Registered | last year |
Last Visited | last month |
Total Posts | 11 |
by Admin in TorForum.org
![]() | Admin 3 weeks ago |
This forum is free to join for everybody, but in order to prevent automatic registrations (or at least to lower their number) we kindly ask you to provide this invitation code during registration:
Invitation Code 194450
Thanks.
![]() | Admin last year |
I think you should ask such questions somewhere in the darknet, not here.
This forum is about installing Tor and accessing the Tor Network. As long as you are already there - we cannot help you more. Check out the http://thehiddenwiki.org/ for some useful *.onion links to start with.
by Dalek Zod in Userspace Software
...
![]() | Admin last month |
Consider installing Firefox Portable from portableapps.com
Then unRAR back your TOR Browser into another folder.
Then start TOR Browser.
And AFTER THAT open your Firefox Portable Edition.
Now you should have both anonymous and normal browser.
by Admin in Userspace Software
![]() | Admin last month |
..
First read Tor Project's own warnings, but I will note that they are only a beginning, and are not adequate to protect you from different threats.
Your Computer
To date the NSA's and FBI's primary attacks on Tor users have been MITM attacks (NSA) and hidden service web server compromi
by Szaman in General Questions
...
![]() | Admin 2 months ago |
How do you torify python?
![]() | Admin 3 months ago |
Now there are many talks about this situation, and Tor in general, so I want to say a few words.
First, I strongly recommend to read this document:
http://scribd.com/doc/172773407/Ulbrich ... -Silk-Road
This is primary source about the incident. The rest is just retelling and speculat
by TOR Hacker in General Questions
...
![]() | Admin 4 months ago |
Just in case somebody will need Windows 32bit version of connect-proxy, that was mensioned by TOR Hacker in previous post, here it is
connect.zip
by taouki in Security Questions
...
![]() | Admin 8 months ago |
What I remember is:
Tor -> VPN = safe, pally VPN -> Tor = goto jail
While on the other hand a VPN -> Tor connection is complete nonsense, which does not need any further explication in my opinion.
"Mattew"
It depends on who are you hiding from. So-called Threat Model:
1) You
by Admin in Running a Server
![]() | Admin 8 months ago |
1) Buy any cheap VPS.
You can find good deals on http://www.lowendbox.com/ and also check out http://www.lowendtalk.com/wiki/ with examples of some common VPS installations, such as web-server.
2) Install nginx, mysql, php or anything your website needs to run.
3) Configure your web-se
by Admin in General Questions
![]() | Admin last year |
Tor was not designed to be used with such massive traffic clients as uTorrent. Torrents produce great overhead to the TOR network, open direct UDP connections ignoring proxy rules, share your IP with torrent trackers and so on.
So in general they should be torified at Ethernet level, not at T