ТОП-5 лучших эмуляторов Windows для Android. Google Chrome. Стать представителем. Tor Browser — веб-обозреватель для мобильных платформ, обеспечивающий конфиденциальность в Сети и позволяющий посещать заблокированные на территории страны ресурсы. Для скачивания нажмите на ссылку, которая находится под описанием, загрузка начнется автоматически.
This way, you can conceal your location and activity from anyone who may be watching the network. This includes concealing the websites you visit, the messages you send, and any posts you make. Many people access Tor via the free Tor browser , but this requires you to set up the browser on every single device where you access the Internet.
Open the Terminal and type the following command:. If it does install one or more updates, then reboot your Raspberry Pi by running the following command:. To check that the real tor default service is running, use the following Terminal command:. This file will now launch in the Nano text editor. You can retrieve this information by running the following Terminal command:. Take this IP address and add the port number You can retrieve this information at any point by running hostname -I in the Raspberry Pi Terminal.
In this window:. You have learned in this tutorial how to transform a Raspberry Pi into a Tor proxy server. If you find this too complicated, you can install Tor browser on your USB drive and bring it wherever you go. Alternatively you can make Tor faster with these tips. Affiliate Disclosure: Make Tech Easier may earn commission on products purchased through our links, which supports the work we do for our readers.
Skip to content. Jessica Thornsby. Jun 12, SocksPort Веб-сайты открывает, все непревзойденно. Спасибо за аннотации. Configuration file for a typical Tor user Last updated 9 October for Tor 0. Lines that begin with just " " are disabled commands: you can enable them by removing the " " symbol. Set "SocksPort 0" if you plan to run Tor only as a relay, and not make any local application connections yourself. SocksPort Default: Bind to localhost for local connections. SocksPort First entry that matches wins.
If no SocksPolicy is set, we accept all and only requests that reach a SocksPort. Untrusted users who can access your SocksPort may be able to learn about the connections you make. SocksPolicy accept Logs go to stdout at level "notice" unless redirected by something else, like one of the below lines. You can have as many Log lines as you want. We advise using "notice" in most cases, since anything more verbose may provide sensitive information to an attacker who obtains the logs.
Uncomment this to start the process in the background RunAsDaemon 1. The port on which Tor will listen for local connections from Tor controller applications, as documented in control-spec. ControlPort If you enable the controlport, be sure to enable one of these authentication methods, to prevent attackers from accessing it. Once you have configured a hidden service, you can look at the contents of the file " HiddenServicePort x y:z says to redirect requests on port x to the address y:z.
Required: what port to advertise for incoming Tor connections. Leave commented out and Tor will guess. Address noname. If you have multiple network interfaces, you can specify one for outgoing traffic to use. OutboundBindAddress Nickname ididnteditheconfig. Define these to limit how much relayed traffic you will allow. Your own traffic is still unthrottled. Note that units for these config options are bytes per second, not bits per second, and that prefixes are binary prefixes, i.
Use these to restrict the maximum traffic per day, week, or month. Note that this threshold applies separately to sent and received bytes, not to their sum: setting "4 GB" may allow up to 8 GB total before hibernating. Set a maximum of 4 gigabytes each way per period.
Administrative contact information for this relay or bridge. This line can be used to contact you if your relay or bridge is misconfigured or something else goes wrong. Note that we archive and publish all descriptors containing these lines and that Google indexes them, so spammers might also collect them.
Uncomment this to mirror directory information for others. Please do if you have enough bandwidth. DirPort what port to advertise for directory connections If you want to listen on a port other than the one advertised in DirPort e. Now you can explain what Tor is if anybody wonders why your IP address is contacting them. You declare it here so Tor clients can avoid using more than one of your relays in a single circuit.
A comma-separated list of exit policies. If certain IPs and ports are blocked externally, e.
What is an open decision? Resources What is open source? Stay on top of the latest thoughts, strategies and insights from enterprising peers. Set up a Tor proxy with Raspberry Pi to control internet traffic. Create an anonymous server and browser with these simple steps and a few pieces of affordable hardware. Register or Login to like. Image by: Opensource.
First things first: What are proxy servers, and why use them? More on Raspberry Pi. What is Raspberry Pi? SocksPort What to read next. Adding a display to a travel-ready Raspberry Pi Zero A small eInk display turns a Raspberry Pi into a self-contained, pocket-sized travel computer. How to create a vanity Tor. Raspberry Pi. Giuseppe Cassibba. Lucky husband, open source passionate. Curious by nature. Proud of my roots, happy to mix and learn from different roots.
More about me. Related Content. Control your home automation remotely with Raspberry Pi and Traefik Hub. How I get students excited about math with Python and Raspberry Pi. Location of your Mastodon instance:. Subscribe to our weekly newsletter. Easily install anything on your Pi using Pi - Apps.
Over 2 million users. Over apps including image editors, IDEs, games, web browsers, appearance themes, and more to upgrade your Raspberry Pi desktop. As far as I know there is no backup solution on the pi that also has a gui.
Awesome app pi apps by the way. Thanks you for all the work. Jump to.