Tor Icon

Tor provides robust anonymity, allowing you to defend against surveillance, circumvent censorship and reduce tracking. It blocks trackers, resists fingerprinting and implements multi-layered encryption by default, meaning you can browse freely. Tor also allows access to OnionLand: hidden services.

Open Source

Tor Privacy Policy

Privacy Policy Summary

  • Your personal data is not sold
  • An anonymous payment method is offered
  • You can access most of the pages on the service's website without revealing any personal information

Score

C

Documents

Domains Covered by Policy

  • torproject.org
  • dgvdmophvhunawds.onion
  • expyuzz4wqqyqhjn.onion
  • 3gldbgtv5e4god56.onion

About the Data

This data is kindly provided by tosdr.org. Read full report at: #2845

Tor Source Code

Author

torproject

Description

unofficial git repo -- report bugs/issues/pull requests on https://gitlab.torproject.org/ --

#c#rust#rust-lang#tor

Homepage

https://gitweb.torproject.org/tor.git

License

Created

05 Jun 13

Last Updated

03 Oct 24

Latest version

tor-0.4.8.1-alpha

Primary Language

Size

185,680 KB

Stars

4,426

Forks

938

Watchers

4,426

Language Usage

Language Usage

Star History

Star History

Recent Commits

  • Micah Anderson (05 Mar 24)

    Replace code and update README.md for current location of project.

  • David Goulet (19 Jun 23)

    Merge branch 'maint-0.4.7'

  • David Goulet (15 Jun 23)

    Change git.tpo URLs to gitlab.tpo Signed-off-by: David Goulet <[email protected]>

  • David Goulet (19 Jun 23)

    Use the new Stem repository on Gitlab Signed-off-by: David Goulet <[email protected]>

  • David Goulet (15 Jun 23)

    Merge branch 'tor-gitlab/mr/722'

  • David Goulet (15 Jun 23)

    Change git.tpo URLs to gitlab.tpo Signed-off-by: David Goulet <[email protected]>

  • Mike Perry (15 Jun 23)

    Changes file for Bug 40811

  • Mike Perry (15 Jun 23)

    Bug 40811: Count conflux leg launch attempts early. Also, double check that the consensus has enough overall exits before attempting conflux set launch.

  • David Goulet (14 Jun 23)

    Merge branch 'tor-gitlab/mr/721'

  • Mike Perry (13 Jun 23)

    Changes file for bug40810

  • Mike Perry (13 Jun 23)

    Bug 40810: Avoid using 0 RTT legs

  • Mike Perry (10 Jun 23)

    Bug 40810: Improve validation checks to ignore 0-RTT legs Also add calls to dump the legs of a conflux set if we have too many

  • David Goulet (13 Jun 23)

    Merge branch 'tor-gitlab/mr/715'

  • Mike Perry (09 Jun 23)

    Bug 40801: Add changes file

  • Mike Perry (09 Jun 23)

    Bug 40801: Do not change read state of marked conns

  • Mike Perry (08 Jun 23)

    Bug 40801: Send LINKED_ACK before attaching streams Otherwise, the BEGIN cell arrives at the exit before it has an RTT, and then it does not know which circuit to prefer in response.

  • Mike Perry (06 Jun 23)

    Add BUG() macro to marked edge reads This will give us a full stacktrace.

  • Mike Perry (30 Mar 23)

    Add conflux logs to diagnose cases where RTTs are absent/zero.

  • Neel Chauhan (07 Jun 23)

    Fix the spacing in the 'Your Tor identity key fingerprint is' log line'

  • Mike Perry (06 Jun 23)

    Add a conflux helper to log conflux sets.

  • Micah Elizabeth Scott (01 Jun 23)

    More fixes for compile-time warnings in equix and hashx This addresses issue #40800 and a couple other problems I noticed while trying to reproduce that one. The original issue is just a missing cast to void* on the args of __builtin___clear_cache(), and clang is picky about the implicit cast between what it considers to be char of different signedness. Original report is from MacOS but it's also reproducible on other clang targets. The cmake-based original build system for equix and hashx was a handy way to run tests, but it suffered from some warnings due to incorrect application of include_directories(). And lastly, there were some return codes from hashx_exec() that get ignored on equix when asserts are disabled. It bugged me too much to just silence this with a (void) cast, since even though this is in the realm of low-likelyhood programming errors and not true runtime errors, I don't want to make it easy for the hashx_exec() wrappers to return values that are dangerously wrong if an error is ignored. I made sure that even if asserts are disabled, we return values that will cause the solver and verifier to both fail to validate a potential solution. Signed-off-by: Micah Elizabeth Scott <[email protected]>

  • Tor CI Release (01 Jun 23)

    version: Bump version to 0.4.8.1-alpha-dev

  • Tor CI Release (01 Jun 23)

    version: Bump version to 0.4.8.1-alpha

  • Tor CI Release (01 Jun 23)

    release: ChangeLog for 0.4.8.1-alpha

  • Tor CI Release (01 Jun 23)

    fallbackdir: Update list generated on June 01, 2023

  • Tor CI Release (01 Jun 23)

    Update geoip files to match ipfire location db, 2023/06/01.

