Search engines google are basically unusable. While it definitely hides the users, there is no real way to determine its security. We have no idea who is running the exit nodes, monitoring the traffic, etc. Furthermore; tor users are deemed as suspicious. Last edited: Jun 26, Joined: Apr 12, Posts: 48 Location: Behind you. I certainly see good uses for Tor, but I have to agree with nerdstein that Tor is very slow.
But I think this is a problem that will resolve itself once more Tor nodes are added. JohnMatrix , Jun 27, Joined: Mar 22, Posts: 2, Joined: Feb 7, Posts: 1, Taliscicero , Jun 27, Joined: Jun 24, Posts: 2. Show Ignored Content. Your username or email address: Do you already have an account? No, create an account now. I hope this is hepful, and if you have any questions or corrections feel free to leave a comment below! James Russo Engineering at Brex Fullstack engineer who knows nothing about design.
Edited based on concerns Disclaimer I do not condone the use of this information for creating illegal web crawlers. ControlPort CookieAuthentication 1. Configuration file for a typical Tor user Last updated 22 December for Tor 0. Lines that begin with just " " are disabled commands: you can enable them by removing the " " symbol.
First entry that matches wins. You can have as many Log lines as you want. We advise using "notice" in most cases, since anything more verbose may provide sensitive information to an attacker who obtains the logs. ControlPort If you enable the controlport, be sure to enable one of these authentication methods, to prevent attackers from accessing it. HiddenServicePort x y:z says to redirect requests on port x to the address y:z. Required: what port to advertise for incoming Tor connections.
Leave commented out and Tor will guess. Address noname. If you do not wish to differentiate, use OutboundBindAddress to specify the same address for both in a single line. OutboundBindAddressExit Nicknames must be between 1 and 19 characters inclusive, and must contain only the characters [a-zA-Z]. If not set, "Unnamed" will be used. Nickname ididnteditheconfig Define these to limit how much relayed traffic you will allow.
Your own traffic is still unthrottled. Note that RelayBandwidthRate must be at least 75 kilobytes per second. Note that units for these config options are bytes per second , not bits per second , and that prefixes are binary prefixes, i. Note that this threshold applies separately to sent and received bytes, not to their sum: setting "40 GB" may allow up to 80 GB total before hibernating.
Set a maximum of 40 gigabytes each way per period. AccountingMax 40 GBytes Each period starts daily at midnight AccountingMax is per day AccountingStart day Each period starts on the 3rd of the month at AccountingMax is per month AccountingStart month 3 Administrative contact information for this relay or bridge.
This line can be used to contact you if your relay or bridge is misconfigured or something else goes wrong. Note that we archive and publish all descriptors containing these lines and that Google indexes them, so spammers might also collect them. If you are running multiple relays, you MUST set this option. Please do if you have enough bandwidth. DirPort what port to advertise for directory connections If you want to listen on a port other than the one advertised in DirPort e.
Now you can explain what Tor is if anybody wonders why your IP address is contacting them. You declare it here so Tor clients can avoid using more than one of your relays in a single circuit. Note: do not use MyFamily on bridge relays. Relays allow exit traffic by default.
ExitRelay 0 Uncomment this if you want your relay to allow IPv6 exit traffic. Relays only allow IPv4 exit traffic by default. IPv6Exit 1 A comma-separated list of exit policies. If certain IPs and ports are blocked externally, e.