Registered | last year |
Last Visited | 2 months ago |
Total Posts | 136 |
by ertom in General Questions
...
![]() | TOR Hacker 2 months ago |
torify doesn't need root.
ssh encryption will be from tails, through tor nodes, to ssh server. And since each node in circuit adds one level of encryption, your already encrypted ssh traffic will be encrypted 3 more times by Tor.
by 32416183907 in Security Questions
...
![]() | TOR Hacker 3 months ago |
Matter for what? You can make screen any size, this has nothing to do with Tor security.
by lonny in Running a Server
...
![]() | TOR Hacker 3 months ago |
Add these lines to your torrc file:
HiddenServiceDir /home/myself/tor/onion80
HiddenServicePort 80 127.0.0.1:80
HiddenServiceDir /home/myself/tor/onion22
HiddenServicePort 22 127.0.0.1:22
Then restart Tor. It will create folders tor/onion22, tor/onion80 and so on, and insid
by lonny in Running a Server
...
![]() | TOR Hacker 3 months ago |
Yes, this can be done via Tor, but, like I said before, one .onion address corresponds to pair IP:Port, not just IP. So, to "hide" all 65535 ports of 2nd server you need to create 65535 .onion addresses, which is crazy. Leave only several ports that you really want to use, and create .onion serv
by lonny in Running a Server
...
![]() | TOR Hacker 3 months ago |
I am not sure if I understood you right, but I assume your "2nd server" is usual .onion service. That means it has one tcp-port (probably http/s) exposed through Tor network. Only ONE port. If you try to expose another port, you will end up with another .onion address. And so and so on. Even if
by lewren in Running a Server
...
![]() | TOR Hacker 4 months ago |
So, you added
server {
listen 127.0.0.1:8080 default_server;
server_name localhost;
...
to your nginx config, made #service nginx reload, and then tried to open localhost:8080 or 127.0.0.1:8080 and nginx didn't respond?
Even before starting Tor?
by Texty7 in General Questions
...
![]() | TOR Hacker 4 months ago |
You should provide target website with your keys, to let it successfully decrypt your request and answer properly.
You should also tell your website, which algorythm/protocol to use. Your website should support this algorythm. The only encryption protocol that is widely supported by websites i
by Nobody in Userspace Software
...
![]() | TOR Hacker 4 months ago |
Tails is really more secure.
Firefox can receive dangerous javascript, run it, and disclose your IP, cookies or even random files from your hard disk. That was actually done by FBI two years ago.
So, to avoid such things it is always better to run Firefox in a totally separate environment,
by rolanddd in Userspace Software
...
![]() | TOR Hacker 4 months ago |
Can you open Tor logs and read there what exactly "went wrong"?
by archway in Running a Server
...
![]() | TOR Hacker 4 months ago |
Short answer: use HTTPS.
If your site doesn't support HTTPS, use "ssh -D" over Tor or VPN over Tor to make encrypted ssh tunnel.
This is a bit more difficult since you will need an anonymous SSH server (which you will never connect directly, and which you buy for bitcoins or cash or some
by archway in Security Questions
...
![]() | TOR Hacker 4 months ago |
Tor uses 3 hops, but each of these hops is used by multiple users AT THE SAME TIME. This is very important. Each node has SEVERAL incoming and several outgoing connections. Every f*cking minute.
So if you trace somebody's way IN to the node, you should then check EVERY TRACE OUT, means EVER
by emil701 in General Questions
...
![]() | TOR Hacker 5 months ago |
viewtopic.php?f=2&t=18315
by illumi in Userspace Software
...
![]() | TOR Hacker 5 months ago |
You can buy Amazon AWS, or any VPS, or web-hosting with SSH access, and use it's IP to browse internet (and for Tor outgoing connections). If you'll have SSH access to any computer outside your campus network, the rest is given by SSH Tunneling (ssh -D) technique. Google Tor over SSH Tunnel, - tha
by Louie in Userspace Software
...
![]() | TOR Hacker 5 months ago |
All Tor Exit nodes are usually banned. But you can try, anyway.
If your game client supports proxy, find in settings something like Connectivity, Connection, PROXY, Data roaming, ...etc. Then open Tor Browser Network connection settings, and copy SOCKS Host and Port from there.
Usually, H
by dimas in Userspace Software
...
![]() | TOR Hacker 5 months ago |
1) Unpack your Tor versions to different folders, let's say ./Tor1/ and ./Tor2/
2) Run one of them, any one. Let's say,
.\Tor1\Tor Browser\Start Tor Browser.exe
3) Now open another Tor folder, Tor2. You'll see something like
App
Data
Docs
FirefoxPortable
Start
by NewUser1 in Running a Server
...
![]() | TOR Hacker 8 months ago |
if ($_SERVER["HTTP_REFERER"] == "http://another.site/") {
// everything OK, show content
} else {
header("404 Not Found");
exit();
}
by ufheg2 in Security Questions
...
![]() | TOR Hacker 8 months ago |
Yes, this is risky.
Javascript itself cannot reveal your IP, but there were several successful attacks on Tor users via abnormal browser behavior, and your browser can also be vulnerable. The most dangerous are Remote Code Execution exploits, so if someone intrudes into your local computer via
by wy8earp in General Questions
...
![]() | TOR Hacker 8 months ago |
No. Tor is a proxy-service, meant to hide your real IP from websites you visit.
by justaguy in Security Questions
...
![]() | TOR Hacker 8 months ago |
Just don't bother. You are normal man, you have Facebook and Gmail Account, you have some everyday Internet activities, favourite sites, browsing habbits... This is normal. Everybody does.
More of that: you have your smartphone connected to your personal accounts, or you used it at leas