TOR Hacker

Registered 5 years ago
Last Visited last year
Total Posts 136


Posts by TOR Hacker


Tails and ssh/vpn

by ertom in General Questions

...
  TOR Hacker   last year

torify doesn't need root.
ssh encryption will be from tails, through tor nodes, to ssh server. And since each node in circuit adds one level of encryption, your already encrypted ssh traffic will be encrypted 3 more times by Tor.

View Topic (6 replies)



Window size with js disabled

by 32416183907 in Security Questions

...
  TOR Hacker   last year

Matter for what? You can make screen any size, this has nothing to do with Tor security.

View Topic (1 replies)



Internet2Tor Proxy

by lonny in Running a Server

...
  TOR Hacker   last year

Add these lines to your torrc file:
HiddenServiceDir /home/myself/tor/onion80 HiddenServicePort 80 127.0.0.1:80 HiddenServiceDir /home/myself/tor/onion22 HiddenServicePort 22 127.0.0.1:22
Then restart Tor. It will create folders tor/onion22, tor/onion80 and so on, and insid ...

View Topic (14 replies)



Internet2Tor Proxy

by lonny in Running a Server

...
  TOR Hacker   last year

Yes, this can be done via Tor, but, like I said before, one .onion address corresponds to pair IP:Port, not just IP. So, to "hide" all 65535 ports of 2nd server you need to create 65535 .onion addresses, which is crazy. Leave only several ports that you really want to use, and create .onion serv ...

View Topic (14 replies)



Internet2Tor Proxy

by lonny in Running a Server

...
  TOR Hacker   last year

I am not sure if I understood you right, but I assume your "2nd server" is usual .onion service. That means it has one tcp-port (probably http/s) exposed through Tor network. Only ONE port. If you try to expose another port, you will end up with another .onion address. And so and so on. Even if ...

View Topic (14 replies)



Problem isolating webserver to Tor

by lewren in Running a Server

...
  TOR Hacker   4 years ago

So, you added
server {
listen 127.0.0.1:8080 default_server;
server_name localhost;
...
to your nginx config, made #service nginx reload, and then tried to open localhost:8080 or 127.0.0.1:8080 and nginx didn't respond?
Even before starting Tor?

View Topic (1 replies)



Encrypting exit nodes, Would this work?

by Texty7 in General Questions

...
  TOR Hacker   last year

You should provide target website with your keys, to let it successfully decrypt your request and answer properly.
You should also tell your website, which algorythm/protocol to use. Your website should support this algorythm. The only encryption protocol that is widely supported by websites i ...

View Topic (1 replies)



Tor Browser Bundle or TAILS ?

by Nobody in Userspace Software

...
  TOR Hacker   last year

Tails is really more secure.
Firefox can receive dangerous javascript, run it, and disclose your IP, cookies or even random files from your hard disk. That was actually done by FBI two years ago.
So, to avoid such things it is always better to run Firefox in a totally separate environment, ...

View Topic (2 replies)



"something went wrong" screen

by rolanddd in Userspace Software

...
  TOR Hacker   last year

Can you open Tor logs and read there what exactly "went wrong"?

View Topic (2 replies)



How about TOR encryption on the server side?

by archway in Running a Server

...
  TOR Hacker   last year

Short answer: use HTTPS.
If your site doesn't support HTTPS, use "ssh -D" over Tor or VPN over Tor to make encrypted ssh tunnel.
This is a bit more difficult since you will need an anonymous SSH server (which you will never connect directly, and which you buy for bitcoins or cash or some ...

View Topic (1 replies)



TOR is NOT secure enough for illegal activity - Don't do it.

by archway in Security Questions

...
  TOR Hacker   last year

Tor uses 3 hops, but each of these hops is used by multiple users AT THE SAME TIME. This is very important. Each node has SEVERAL incoming and several outgoing connections. Every f*cking minute.
So if you trace somebody's way IN to the node, you should then check EVERY TRACE OUT, means EVER ...

View Topic (3 replies)



SSH tunneling over Tor?

by emil701 in General Questions

...
  TOR Hacker   last year

viewtopic.php?f=2&t=18315

View Topic (1 replies)



need some help

by illumi in Userspace Software

...
  TOR Hacker   last year

You can buy Amazon AWS, or any VPS, or web-hosting with SSH access, and use it's IP to browse internet (and for Tor outgoing connections). If you'll have SSH access to any computer outside your campus network, the rest is given by SSH Tunneling (ssh -D) technique. Google Tor over SSH Tunnel, - tha ...

View Topic (1 replies)



Using Tor for online gaming?

by Louie in Userspace Software

...
  TOR Hacker   last year

All Tor Exit nodes are usually banned. But you can try, anyway.
If your game client supports proxy, find in settings something like Connectivity, Connection, PROXY, Data roaming, ...etc. Then open Tor Browser Network connection settings, and copy SOCKS Host and Port from there.
Usually, H ...

View Topic (2 replies)



How I can run multiple versions of TOR Browser?

by dimas in Userspace Software

...
  TOR Hacker   last year

1) Unpack your Tor versions to different folders, let's say ./Tor1/ and ./Tor2/
2) Run one of them, any one. Let's say,
.\Tor1\Tor Browser\Start Tor Browser.exe
3) Now open another Tor folder, Tor2. You'll see something like
App
Data
Docs
FirefoxPortable
Start ...

View Topic (1 replies)



Hidden Website(?)

by NewUser1 in Running a Server

...
  TOR Hacker   last year


if ($_SERVER["HTTP_REFERER"] == "http://another.site/") {
// everything OK, show content
} else {
header("404 Not Found");
exit();
}

View Topic (2 replies)



Is it safe to allow scripts on Wordpress.com in Tor Browser?

by ufheg2 in Security Questions

...
  TOR Hacker   last year

Yes, this is risky.
Javascript itself cannot reveal your IP, but there were several successful attacks on Tor users via abnormal browser behavior, and your browser can also be vulnerable. The most dangerous are Remote Code Execution exploits, so if someone intrudes into your local computer via ...

View Topic (2 replies)



Tor Private Investigation

by wy8earp in General Questions

...
  TOR Hacker   last year

No. Tor is a proxy-service, meant to hide your real IP from websites you visit.

View Topic (1 replies)



Will my past lack of prudence affect my anonymity?

by justaguy in Security Questions

...
  TOR Hacker   last year

Just don't bother. You are normal man, you have Facebook and Gmail Account, you have some everyday Internet activities, favourite sites, browsing habbits... This is normal. Everybody does.
More of that: you have your smartphone connected to your personal accounts, or you used it at leas ...

View Topic (1 replies)