Question:
What does TOR do exactly?
?
2010-06-25 07:31:20 UTC
And whats the diffence to a VPN service like ipredator?
And how do i use a proxy not only to surf but to connect it to the bittorent program?
I downloaded TOR to be able to download with torrent anonymously, but my IP is stillvisible with IP tracker. So, really don't understand what it does?
P.S. Please note that i don't appreciate lectures about buying instead of downloading.
(Yes, I buy Cd's, but only directly from the artists themselves.
No, i won't buy anything from itunes, which I consider as an attempt to concentrate all profits of the music industry in one hand, instead of sharing the cake which small record companies, the Cd store or video shop at the corner, and so on.
No, i don't consider downloading as immoral, because if it wouldnt exist, they would let us pay much more for buying music and stuff)
Nine answers:
Chris McKoy
2010-06-25 22:54:12 UTC
For what you seem to be using it for, TOR is not what you're looking for.



TOR is essentially an internet anonymizer, but it's important to note that it does not keep your data secure by any means. For example, if want to log into Facebook, you can, and it will be very easy for people to gain access to your Facebook email and password, but they will not know where the data came from.



It's very useful in countries like China, that filter certain content, not so practical for what you're wanting. For one thing, just sending regular HTML through TOR is slow enough, but trying to use it for torrents will be unbearable, for you and for TOR in general. What would take five minutes to download without TOR will easily take two or more days with TOR.



Not only that, but you have to set it up just right, or the tracker will go through TOR, but the actual torrent will be your regular IP address.



Long story short, it's easier and simpler to use ipredator, and it will benefit you the most.
Jolly
2016-11-05 16:01:45 UTC
Tor is not for BitTorrent at all for these reasons:

1) Tor is extremely slow due to the way it works. Fine if you want to download pirate .txt files, but for anything else, no.

2) BitTorrent itself is known to leak your IP therefore Tor over BT is useless anyway. It's all cost and no benefit. Use a VPN instead. It'll be fine unless you're downloading CP, in which case I'd recommend a Desert Eagle due to its high calibre and 99% suicide success rate.

3) If you use Tor over BitTorrent you slow down the Tor network for all the genuine criminals and darkweb surfers, all the while doing nothing for yourself. Don't do it, or you may find yourself in a Jason Bourne-style chase across Europe.



Tor is for anonymous communication - not for downloading cars and ****.
2010-06-25 11:32:22 UTC
It puts your data on untrusted computers all over the world run by people that are unknown to the distributors of TOR. Odds are that many of these exit nodes are run by hackers. At least with ipredator you'll know who's scanning and stealing your data. I can see you love the idea of torrenting and have convinced yourself you are Robin Hood stealing from the rich to give it to yourself. But if you thought about it Pirate Bay has no issues with stealing copyrighted material to make million of dollars of profit for themselves. So why would they hesitate to not steal from you too?
2010-06-25 11:08:31 UTC
Achieving Internet Anonymity;

Security Now! with Steve Gibson, Episode 70 for December 14, 2006: Freenet and TOR.

http://www.grc.com/sn/sn-070.htm
?
2010-06-25 17:11:27 UTC
A little introductory article on TOR, The Onion Router, a privacy-enhancing technology that helps you to circumvent national, corporate and school firewalls and enhance your anonymity. Originally developed by the US military to help communications get in and out of countries that heavily filter their networks, TOR is free/open software and is maintained by many volunteers around the world, including the Electronic Frontier Foundation.



TOR works by passing your traffic through several (theoretically) unrelated computers all over the Internet, using cryptography to keep the origin, destination, and intermediary steps secret from each computer it passes through.



You can run TOR on your own computers and they'll become part of this array of intermediary hosts all over the net, making your network connection into a tool for privacy and free access to information
atnip
2017-02-24 16:25:24 UTC
What Does Tor Do
melva
2016-09-19 21:40:47 UTC
And the same question comes up again
?
2016-06-04 05:28:28 UTC
it mask users locations
?
2016-09-14 01:20:23 UTC
maybe so


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Continue reading on narkive:
Loading...