Tor use 3 noes to enter the Tor-Network. why adding more nodes would not help my anonymity, as more nodes i have it need to be harder to track me. how can i add or subtract nodes.
On 21 May 2018, at 22:43, dave` dave daved7082@gmail.com wrote:
Tor use 3 noes to enter the Tor-Network. why adding more nodes would not help my anonymity, as more nodes i have it need to be harder to track me.
No, 3 nodes is enough:
https://www.torproject.org/docs/faq.html.en#ChoosePathLength
how can i add or subtract nodes.
You can't.
T
Paths are driven by the client and unchecked, it's not hard to do. However first you're better off taking a serious look at your threat model, which you've not mentioned at all for anyone to help you qualify it and any potential solutions therein, before turning random knobs in whatever anonymous overlays you're using.
Likely more useful than hop count would be analysis of the real world node network, with path selection leanings and choices being made therein. But again, no one seems to be taking up and working that project. Sybils all the way down...
I don't have something specific to hide, i just wonder how can i set more or less node for testing- im running all the nodes(Bridge,Guard, middle and exit) and i wanna know if I'm define for example one node the traffic will be encrypt or not?(if i can define a one node only) or adding more nodes.
On Tue, May 22, 2018 at 5:47 AM, grarpamp grarpamp@gmail.com wrote:
Paths are driven by the client and unchecked, it's not hard to do. However first you're better off taking a serious look at your threat model, which you've not mentioned at all for anyone to help you qualify it and any potential solutions therein, before turning random knobs in whatever anonymous overlays you're using.
Likely more useful than hop count would be analysis of the real world node network, with path selection leanings and choices being made therein. But again, no one seems to be taking up and working that project. Sybils all the way down... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
For that I'd suggest you look into running a separated test network with all nodes having TestingTorNetwork 1 in their torrc. Then you can change the hop number in the source & experiment away, without impacting the real network.
Regards, /peter
On 2018-05-24 10:30, dave` dave wrote:
I don't have something specific to hide, i just wonder how can i set more or less node for testing- im running all the nodes(Bridge,Guard, middle and exit) and i wanna know if I'm define for example one node the traffic will be encrypt or not?(if i can define a one node only) or adding more nodes.
On Tue, May 22, 2018 at 5:47 AM, grarpamp grarpamp@gmail.com wrote:
Paths are driven by the client and unchecked, it's not hard to do. However first you're better off taking a serious look at your threat model, which you've not mentioned at all for anyone to help you qualify it and any potential solutions therein, before turning random knobs in whatever anonymous overlays you're using.
Likely more useful than hop count would be analysis of the real world node network, with path selection leanings and choices being made therein. But again, no one seems to be taking up and working that project. Sybils all the way down... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
i saw that is a way to change the numbers of nodes in this site http://thesprawl.org/research/tor-control-protocol/#creating-really-fast-one... any one knows how it works, there is not enough information how to use it.
On Thu, May 24, 2018 at 1:59 PM, Peter Ludikovsky peter@ludikovsky.name wrote:
For that I'd suggest you look into running a separated test network with all nodes having TestingTorNetwork 1 in their torrc. Then you can change the hop number in the source & experiment away, without impacting the real network.
Regards, /peter
On 2018-05-24 10:30, dave` dave wrote:
I don't have something specific to hide, i just wonder how can i set more or less node for testing- im running all the nodes(Bridge,Guard, middle and exit) and i wanna know if I'm define for example one node the traffic will be encrypt or not?(if i can define a one node only) or adding more nodes.
On Tue, May 22, 2018 at 5:47 AM, grarpamp grarpamp@gmail.com wrote:
Paths are driven by the client and unchecked, it's not hard to do.
However first you're better off taking a serious look at your threat model, which you've not mentioned at all for anyone to help you qualify it and any potential solutions therein, before turning random knobs in whatever anonymous overlays you're using.
Likely more useful than hop count would be analysis of the real world node network, with path selection leanings and choices being made therein. But again, no one seems to be taking up and working that project. Sybils all the way down... _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 24 May 2018, at 05:00, dave` dave daved7082@gmail.com wrote:
i saw that is a way to change the numbers of nodes in this site http://thesprawl.org/research/tor-control-protocol/#creating-really-fast-one... any one knows how it works, there is not enough information how to use it.
