Questions tagged [proxy]
Proxy is a computer system or an application that acts as an intermediary for requests from clients seeking resources from other servers. Use SOCKS tag if your question deals with socks proxies.
174 questions
0 votes
1 answer
65 views
The verifying_key() method of Ed25519 doesn't return the true public key of a HS
The result of the verifying_key() method is VerifyingKey (PublicKey) that is not the same as the true PublicKey in the hs_ed25519_public_key file. I’ve been trying to solve this for a few days now and ...
1 vote
1 answer
123 views
help needed setting up tor2web proxy
I want to setup a tor2web proxy which will allow me to access onion sites with regular browsers[ like in the case with onionsitehere.onion.ly ] But I want to set it up locally. Is it possible to ...
0 votes
1 answer
107 views
Tor and Firebase
I’ve recently started using Tor because I live in the HK/Macau/China region (not chinese tho) and an AI chat app that I use got georestricted. I’ve been trying to get to it using VPN and Tor which ...
0 votes
1 answer
622 views
How can I get proxychains to work on Tails in 2024?
My objective is tor --> socks proxy --> destination Reason for doing this is to access sites that do not like Tor exit nodes. This is all done on Tails. I have tried running this and get the ...
0 votes
1 answer
57 views
Sharing an internet proxy as a router input
I want to share a Windows LAN proxy as input for a router. A VPN service makes this proxy. internet -> router1 -> windows -> *(proxy -> router2) -> System2 I implement the scenario with ...
0 votes
1 answer
178 views
Can't connect to Tor while on school wifi
below are the logs: 2024-01-24 17:00:42.514 [NOTICE] New control connection opened from 127.0.0.1. 2024-01-24 17:00:42.515 [NOTICE] New control connection opened from 127.0.0.1. 2024-01-24 17:00:42....
0 votes
1 answer
2k views
PERROR torsocks: socks5 libc connect: Connection refused (in socks5_connect() at socks5.c:202)
Sometimes,if not often,the IP address assigned to me by TOR does not work. Is there a way to choose the exit IP numbers where my traffic should exit the Tor network ? I've found a script that tells to ...
1 vote
1 answer
156 views
How does Tor create circuits
I was reading a proposal written by Roger and Nick about the 2nd Generation onion router and noticed that they mentioned in the previous design, onion routing could only build a circuit for every ...
0 votes
1 answer
243 views
What is the right port and IP adress for Tor proxy on Windows 10?
I would like to set up a proxy that routes my traffic through Tor and then connect to my VPN. I have already found a few threads here but with conflicting answers. In the control panel I can set up a ...
0 votes
1 answer
295 views
How to use tor browser inside a transparent proxy?
Is it possible to use tor browser inside a transparent proxy? I try to use the tor browser inside a transparent proxy but I can't, it gives an error. The transparent proxy itself works perfectly, in ...
1 vote
2 answers
940 views
Using Orbot android app as a proxy server for a windows client
This might sounds strange but right now I am using the ProtonVPN android app as follow: I connect my android device to home wifi start ProtonVpn app start Every Proxy app (usually using its HTTP ...
0 votes
1 answer
507 views
How dangerous is it to use Tor as SOCKS5 proxy for *.onion domains only
How dangerous is it to use Tor as SOCKS5 proxy for *.onion domains only (via PAC file) in a "normal" browser? I am aware that there is risk that .onion sites can still fingerprint me and/or ...
1 vote
1 answer
429 views
burpsuite onion http request intercept
I have an Onion Website, and i want to try and exploit it to find the Real IP-Address behind this Service. The problem: 'Cannot intercept Traffic from .onion' i also used this Settings in BurpSuite: ...
0 votes
1 answer
543 views
How could p2p connections work in Tor?
Besides that Tor should not be used for p2p traffic because of network congestion and possible IP leaks in BitTorrent applications, how could it work in theory? Assuming that the BitTorrent ...
0 votes
1 answer
66 views
Does a "deep inspecting" firewall or proxy at the initiator's site compromise anonymosity?
I wonder: If I use a tor connection (e.g. by using Tor Browser) on a site where there is a "deep inspecting" firewall or proxy that "breaks" SSL encryption, am I still anonymous ...