Torrentech Radio is currently offline.
The radio is currently offline · No scheduled sets...
Schedule · DJ-s · Stats

> Help Topic
Here is the topic you chose to view
Enter keywords to search for   

> Tor
Here is the topic you chose to view
Many thanks to Idle. for this

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet.

Torrentech welcomes all rule abiding users that want to preserve their anonymity or bypass ISP / Government censorship. Please note that Tor should ONLY be used for browsing the website, it is not designed for downloading or uploading torrents:

The easiest and most thorough way to use tor is via the official browser bundle:

This download, after extraction, will give you a single folder containing a custom built firefox browser already custom fitted for tor use, as well as the program, and vidalia (graphic controller). The best way to learn is to use the software yourself. but here is some general information and advisories:

Most importantly, read the warning:

When you load the bundle up (start-tor-browser script/exe), tor will start, it will take a second to establish a circuit, then when it's ready it will launch its own firefox. All downloads / configuration files / addons / etc will be located in that folder, isolated from other instances of firefox. You can and should run more than one browser when it comes to maintaining anonymity, for example 2 instances of firefox, one for tor (via the tor browser bundle), and one your normal browser - making sure to isolate identities/accounts/output actions applicable to the browser and places on the net which will make most sense for what you're doing. You'll see the browser start then connect to - showing that your IP is different from your real IP. This is not similar to using a single proxy or vpn, as the slowness of the browsing will generally suggest. What's actually happening is a bit more complicated:

Making a request to sends the connection entirely encrypted through an entry-node in order to prevent your ISP from seeing it all out in the open. Then the entry node passes it along to a chain of other nodes, each point to point pass strips the initial upload/download/request of identifying information, the extent of which achieves the primary goal: To have read or posted something without the exit-node knowing anything about your origin traffic. All the exit node knows is what unencrypted data passed through it. In this way, we are achieving anonymity through multiple levels of isolating entry and exit traffic. You will read in many places on the net that "tor doesn't encrypt anything"; this is a general misconception, what they mean is that "exit nodes don't encrypt anything", and that is specifically by design.

The tor community suggests using SSL wherever possible to establish the additional layer of encryption needed to protect sensitive information from people or machines peering in on exit-node traffic. For example many websites/services redirect requests from http:// to https:// in order to encrypt your authentication and session information via SSL. Using the tor bundle while connected to websites via SSL protects and secures both the session maintained with the website, as well as your anonymity. You see what the site has to offer. The site sees some random tor user. Your ISP sees a bunch of junk data.

Personal, intelligent use and methodology is something that software cannot teach you, it comes with practice. For example, there is a highly specific way to safely upload leaked information about Barbara Streisand's vocal techniques, and there is another highly specific way to log in to your gmail account - sometimes how you approach using tor depends on the end result. Read over this again for clarity:

Please take care to understand how to use the software effectively.
Lo-Fi Version Time is now: 16.06.2019 - 18:26