Tor: Documentation

Tor: Documentation

Internet / Réseau / WIFI ...réseaux anonymes / anonymous networksTor

Tor Bug Tracker & Wiki Welcome to Tor's combined bug tracker and wiki website. Choose New Ticket to create a new bug report or feature request. Most of the content here is written by volunteers from around the world. Projects Overview The Tor community of software and services aims to make your Internet experience safer and better. The Tor Browser Bundle contains everything you need to safely browse the Internet. This package requires no installation. Just extract it and run.

Friend-to-friend A friend-to-friend (or F2F) computer network is a type of peer-to-peer network in which users only make direct connections with people they know. Passwords or digital signatures can be used for authentication. Unlike other kinds of private P2P, users in a friend-to-friend network cannot find out who else is participating beyond their own circle of friends, so F2F networks can grow in size without compromising their users' anonymity.

Orbot: Mobile Anonymity + Circumvention Orbot is a free proxy app that empowers other apps to use the internet more securely. Orbot uses Tor to encrypt your Internet traffic and then hides it by bouncing through a series of computers around the world. Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis. Orbot is the only app that creates a truly private internet connection. As the New York Times writes, “when a communication arrives from Tor, you can never know where or whom it’s from.”

Download Tor Tor Browser Bundle Version 3.5.4 - Windows 8, 7, Vista, and XP Everything you need to safely browse the Internet. Learn more » Vidalia Bridge Bundle Windows 8, 7, Vista, and XP Anonymous P2P Interest in anonymous P2P systems has increased in recent years for many reasons, ranging from the desire to share files without revealing one's network identity and risking litigation[1] to distrust in governments, concerns over mass surveillance and data retention, and lawsuits against bloggers.[2] Motivation for anonymity[edit] There are many reasons to use anonymous P2P technology; most of them are generic to all forms of online anonymity. P2P users who desire anonymity usually do so as they do not wish to be identified as a publisher (sender), or reader (receiver), of information. Common reasons include:

Vidalia : a Qt user interface for Tor Vidalia is a cross-platform graphical controller for the Tor software, built using the Qt framework. Vidalia runs on most platforms supported by Qt 4.3 or later, including Microsoft Windows, Apple OS X, and Linux or other Unix variants using the X11 window system. It was originally written by Matt Edman, and is currently maintained by Tomás Touceda. Vidalia lets you start and stop Tor, see how much bandwidth you are consuming, see how many circuits you currently have active, see where these circuits are connected on a global map, view messages from Tor about its progress and current state, and let you configure your Tor client, bridge, or relay with a simple interface. Included in Vidalia is an extensive help system which helps you understand all of the options available to you.

Peace and Conflict Monitor, Tor, Anonymity, and the Arab Spring: An Interview with Jacob Appelbaum The recent revolution in Egypt that ended the autocratic presidency of Hosni Mubarak was a modern example of successful nonviolent resistance. Social Media technologies provided a useful tool for the young activist to orchestrate this revolution. However the repressive Mubarak regime prosecuted many activists and censored a number of websites. This made their activities precarious, making it necessary for activists to hide their identity on the Internet. The anonymity software Tor was a tool used by some bloggers, journalists and online activists to protect their identity and to practice free speech. Jacob Appelbaum, Tor developer, independent computer security researcher, and co-founder of the the San Francisco hackerspace Noisebrige has conducted a number of Tor trainings in the Middle East.

How to Become Anonymous on the Internet Using Tor The internet is a scary place, and if you're like me, you don't want anyone tracking you or learning your search habits. It's a blatant invasion of privacy for companies to do this, but at least we have methods of fighting back—one of which is Tor. Tor stands for The Onion Router. It operates by donated bandwidth from its users. Tor encrypts your traffic, then forwards it through multiple nodes, like the layers of an onion, hence the name "The Onion Router". How SOPA's 'circumvention' ban could put a target on Tor | Privacy Inc. A little-noticed section of the Stop Online Piracy Act could make it illegal to distribute Tor and other software that can "circumvent" attempts by the U.S. government to block pirate Web sites. The controversial Hollywood-backed copyright bill allows injunctions to be filed against "any" person, nonprofit organization, or company that distributes a "product or service" that can be used to circumvent or bypass blockades erected against alleged pirate Web sites such as "It looks like SOPA would outlaw Tor," says Markham Erickson, an attorney with Holch & Erickson LLP who runs NetCoalition. The trade association opposes SOPA and counts, eBay, Google, and Yahoo among its members.

The Freenet Project - /index Share files, chat on forums, browse and publish, anonymously and without fear of blocking or censorship! Then connect to your friends for even better security! Learn more! We were unable to detect your Operating System. Please turn on javascript, or go to the download page to install Freenet.