Tor
torproject.orgTor provides robust anonymity, allowing you to defend against surveillance, circumvent censorship and reduce tracking. It blocks trackers, resists fingerprinting and implements multi-layered encryption by default, meaning you can browse freely. Tor also allows access to OnionLand: hidden services.
- Homepage: torproject.org
- GitHub: github.com/torproject/tor
- Privacy: tosdr.org/en/service/2845
- Web info: web-check.xyz/results/torproject.org
Tor Privacy Policy
Privacy Policy Summary
- Your personal data is not sold
- An anonymous payment method is offered
- You can access most of the pages on the service's website without revealing any personal information
Score
Documents
- Donor Privacy PolicyCreated 18 Mar 21, Last modified 3 years ago
Domains Covered by Policy
- torproject.org
- dgvdmophvhunawds.onion
- expyuzz4wqqyqhjn.onion
- 3gldbgtv5e4god56.onion
About the Data
This data is kindly provided by tosdr.org. Read full report at: #2845
Tor Source Code
Author
Description
unofficial git repo -- report bugs/issues/pull requests on https://gitlab.torproject.org/ --
Homepage
https://gitweb.torproject.org/tor.gitLicense
Created
05 Jun 13
Last Updated
03 Oct 24
Latest version
Primary Language
Size
185,680 KB
Stars
4,426
Forks
938
Watchers
4,426
Language Usage
Star History
Top Contributors
- @nmathewson (20512)
- @dgoulet-tor (2031)
- @teor2345 (1944)
- @asn-d6 (1043)
- @shahn (503)
- @rl1987 (489)
- @ahf (462)
- @puellavulnerata (417)
- @kloesing (374)
- @rransom8774 (233)
- @neelchauhan (195)
- @tlyu (166)
- @isislovecruft (147)
- @dgoulet (94)
- @sjmurdoch (86)
- @Yawning (77)
- @cristiantoader (73)
- @juga0 (49)
- @ln5 (48)
- @Jigsaw52 (47)
- @ioerror (47)
- @pastly (46)
- @emanchado (45)
- @chelseakomlo (44)
- @ppopth (42)
- @olabini (37)
- @Hello71 (30)
- @Phoul (25)
- @ffmancera (25)
- @arlolra (22)
Recent Commits
- Micah Anderson (05 Mar 24)
Replace code and update README.md for current location of project.
- David Goulet (19 Jun 23)
Merge branch 'maint-0.4.7'
- David Goulet (15 Jun 23)
Change git.tpo URLs to gitlab.tpo Signed-off-by: David Goulet <[email protected]>
- David Goulet (19 Jun 23)
Use the new Stem repository on Gitlab Signed-off-by: David Goulet <[email protected]>
- David Goulet (15 Jun 23)
Merge branch 'tor-gitlab/mr/722'
- David Goulet (15 Jun 23)
Change git.tpo URLs to gitlab.tpo Signed-off-by: David Goulet <[email protected]>
- Mike Perry (15 Jun 23)
Changes file for Bug 40811
- Mike Perry (15 Jun 23)
Bug 40811: Count conflux leg launch attempts early. Also, double check that the consensus has enough overall exits before attempting conflux set launch.
- David Goulet (14 Jun 23)
Merge branch 'tor-gitlab/mr/721'
- Mike Perry (13 Jun 23)
Changes file for bug40810
- Mike Perry (13 Jun 23)
Bug 40810: Avoid using 0 RTT legs
- Mike Perry (10 Jun 23)
Bug 40810: Improve validation checks to ignore 0-RTT legs Also add calls to dump the legs of a conflux set if we have too many
- David Goulet (13 Jun 23)
Merge branch 'tor-gitlab/mr/715'
- Mike Perry (09 Jun 23)
Bug 40801: Add changes file
- Mike Perry (09 Jun 23)
Bug 40801: Do not change read state of marked conns
- Mike Perry (08 Jun 23)
Bug 40801: Send LINKED_ACK before attaching streams Otherwise, the BEGIN cell arrives at the exit before it has an RTT, and then it does not know which circuit to prefer in response.
- Mike Perry (06 Jun 23)
Add BUG() macro to marked edge reads This will give us a full stacktrace.
- Mike Perry (30 Mar 23)
Add conflux logs to diagnose cases where RTTs are absent/zero.
- Neel Chauhan (07 Jun 23)
Fix the spacing in the 'Your Tor identity key fingerprint is' log line'
- Mike Perry (06 Jun 23)
Add a conflux helper to log conflux sets.
- Micah Elizabeth Scott (01 Jun 23)
More fixes for compile-time warnings in equix and hashx This addresses issue #40800 and a couple other problems I noticed while trying to reproduce that one. The original issue is just a missing cast to void* on the args of __builtin___clear_cache(), and clang is picky about the implicit cast between what it considers to be char of different signedness. Original report is from MacOS but it's also reproducible on other clang targets. The cmake-based original build system for equix and hashx was a handy way to run tests, but it suffered from some warnings due to incorrect application of include_directories(). And lastly, there were some return codes from hashx_exec() that get ignored on equix when asserts are disabled. It bugged me too much to just silence this with a (void) cast, since even though this is in the realm of low-likelyhood programming errors and not true runtime errors, I don't want to make it easy for the hashx_exec() wrappers to return values that are dangerously wrong if an error is ignored. I made sure that even if asserts are disabled, we return values that will cause the solver and verifier to both fail to validate a potential solution. Signed-off-by: Micah Elizabeth Scott <[email protected]>
- Tor CI Release (01 Jun 23)
version: Bump version to 0.4.8.1-alpha-dev
- Tor CI Release (01 Jun 23)
version: Bump version to 0.4.8.1-alpha
- Tor CI Release (01 Jun 23)
release: ChangeLog for 0.4.8.1-alpha
- Tor CI Release (01 Jun 23)
fallbackdir: Update list generated on June 01, 2023
- Tor CI Release (01 Jun 23)
Update geoip files to match ipfire location db, 2023/06/01.
