background preloader

Tor: Documentation

Tor: Documentation
Related:  réseaux anonymes / anonymous networksToraurealis

Tor Bug Tracker & Wiki Welcome to Tor's combined bug tracker and wiki website. Choose New Ticket to create a new bug report or feature request. Most of the content here is written by volunteers from around the world. Documentation ¶ Using Tor with … ¶ Installing and Configuring Tor ¶ Unixish ¶ Win32 ¶ Live CD / USB ¶ ​Tails, Debian-based, all outgoing connections using Tor, CD or USB, no writing to hdd. Embedded ¶ Tips and Links for running Tor in an embedded environment Miscellaneous ¶ Random stuff ¶ ​A list of appearances and articles Get paid to work on Tor! If you're a student, come work with us full-time over the summer as part of the ​Google Summer of Code! Legal Stuff ¶ The tor doc on this site is distributed under the X11 license.

Anonymity Online Best cloud services for email, movies, music and more Living with your head in the clouds used to mean that you were as ditzy as a TOWIE cast member, but now it's seen as a smart move. Almost everything to do with computers and gadgetry -- from listening to music to writing an office presentation -- is moving into 'the cloud'. Yes, it is a buzzword, but 'cloud' simply means that your files, music and photos, as well as fun and useful programs, are accessed via the Internet through a web browser, rather than held on your computer's hard drive. It used to be talked about as a clever option for big companies who wanted to save money, but over the last couple of years, cloud services have been targeted at you and me. You're already using a cloud service The chances are that you're using a cloud-based application without realising it. It's easy to see why webmail is so popular as it encapsulates many of the benefits of cloud computing. Storing your files on the Internet Dropbox is far from the only online storage option. Office tasks stored online

Orbot: Mobile Anonymity + Circumvention Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Orbot is the only app that creates a truly private internet connection. As the New York Times writes, “when a communication arrives from Tor, you can never know where or whom it’s from.” ★ ACCEPT NO SUBSTITUTES: Orbot is the safest way to use the Internet on Android. Download Orbot: Google Play | Amazon Appstore | Direct Download (.apk) ★ PRIVATE WEB SURFING: Use with Orweb, the most anonymous way to access any website, even if it’s normally blocked, monitored, or on the hidden web. Proxy Host: localhostProxy Port: 8118

Projects Overview The Tor community of software and services aims to make your Internet experience safer and better. The Tor Browser Bundle contains everything you need to safely browse the Internet. This package requires no installation. Just extract it and run. Arm is a terminal status monitor for Tor, intended for command-line aficionados and ssh connections. The Tor Cloud project gives you a user-friendly way of deploying bridges to help users access an uncensored Internet via the Amazon EC2 cloud. Analytics for the Tor network, including graphs of its available bandwidth and estimated userbase. Obfsproxy is a pluggable transports proxy. Web-based protocol to learn about currently running Tor relays and bridges. In collaboration with The Guardian Project, we're developing Tor on the Google Android mobile operating system. Shadow is a discrete-event network simulator that runs the real Tor software as a plug-in. Python library for applications and scripts that interact with Tor.

Ghostery Vidalia : a Qt user interface for Tor Vidalia is a cross-platform graphical controller for the Tor software, built using the Qt framework. Vidalia runs on most platforms supported by Qt 4.3 or later, including Microsoft Windows, Apple OS X, and Linux or other Unix variants using the X11 window system. It was originally written by Matt Edman, and is currently maintained by Tomás Touceda. Vidalia lets you start and stop Tor, see how much bandwidth you are consuming, see how many circuits you currently have active, see where these circuits are connected on a global map, view messages from Tor about its progress and current state, and let you configure your Tor client, bridge, or relay with a simple interface. Included in Vidalia is an extensive help system which helps you understand all of the options available to you. Downloads You should simply download Vidalia as part of a Tor software bundle. The most recent stable release is 0.2.21, and the most recent alpha release is 0.3.1. Contribute Support & Development

Download Tor Tor Browser Version 4.5.2 - Windows 8, 7, Vista, and XP Everything you need to safely browse the Internet. Learn more » Expert Bundle Windows 8, 7, Vista, XP, 2000, 2003 Server, ME, and Windows 98SE Contains just Tor and nothing else. Version 4.5.2 - OS X Intel Everything you need to safely browse the Internet. Version 4.5.2 - Linux, BSD, and Unix Tor (standalone) Install the Tor components yourself, run a relay, create custom configurations. Source Tarball Configure with: . The current stable version of Tor is The current unstable/alpha version of Tor is Want Tor to really work? You need to change some of your habits, as some things won't work exactly as you are used to. Use the Tor Browser Tor does not protect all of your computer's Internet traffic when you run it. Be smart and learn more.

About We understand that some people have more of an understanding of the phrase online behavioural advertising than others. This website has put been together to make this topic clearer for everyone. Put simply, behavioural advertising is a practice that is based on internet browsing activity and allows brands to deliver adverts to web users which reflect their interests. It’s safe, transparent, and designed to empower you, the consumer. The European advertising industry has developed a set of good practice principles that businesses should follow. What is behavioural advertising? Online behavioural advertising (also known as interest-based advertising) is a way of serving advertisements on the websites you visit and making them more relevant to you and your interests. How does it work? Who are the companies that are involved in behavioural advertising? The following types of companies are involved: Below you can see how all these companies work to deliver advertising. How is my privacy protected?

Utiliser Tor comme proxy [Tuto] - Logiciels Je tiens à rajouter pour faire mon gros chieur, que si jamais vous avez juste besoin de naviguer un petit coup de temps en temps de façon occasionnelle, vous pouvez télécharger le Tor Browser Bundle, qui contient tout dans un petit dossier : Tor, et un navigateur Firefox pré-configuré pour tourner avec. L'installation est hyper facile et y'a rien à faire. Et cette solution présente un intérêt supplémentaire, hormis la facilité d'installation. En effet, Tor ne fait qu'anonymiser les communications du navigateur, mais pas celles de ses composants. En effet, si vous vous connectez à un site web avec une animation Flash, vous serez anonymes vis-à-vis du site web grâce à Tor, mais l'animation Flash sera en communication directe et non anonyme, car ne passant pas par Tor. Ainsi, les différents composants additionnels au navigateur peuvent compromettre l'anonymat. Le Tor Browser Bundle contient un navigateur Firefox vierge et exempt de tout plugin, ce qui garantit donc un anonymat parfait.

Peace and Conflict Monitor, Tor, Anonymity, and the Arab Spring: An Interview with Jacob Appelbaum The recent revolution in Egypt that ended the autocratic presidency of Hosni Mubarak was a modern example of successful nonviolent resistance. Social Media technologies provided a useful tool for the young activist to orchestrate this revolution. However the repressive Mubarak regime prosecuted many activists and censored a number of websites. This made their activities precarious, making it necessary for activists to hide their identity on the Internet. The anonymity software Tor was a tool used by some bloggers, journalists and online activists to protect their identity and to practice free speech. Jacob Appelbaum, Tor developer, independent computer security researcher, and co-founder of the the San Francisco hackerspace Noisebrige has conducted a number of Tor trainings in the Middle East. What does Tor do and who uses it? In brief, Tor is an anonymity network that allows people to use the internet in a way that avoids traffic analysis. Can an anonymous person have credibility?