"Since we will use the same node for both entry and exit, we must find a node which supports appropriate exist policy"
By default, recent Tor versions do not allow single hop exits, because the exit learns the client's IP address and the destination domain.
If you want this feature, run your clients and exits in a test network with:
RefuseUnknownExits 0
T
i saw about this " *RefuseUnknownExits* 0 " but its not working, have any other idea that it may work?
On Thu, May 24, 2018 at 6:30 PM, teor teor2345@gmail.com wrote:
On 24 May 2018, at 05:00, dave` dave daved7082@gmail.com wrote:
i saw that is a way to change the numbers of nodes in this site http://thesprawl.org/research/tor-control-protocol/# creating-really-fast-one-hop-circuits any one knows how it works, there is not enough information how to use it.
"Since we will use the same node for both entry and exit, we must find a node which supports appropriate exist policy"
By default, recent Tor versions do not allow single hop exits, because the exit learns the client's IP address and the destination domain.
If you want this feature, run your clients and exits in a test network with:
*RefuseUnknownExits* 0
T
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 28 May 2018, at 23:46, dave` dave daved7082@gmail.com wrote:
i saw about this " RefuseUnknownExits 0 " but its not working, have any other idea that it may work?
Please copy and paste the client and exit logs from when you try to connect.
Then we can help you more.
T
Thank you for your help! i have maybe a better idea for my project, i saw that if i change the number of nodes(change it to one node only) i may get block from the tor in this link https://tor.stackexchange.com/questions/1755/how-to-implement-the-modified-s... so it can be better if i create my own private tor network. i saw that i can use the "shadow" program to do that and with that i can change the tor source code and force it to work with only one node without any concerns to get blocked. someone know how to do that?
On Wed, May 30, 2018 at 7:18 PM, teor teor2345@gmail.com wrote:
On 28 May 2018, at 23:46, dave` dave daved7082@gmail.com wrote:
i saw about this " RefuseUnknownExits 0 " but its not working, have any
other idea that it may work?
Please copy and paste the client and exit logs from when you try to connect.
Then we can help you more.
T _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
On 31 May 2018, at 04:02, dave` dave daved7082@gmail.com wrote:
Thank you for your help! i have maybe a better idea for my project, i saw that if i change the number of nodes(change it to one node only) i may get block from the tor in this link https://tor.stackexchange.com/questions/1755/how-to-implement-the-modified-s... so it can be better if i create my own private tor network. i saw that i can use the "shadow" program to do that and with that i can change the tor source code and force it to work with only one node without any concerns to get blocked. someone know how to do that?
If you want to simulate the network, use shadow: https://github.com/shadow/shadow/wiki/1-Installation-and-Setup
If you want to run the network in real time, use chutney: https://gitweb.torproject.org/chutney.git/tree/README
Both tools have reasonable instructions.
T
after searching a way to create one single hop i saw that site http://thesprawl.org/research/tor-control-protocol/#creating-really-fast-one... there i can change number of hop's but im having problems with that. im trying to do those changes from terminal (Linux Ubuntu 16.04 on VMware) and trying to do those changes from cmd(windows) and its not compile. is any one knows how to work with it?
On Thu, May 31, 2018 at 7:29 PM, teor teor2345@gmail.com wrote:
On 31 May 2018, at 04:02, dave` dave daved7082@gmail.com wrote:
Thank you for your help! i have maybe a better idea for my project, i saw that if i change the number of nodes(change it to one node only) i may get block from the tor in this link https://tor.stackexchange.com/questions/1755/how-to- implement-the-modified-source-code-of-tor so it can be better if i create my own private tor network. i saw that i can use the "shadow" program to do that and with that i can change the tor source code and force it to work with only one node without any concerns to get blocked. someone know how to do that?
If you want to simulate the network, use shadow: https://github.com/shadow/shadow/wiki/1-Installation-and-Setup
If you want to run the network in real time, use chutney: https://gitweb.torproject.org/chutney.git/tree/README
Both tools have reasonable instructions.
T
tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
tor-relays@lists.torproject.org