- David Goulet (01 Jun 23)
scripts: Use latest geoip database instead of using location Signed-off-by: David Goulet <[email protected]>
- David Goulet (01 Jun 23)
test: Really fix the mem leak from prior commit Signed-off-by: David Goulet <[email protected]>
- David Goulet (01 Jun 23)
test: Fix a mem leak reported by Coverity Here is the report: *** CID 1531835: Resource leaks (RESOURCE_LEAK) /src/test/test_crypto_slow.c: 683 in test_crypto_equix() 677 678 /* Solve phase: Make sure the test vector matches */ 679 memset(&output, 0xa5, sizeof output); 680 equix_result result; 681 result = equix_solve(solve_ctx, challenge_literal, 682 challenge_len, &output); >>> CID 1531835: Resource leaks (RESOURCE_LEAK) >>> Variable "solve_ctx" going out of scope leaks the storage it points to. Signed-off-by: David Goulet <[email protected]>
- David Goulet (31 May 23)
Merge branch 'maint-0.4.7'
Tor Website
Website
Tor Project | Anonymity Online
Anonymity Online | Defend yourself against tracking and surveillance. Circumvent censorship.
Redirects
Does not redirect
Security Checks
All 66 security checks passed
Server Details
- IP Address 204.8.99.146
- Hostname web-dal-08.torproject.org
- Location Winchester, New Hampshire, United States of America, NA
- ISP The Tor Project Inc.
- ASN AS62744
Associated Countries
- SE
- US
- DE
Saftey Score
Website marked as safe
100%
Blacklist Check
www.torproject.org was found on 0 blacklists
- ThreatLog
- OpenPhish
- PhishTank
- Phishing.Database
- PhishStats
- URLhaus
- RPiList Not Serious
- AntiSocial Blacklist
- PhishFeed
- NABP Not Recommended Sites
- Spam404
- CRDF
- Artists Against 419
- CERT Polska
- PetScams
- Suspicious Hosting IP
- Phishunt
- CoinBlockerLists
- MetaMask EthPhishing
- EtherScamDB
- EtherAddressLookup
- ViriBack C2 Tracker
- Bambenek Consulting
- Badbitcoin
- SecureReload Phishing List
- Fake Website Buster
- TweetFeed
- CryptoScamDB
- StopGunScams
- ThreatFox
- PhishFort
Website Preview
Tor Docker
Container Info
qbittorrent
The qBittorrent project aims to provide an open-source software alternative to µTorrent. qBittorrent is based on the Qt toolkit and libtorrent-rasterbar library.
DockerHub Metrics
- Pull Count 310,177,176
- Stars 1,422
- Date Created 19 May 17
- Last Updated 1 month ago
View on DockerHub
linuxserver/qbittorrentRun Command
docker run -d \ -p 6881:6881/tcp \ -p 6881:6881/udp \ -p 8080:8080/tcp \ -e PUID=${PUID} \ -e PGID=${PGID} \ -v /portainer/Files/AppData/Config/qBittorrent:/config \ -v /portainer/Downloads:/downloads \ --restart=unless-stopped \ linuxserver/qbittorrent:latest
Compose File
version: 3.8 services: qbittorrent: image: linuxserver/qbittorrent:latest ports: - 6881:6881:tcp - 6881:6881:udp - 8080:8080:tcp environment: PUID: 1000 PGID: 100 volumes: - /portainer/Files/AppData/Config/qBittorrent:/config - /portainer/Downloads:/downloads restart: unless-stopped
Environment Variables
- Var Name Default
- PUID 1000
- PGID 100
Port List
- 6881:6881/tcp
- 6881:6881/udp
- 8080:8080/tcp
Volume Mounting
- /portainer/Files/AppData/Config/qBittorrent /config
- /portainer/Downloads /downloads
Permissions
- read ✅ Yes
- write ✅ Yes
- admin ✅ Yes
Tor Reviews
More Mix Networks
-
I2P offers great generic transports, it is well geared towards accessing hidden services, and has a couple of technical benefits over Tor: P2P friendly with unidirectional short-lived tunnels, it is packet-switched (instead of circuit-switched) with TCP and UDP, and continuously profiles peers, in order to select the best performing ones. I2P is less mature, but fully-distributed and self-organising, its smaller size means that it hasn't yet been blocked or DOSed much.
-
Freenet is easy to setup, provides excellent friend To Friend Sharing vs I2P, and is great for publishing content anonymously. It's quite large in size, and very slow so not the best choice for casual browsing.
About the Data: Tor
API
You can access Tor's data programmatically via our API.
Simply make a GET
request to:
https://api.awesome-privacy.xyz/networking/mix-networks/tor
The REST API is free, no-auth and CORS-enabled. To learn more, view the Swagger Docs or read the API Usage Guide.
About the Data
Beyond the user-submitted YAML you see above, we also augment each listing with additional data dynamically fetched from several sources. To learn more about where the rest of data included in this page comes from, and how it is computed, see the About the Data section of our About page.
Share Tor
Help your friends compare Mix Networks, and pick privacy-respecting software and services.
Share Tor and Awesome Privacy with your network!