|Last Visited||5 months ago|
|Admin 4 months ago|
This forum is free to join for everybody, but in order to prevent automatic registrations (or at least to lower their number) we kindly ask you to provide this invitation code during registration:
Invitation Code 194450
|Admin 3 weeks ago|
I think you should ask such questions somewhere in the darknet, not here.
This forum is about installing Tor and accessing the Tor Network. As long as you are already there - we cannot help you more. Check out the http://thehiddenwiki.org/ for some useful *.onion links to start with.
|Admin 4 months ago|
Consider installing Firefox Portable from portableapps.com
Then unRAR back your TOR Browser into another folder.
Then start TOR Browser.
And AFTER THAT open your Firefox Portable Edition.
Now you should have both anonymous and normal browser.
|Admin 5 months ago|
First read Tor Project's own warnings, but I will note that they are only a beginning, and are not adequate to protect you from different threats.
To date the NSA's and FBI's primary attacks on Tor users have been MITM attacks (NSA) and hidden service web server compromi
|Admin 7 months ago|
Now there are many talks about this situation, and Tor in general, so I want to say a few words.
First, I strongly recommend to read this document:
http://scribd.com/doc/172773407/Ulbrich ... -Silk-Road
This is primary source about the incident. The rest is just retelling and speculat
|Admin last year|
What I remember is:
Tor -> VPN = safe, pally VPN -> Tor = goto jail
While on the other hand a VPN -> Tor connection is complete nonsense, which does not need any further explication in my opinion.
It depends on who are you hiding from. So-called Threat Model:
|Admin one week ago|
1) Buy any cheap VPS.
You can find good deals on http://www.lowendbox.com/ and also check out http://www.lowendtalk.com/wiki/ with examples of some common VPS installations, such as web-server.
2) Install nginx, mysql, php or anything your website needs to run.
3) Configure your web-se
|Admin last month|
Tor was not designed to be used with such massive traffic clients as uTorrent. Torrents produce great overhead to the TOR network, open direct UDP connections ignoring proxy rules, share your IP with torrent trackers and so on.
So in general they should be torified at Ethernet level, not at T