EzDevInfo.com

tor interview questions

Top tor frequently asked interview questions

How do we configure another browser to use Tor? [closed]

How do we configure Google Chrome (or another web browser) to use Tor Browser?

By that I mean that we are using Chrome, but the traffic is routed through Tor (and thus anonymous).


Source: (StackOverflow)

tor: how to have different ip address for every page request?

I installed the tor bundle and at https://check.torproject.org/ it confirms that tor is working, and the page shows the tor ip address. I notice this seems to be constant.

Is it possible to get a new ip for every page request?

PS: I seem to have a new IP after 5 minutes now! Although, I am not sure how often does this happen.


Source: (StackOverflow)

Advertisements

Why does a Tor relay send more data than it receives?

I run a Tor relay. I have often seen that there is a significant discrepancy between the amount of data sent and that received. For instance, this morning log states:

Tor's uptime is 7 days 18:00 hours, with 551 circuits open. I've sent 167.80 GB and received 140.35 GB. 

That's a nearly 20% difference. I had a view of a relay as little more than a passing station on the road, except for the occasional authentication to the network.

Does anyone know the origin and meaning of this discrepancy? By the way, I am not hosting any hidden services.


Source: (StackOverflow)

Where can I find an equivalent of Torbutton for Google Chrome?

I enjoy the Torbutton I am currently using in Firefox, but Firefox is quite a resource hog and I am working in a virtual machine.

Is there a Torbutton equivalent for Google Chrome?


Source: (StackOverflow)

How many Tor exit nodes are there?

On average (as I do understand that servers go on and off the network, etc.) how many Tor exit nodes are there in service at any given time? (It is probably going to be an informed estimate.)


Source: (StackOverflow)

Chrome + Tor + Proxy Switchy!

Chrome 7 keeps showing a dialog saying: 514 Authentication Required when I use TOR.

How I solve this?


Source: (StackOverflow)

How to "flush tor circuit"

On Windows I have used XBBrowser, which provides a custom version of Firefox suited to using Tor.

XBBrowser provides a button, flush tor circuit, which will setup an entirely new connection and exit node.

I am wondering how to do the equivalent thing on Linux. ALl I can do is restart tor, which does not seem to make any difference.

So, on Linux, how would I flush the circuit?


Source: (StackOverflow)

How do I tell tor, from the command-line, to give me a new identity?

Is there a way to ask tor/vidalia for a new identity, via the command-line, as opposed to mousing to the icon, bringing up the menu, and clicking the option there?

I'm running Mac OSX 10.6 and 10.7 with the stable install 0.2.2.32-0.2.14.


Source: (StackOverflow)

Getting internet to a protest

I'm not sure if this is the right place to ask this question, but it's been in the back of my head for a while.

I am in Turkey, where there are thousands of protestors gathering in the street against the government. There have been reports that the internet has been cut off in the center of my medium sized city. I don't plan to do this, but I'm wondering how you could deliver internet securely, with as little danger to you as possible, with the cheapest/least amount of hardware to a 600 meter long street or a 40,000 square meter park.

There could potentially be thousands of people using Facebook and Twitter to communicate with the outside world.

I imagine the set up would include a series of high bandwidth wireless relays hooked up to a TOR node outside of the city center, but I lack the expertise to know whether this would work.


Source: (StackOverflow)

Connect through own TOR relay, make edge node traffic unreadable

I understand that one of the limitations of TOR is that whoever runs the edge node can read all the traffic running through it before it gets split up amongst the TOR cloud.

Lets say you were an oppressive authority, or simply law enforcement, then you could just set up a TOR edge node and wireshark and just dump all the data and look for things of interest.

Could this limitation of the TOR concept be mitigated by having a user set up their own TOR edge node (relay) and connecting through that relay from other computers. Where simple evaluation of the TOR network would show indistinguishable edge nodes - if I understand correctly.


Source: (StackOverflow)

How I could redirect all my traffic to the TOR network?

I need to redirect all my traffic to the TOR network.

I have just installed Vidalia, but I think that I have not correctly configured my Tor-client. I have a Java desktop client that has to access a website. This allows us to connect 50 times then it reject our connection.

I would like to use Tor to create more conecctions. How I can configure my tor-client correctly? Is there any online how-to? Are there other solutions?


Source: (StackOverflow)

Speed up FireFox when using TOR

After reading this question about surfing the web anonymously, I tried TOR with Firefox and it seems to be changing the original IP, but Firefox is really slow!

I have a good network speed, and I've never waited more than 3 seconds for a page to load, but with TOR activated I feel that for Google to load it's like eternity.

So, is there any configuration or workaround concerned TOR to speed up things a little?

[EDIT]

since it has to be like that, are there any alternatives to TOR out there?


Source: (StackOverflow)

How to run a program through Tor

I want to run programs from my ubuntu machine through Tor, without TAILS. i was wondering if this is possible?


Source: (StackOverflow)

How can I make Tor route all my traffic?

How can I set Tor to route all of my internet traffic? So, if I want to use any program to connect to a website or send requests to it, is there any way that I can make Tor hide my IP at all times?


Source: (StackOverflow)

Will tor encryption work on a public network?

I'm using a hotel's wifi service and need to send sensitive documents back home. A coworker has suggested using tor but I'm uncertain when and where the decryption takes place.

Is it decrypted at the exit node? If it is, when you send or receive a document through tor while using a public network, won't others on the same network be able to view the contents?


Source: (StackOverflow)