-
## Question
Is it possible to "split" Stash traffic between "web hosting" traffic (users accessing the webpage, streaming videos, etc.) and "scraping" traffic (look-ups to sites to fill in details on…
-
- [ ] User should be able to toggle this on/off. Defaults to off.
- [ ] Edit torrc from embassyd
- [ ] Write guide/instructions for setting up port forwarding on router
- [ ] Explain benefits and l…
-
Hi,
I want to encrypt my DNS traffic, so can you add this feature to Tallow, Reqrypt.
Add "Forces SOCKS4" + "DNSCrypt" features.
"SOCKS4 + dnscrypt-proxy: Forward the DNS traffic to a DNS serve…
-
All three tor files that you have:
> I have included the TOR network in these lists (bm_tor, dm_tor, et_tor). The TOR network is not necessarily bad and you should not block it if you want to allow…
-
Apparently it's possible to distinguish Ricochet traffic from other Tor traffic, and that can lead to both anonymity and usability issues for the following reason:
- If I want to attack Ricochet users…
-
**Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario**
_Xuebin Wang, Zeyu Li, Wentao Huang, Meiqi Wang, Jinqiao Shi, Yanyan Yang_
dataset: htt…
-
Riffle is ten times faster than tor while being written in a slower language then Tor (golang instead of Clang) It supports the hybrid verifiable shuffle to enforce the rule that no node will tamper w…
-
# TL;DR
Having support for HashedControlPassword authentication to the tor control port would be useful. The `MESSAGING:onion` section could have a new `tor_control_password` setting and use that i…
-
# Feature request
## Description
Currently our docs assume that the journalist is living and working in the US where press freedom exists to a reasonable degree. Additionally, usage of Tor is no…
-
For outbound connections, using tor is relatively easy:
Make sure to use tor socks5 proxy (with dns from socks)
For inbound on static hidden services it is easy:
Answer on the port, let tor bring…