This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
tor [2011/12/01 17:54] ispyisail check spelling |
tor [2013/05/21 15:59] (current) eric |
||
---|---|---|---|
Line 1: | Line 1: | ||
+ | |||
+ | |||
====== Tor, Anonymity Online ====== | ====== Tor, Anonymity Online ====== | ||
===== Introduction ===== | ===== Introduction ===== | ||
- | Gargoyle 1.5.1 and above now supports | + | Tor with Gargoyle provides plug and play anonymous access to the internet. |
+ | Routers running | ||
+ | |||
+ | Recommended routers include | ||
+ | |||
+ | * Ubiquiti Routerstation | ||
+ | * Ubiquiti Routerstation Pro | ||
+ | * Buffalo WZR-HP-G300NH | ||
+ | * Netgear WNDR3700v1-2 | ||
===== About ===== | ===== About ===== | ||
Line 10: | Line 21: | ||
Tor prevents anyone from learning your location or browsing habits. | Tor prevents anyone from learning your location or browsing habits. | ||
Tor is for web browsers, instant messaging clients, remote logins, and more. | Tor is for web browsers, instant messaging clients, remote logins, and more. | ||
- | Tor Protects your privacy. Defend yourself against network surveillance and traffic analysis. | + | Tor Protects your privacy. Defend yourself against network surveillance and traffic analysis. |
==== Tor Security ==== | ==== Tor Security ==== | ||
Line 16: | Line 28: | ||
NOTE: **Tor can't solve all anonymity problems.** | NOTE: **Tor can't solve all anonymity problems.** | ||
+ | |||
+ | It should be noted that you should NOT run bittorrent through Tor -- not only does anonymization not work for bittorrent, it can expose your identity in any other traffic you run through Tor. | ||
==== Tor Speed ==== | ==== Tor Speed ==== | ||
Line 25: | Line 39: | ||
'' | '' | ||
+ | |||
+ | {{: | ||
{{: | {{: | ||
==== Tor Client: ==== | ==== Tor Client: ==== | ||
+ | === Enabled, Toggled By Each Host === | ||
- | |||
- | * Enabled, Toggled By Each Host | ||
Every client that wants to be protected must select enable at the Gargoyle router login screen. | Every client that wants to be protected must select enable at the Gargoyle router login screen. | ||
+ | === Enable For All Hosts === | ||
- | * Enable For All Hosts | ||
All clients are protected by Tor | All clients are protected by Tor | ||
Line 44: | Line 59: | ||
Select either | Select either | ||
+ | === Ignore === | ||
- | * Ignore | ||
All services will work but your Anonymity may be less | All services will work but your Anonymity may be less | ||
+ | === Block === | ||
- | * Block | ||
Anonymity will be improved but some services may no longer work. | Anonymity will be improved but some services may no longer work. | ||
- | ===== Enable Tor for your IP address ===== | + | ===== Enabled, Toggled By Each Host (Per IP address) ===== |
- | To enable | + | To enable |
+ | |||
+ | {{: | ||
+ | |||
+ | {{: | ||
+ | |||
+ | Once the host (Client PC) has a fixed IP address log out and reconnect to Gargoyle and you should get this screen | ||
{{: | {{: | ||
Line 66: | Line 87: | ||
Check determines if you are successfully browsing with Tor. | Check determines if you are successfully browsing with Tor. | ||
+ | |||
+ | ===== Tor Hidden Services ===== | ||
+ | |||
+ | |||
+ | Tor Hidden Services are one of the best features of Tor, and one that most people aren't aware of. Basically, a Tor hidden service is one provided by a server located/ | ||
+ | |||
+ | In general, Tor takes your connection, bounces it around inside the Tor network, and then forwards it to its ultimate destination so that whatever host you're connecting to only sees your address as the the last Tor node visited (the exit node). The address you're connecting to, though, is publicly known -- it's on an IP address that everyone can get to. If someone wants to know where the server is located, that's easy to do. | ||
+ | |||
+ | When connecting to a tor hidden node, the connection never leaves the Tor network. There are addresses that look like fairly random strings of alphanumeric characters and that end in " | ||
+ | |||
+ | For example, Tor Mail: http:// | ||
+ | |||
+ | Here's another forum service called " | ||
+ | |||
+ | Google for more " | ||
+ | |||
+ | The new " | ||
+ | |||
+ | In addition to the " | ||
+ | |||
+ | Most people probably shouldn' |