but may have been duck duck go or Yandex but pretty sure was not Google. Not like that really matter since practically all search engines use Googles websites index library to produce the links of stuff that are relevant for the words you used in the search bar(or however you say that) the only one I've found that doesn't so far is ya.( which is great because I don't agree with there bias agenda that they push.) But I've figured out that ya is just as bad as Google when it comes to tracking, etc, and is alot easier for your system to become compromised. Anyways sorry got off topic but I downloaded tor from the tor website and have not been able to uninstall it since. Inrun win10 and It's in my start menu. When I right click it and click uninstall it brings me to the page where it's the list of stuff like Microsoft files are. Anyways I can't find it there or anywhere else I search to be able to uninstall it and it won't go away. Can anyone help me?
my internet stopped working unless on tor out of nowhere and i deleted proton because i thought that was what was causing it but still no change
Hello all !
My ISP has dirservers banned but obfs4 bridges do work.
I'm planning to use command-line tor on Linux in unattended daemon mode, just throw a few bridges into torrc. Unfortunately, they come and go.
Is there an option to bootstrap via a bridge, and once everything has cached, make new connections and directory updates through usual/public entry nodes ? Even if all my torrc bridges went offline, the client should remain reachable.
Does that make sense?
Thanks alot!
Heyya guys, I recently learned about Tor from a friend, and I've chosen to experiment with it for enhanced tracker protection. I've completed the setup of a private Tor bridge. However, my friend didn't inform me about the process of altering exit nodes. It appears that I can't locate any YouTube videos on this topic. Do you guys mind teaching me how to change nodes?
I can't get Tor Browser to work/install properly on the latest version of Ubuntu. Is there a general issue with this? - Does there need to be some update to get it to work?
It worked ok with the older version of Ubuntu. If there's no issue, can someone post me a link to a webpage with working terminal code to install the Tor Browser - as it may be due to me using an older method that's not suited to the new Ubuntu OS.
I’ve been searching up and down for a tor app or something that seems legit but I’m struggling so i need your help guys, yes i’m a newbie lol.
Hi. I can't keep a .onion site 24/7, money... I'm in Russia. In short, I need a free hosting, at least shared hosting, at least VPS, the main thing is to support DB and PHP less than 7 (for TorrentPier).
Thank you.
Thank you very much
Hi,
The Snowflake Proxy Docker container has not been running on a Raspberry Pi for a few days now
Docker Compose
services:
snowflake-proxy:
network_mode: host
image: thetorproject/snowflake-proxy:latest
container_name: snowflake-proxy
restart: unless-stopped
Error :
2024-12-01T09:46:26.346562739Z exec /bin/proxy: exec format error
My cousins are in a state where they have blocked reddit, telegram, discord, twitter and other messaging apps. Certain vpns with servers in the country are ok to use but if say mullvad is used which doesnt have servers in the country, then it might become an issue, it might not but why risk it. Some of these platforms are either mobile only or they don't work if used through the tor network like reddit and twitter. All these websites work well with orbot which uses tor network but orbot doesn't work in ios and drains too much battery in android and keeps on auto closing even if it has unrestricted access to battery.
If tor proxies are installed in debian and then an android emulator is used like waydroid is used to access these blocked platforms then will waydroid have all the information about the pc in which debian is used?
Will tor proxies make sure that all data from this setup, including emulator data goes through the tor network?
Is it possible to select obsf4 while using proxies?
Apart from proxies what other thing will be beneficial for user privacy?
Suppose telegram or other apps are used in this emulator then will they know that they are being used in an emulator in debian which has this processor and ram or anything which is bad for the user?
Since I don't want Virustotal to have my real IP address, is it a good idea to use Tor to access the site and upload files for virus testing?
Thanks.
Hi everyone, I am looking for some advice regarding internet privacy, etc and I have a few questions. I am not a tech expert, but you also don't need to explain like I am five.
I do OSINT Counterterrorism work and many tools (on GitHub for example) need to be downloaded, but I don't want to somehow install malware on my computer. Instead of looking up “is __ software safe” every time, I decided to buy a new (cheaper) laptop strictly for OSINT investigations and never connect any of my personal accounts to it. I am relatively inexperienced with TOR (and really any deep/dark web browsing), but plan to utilize it once I have a better understanding and I want to ensure I am using best practices. I currently use NordVPN and am looking into using Tails with the new laptop, but is Tails even necessary in my case?
Question 1: If I am signed into Google, Reddit, YouTube, etc. does it not really matter that I am connected to a VPN? My data and identity could still be exploited because I am signed into accounts? If I understand correctly, the only thing that would be “hidden” is my IP address from my ISP and the sites I access.
Question 2: What is the safest way to proceed with my new laptop? I plan to only create accounts using a burner Gmail (or another provider if there are more secure options for this type of thing), which I would not connect any of my information to for recovery purposes, etc).
Question 2.5: On the same thought, should I not use my personal NordVPN account on my new laptop, as that could be a way to identify me?
Question 3: My home Wi-Fi—how does this work with internet privacy? Will this impact anonymity despite using a VPN or Tails? I envision doing all this to maximize my privacy, and one aspect of something like Wi-Fi or signing into something ruins it all, and I just wasted all this time trying to be secure.
I am not doing anything crazy and looking to infiltrate terrorist networks and I am not concerned with hiding my identity from law enforcement or something like that. I just want to explore more tools and software and do it as safely as possible.
Any suggestions or greatly appreciated! I know I am likely overthinking, especially with the scope of what I am looking to do. I love to learn and this has sparked a lot of curiosity.
I have a problem, I need to download large files from Tor, the problem is that at the download speed it tells me that it will take 30-60 days, and if there is a microdisconnection it starts again. Is there any way to download faster or any solution?
example: I create an account on a site using tor and i close the site. when i return to the site i am still logged in and it remembers my saved options
how can that be possible with tor if the exit nodes constantly change? how does the site remember you if tor makes you anonymous in the eyes of the website?
thanks in advance
Where can I find the source code for tor on GitHub?
Hi Redditors,
I have a spare VPS which I bought for running a Tor relay. As there is a requirement of 200 WebTunnel bridges, I thought to contribute by setting up WebTunnel bridges on it. My question is, is it possible to run several WebTunnel bridges on one server?
Thanks!
The thing is that the relay isn't getting set up all the time . sometimes it works sometimes it doesn't . also as it is a system wide execution i meddled with the IPTABLES to route the traffic to the tor relay but somehow . i don't know how it is not forwarding the traffic to the tor relay . Is there anyone who can give me some hints to troubleshoot it , i tried for a whole week but no luck.
Hello, I know this may sound a bit stupid but i had saw how Tor is needing more contributors to run WebTunnel Bridges. I currently operate an exit node, Is it possible for me to setup a WebTunnel bridge on the same server as my exit node? I am wanting to contribute but would be more convenient to be able to use the same server. It has more than enough power to handle both.
I just used Tor to browse a few social media websites on the clearnet, since our school has a VPN that blocks them.
Then I opened Ahmia and searched for drug markets, just out of curiosity, and browsed some onion websites.
I don't really care about my anonymity towards my ISP, I live in a country that couldn't care less about what people do on the internet, but I worry that just by browsing those websites I might've caught a virus, because people talk about it here as something super dangerous while I don't see how I could be in danger here.