Question about Tor

1 respuesta [Último envío]
quantumgravity
Desconectado/a
se unió: 04/22/2013

Hello,
I'm interested in using the tor network. I downloaded the .tar.gz file with tor browser (combination of configured firefox, vidalia and tor I think) and used it a little bit.
But I'm concerned whether my pc could be used as an exit node by default settings.
Are the default settings configured the way that being an exit node is possible?
In my settings "use tor as a client" is marked, but I don't know if I get it right.
What does "use tor as a client" mean exactely?

Chris

I am a member!

Desconectado/a
se unió: 04/23/2011

If you downloaded the Tor Browser Bundle from the torproject.org web site then your not setup as an exit node. Don't use Tor from the Trisquel repository as it is not safe. The Trisquel Tor is out of date and may (almost certainly does) have security vulnerabilities.

Basically any Tor from Ubuntu or distribution derived from it is unsafe (like Trisquel). The reason it is not updated is because Ubuntu has taken Debian and copied it, then does not sync back with Debian, thus Tor in Ubuntu's repositories and anything based on it is out of date and insecure. Generally speaking this is true for anything that is not in Ubuntu's main repository. The stuff in Ubuntu's main repository is kept up to date-and nothing else.

Debian's Tor is kept up to date and is safe to use.

* Just a reminder most other distributions derived from Ubuntu are not FSF approved. Some are less problematic than others (Debian) because nothing in there main repository is non-free. However Debian's definition and FSF's definition do differ slightly. I forget if Debian's is more strict or if FSF's is. Either way they are very close.

Also note: Tor in Debian and other distributions derived from Tor do not include the Tor Browser Bundle so they would only be useful for setting up relay and exit nodes. They are not ideal for using with a generic web browser because of something called fingerprinting. Fingerprinting is where you can be tracked from your Tor session to your non-Tor session and identified.