Tor based Proxying Guide
Likhith Chitneni edited this page Nov 15, 2017
·
5 revisions
Pages 34
- Home
- Auto Scraping
- Choke Groups
- COMMAND Conditional
- COMMAND Conversions
- COMMAND Execute
- COMMAND Scheduling
- COMMAND System
- COMMAND UserInterface
- Common Tasks in rTorrent
- Config Guide
- CONFIG Template
- Daemon_Mode
- Favoring group of torrents
- Installing
- IP filtering
- Issues
- LOG Logging
- Performance Tuning
- RPC Migration 0.9
- RPC Option Strings
- RPC Setup XMLRPC
- RPC Utility XMLRPC2SCGI
- rTorrent 0.9 Comprehensive Command list (WIP)
- RTorrentRatioHandling
- Scripting Guide
- TODO
- Tor based Proxying Guide
- TORRENT Watch directories
- User Guide
- Using DHT
- Using initial seeding
- Vagrant
- WikiAbout
- Show 19 more pages…
Clone this wiki locally
Instead of abusing Tor, here are some alternatives:
- The Invisible Internet Project (I2P), yet another
open-source anonymity network with similar advantages as Tor (e.g.,
cross-platform, active development, ongoing research) without the burdensome cultural
baggage and anti-P2P rhetoric. While detailed instructions for doing so exceed
the mandates of this guide, it may be pertinent to note that:
- I2P encourages torrent traffic to be routed through the I2P network.
- I2P comes bundled with a torrent-specific web client for doing so: I2PSnark.
- A variety of I2P eepsites (i.e., the I2P equivalent of Tor Hidden Services) provide PirateBay-like centralized repositories for hosting I2P-only public torrents. Common examples include:
- Vuze, the proprietary torrent client formerly known as Azureus and now functionally indistinguishable from malware-like adware, provides the I2P Helper plugin. This plugin is perhaps the only remaining reason to install Vuze. It bridges clearnet- and I2P-hosted torrents, permitting unanonymous clearnet-hosted torrents to be anonymized over I2P and anonymous I2P-hosted torrents to be deanonymized over the clearnet. No, we have no idea why anyone would want to deanonymize themselves either. Nonetheless, the former feature is awesome incarnate.
- Subscribing to a non-free anonymization service supporting both HTTP and UDP
proxying. Common examples include:
- Virtual private network (VPN) providers.
- Seedbox providers.