  • David Goulet (01 Jun 23)

    scripts: Use latest geoip database instead of using location Signed-off-by: David Goulet <[email protected]>

  • David Goulet (01 Jun 23)

    test: Really fix the mem leak from prior commit Signed-off-by: David Goulet <[email protected]>

  • David Goulet (01 Jun 23)

    test: Fix a mem leak reported by Coverity Here is the report: *** CID 1531835: Resource leaks (RESOURCE_LEAK) /src/test/test_crypto_slow.c: 683 in test_crypto_equix() 677 678 /* Solve phase: Make sure the test vector matches */ 679 memset(&output, 0xa5, sizeof output); 680 equix_result result; 681 result = equix_solve(solve_ctx, challenge_literal, 682 challenge_len, &output); >>> CID 1531835: Resource leaks (RESOURCE_LEAK) >>> Variable "solve_ctx" going out of scope leaks the storage it points to. Signed-off-by: David Goulet <[email protected]>

  • David Goulet (31 May 23)

    Merge branch 'maint-0.4.7'

Tor Website

Website

Tor Project | Anonymity Online

Anonymity Online | Defend yourself against tracking and surveillance. Circumvent censorship.

Redirects

Does not redirect

Security Checks

All 66 security checks passed

Server Details

  • IP Address 204.8.99.146
  • Hostname web-dal-08.torproject.org
  • Location Winchester, New Hampshire, United States of America, NA
  • ISP The Tor Project Inc.
  • ASN AS62744

Associated Countries

  • SE
  • US
  • DE

Saftey Score

Website marked as safe

100%

Blacklist Check

www.torproject.org was found on 0 blacklists

  • ThreatLog
  • OpenPhish
  • PhishTank
  • Phishing.Database
  • PhishStats
  • URLhaus
  • RPiList Not Serious
  • AntiSocial Blacklist
  • PhishFeed
  • NABP Not Recommended Sites
  • Spam404
  • CRDF
  • Artists Against 419
  • CERT Polska
  • PetScams
  • Suspicious Hosting IP
  • Phishunt
  • CoinBlockerLists
  • MetaMask EthPhishing
  • EtherScamDB
  • EtherAddressLookup
  • ViriBack C2 Tracker
  • Bambenek Consulting
  • Badbitcoin
  • SecureReload Phishing List
  • Fake Website Buster
  • TweetFeed
  • CryptoScamDB
  • StopGunScams
  • ThreatFox
  • PhishFort

Website Preview

Tor Docker

Container Info

qbittorrent

The qBittorrent project aims to provide an open-source software alternative to µTorrent. qBittorrent is based on the Qt toolkit and libtorrent-rasterbar library.

#Downloaders

DockerHub Metrics

  • Pull Count 310,177,176
  • Stars 1,422
  • Date Created 19 May 17
  • Last Updated 1 month ago

View on DockerHub

linuxserver/qbittorrent

Run Command

docker run -d \ 
  -p 6881:6881/tcp \
  -p 6881:6881/udp \
  -p 8080:8080/tcp \
  -e PUID=${PUID} \
  -e PGID=${PGID} \
  -v /portainer/Files/AppData/Config/qBittorrent:/config \
  -v /portainer/Downloads:/downloads \
  --restart=unless-stopped \
  linuxserver/qbittorrent:latest

Compose File

version: 3.8
services:
  qbittorrent:
    image: linuxserver/qbittorrent:latest
    ports:
      - 6881:6881:tcp
      - 6881:6881:udp
      - 8080:8080:tcp
    environment:
      PUID: 1000
      PGID: 100
    volumes:
      - /portainer/Files/AppData/Config/qBittorrent:/config
      - /portainer/Downloads:/downloads
    restart: unless-stopped

Environment Variables

  • Var Name Default
  • PUID 1000
  • PGID 100

Port List

  • 6881:6881/tcp
  • 6881:6881/udp
  • 8080:8080/tcp

Volume Mounting

  • /portainer/Files/AppData/Config/qBittorrent /config
  • /portainer/Downloads /downloads

Permissions

  • read ✅ Yes
  • write ✅ Yes
  • admin ✅ Yes

Tor Reviews

More Mix Networks

  • I2P offers great generic transports, it is well geared towards accessing hidden services, and has a couple of technical benefits over Tor: P2P friendly with unidirectional short-lived tunnels, it is packet-switched (instead of circuit-switched) with TCP and UDP, and continuously profiles peers, in order to select the best performing ones. I2P is less mature, but fully-distributed and self-organising, its smaller size means that it hasn't yet been blocked or DOSed much.

    Open Source
  • Freenet is easy to setup, provides excellent friend To Friend Sharing vs I2P, and is great for publishing content anonymously. It's quite large in size, and very slow so not the best choice for casual browsing.

About the Data: Tor

API

You can access Tor's data programmatically via our API. Simply make a GET request to:

https://api.awesome-privacy.xyz/networking/mix-networks/tor

The REST API is free, no-auth and CORS-enabled. To learn more, view the Swagger Docs or read the API Usage Guide.

About the Data

Beyond the user-submitted YAML you see above, we also augment each listing with additional data dynamically fetched from several sources. To learn more about where the rest of data included in this page comes from, and how it is computed, see the About the Data section of our About page.

Share Tor

Help your friends compare Mix Networks, and pick privacy-respecting software and services.
Share Tor and Awesome Privacy with your network!

View Mix Networks (3)