Home > IT, Tools > TorPark – Be Anonymous from Windows

TorPark – Be Anonymous from Windows

February 14th, 2006 Leave a comment Go to comments

Hey Hey,

I'm stealing this from a post on AntiOnline.com by Irongeek. It looks like quite the cool product... Tor (Onion Router software) + Firefox (Web Browser) that will fit on a usb memory key. Now you can be anonymous from anywhere, on Windows... without admin access. I'm not in the testing mood right now... I plan to test it later, however I'm so busy right now that I don't have time to test... testing will come in the future, after I've moved and changed jobs...

In the mean time check it out @ http://www.freehaven.net/~arrakis/ and report back and let the rest of our readers know how it works.

Peace,
HT

Categories: IT, Tools Tags:
  1. February 15th, 2006 at 19:14 | #1

    I tried this out, and was rather impressed with it. The whole package takes about 20MB unzipped. There were no traces of the program running left in the registry, and no files were placed anywhere else on the system.

    The traffic is indeed encrypted between you and the Tor entry server. I also wanted to see if anything showed up in the web proxy logs (Irun a transparent proxy). No suprise there, nothing showed up, since of course all the traffic is going to port 9001 and is therefore not redirected to the proxy.

    I did catch one conversation that wasn’t encrypted, though. I don’t know why. Perhaps it defaults to no encryption if on of the servers on the circuit doesn’t support it? Couldn’t find an option to enforce the use of encryption, though, nor could I find any way to choose which encryption to use.

    One thing it’s missing is the ability to exlude certain entry servers from the selection algorithm. If the NSA happens to be running a Tor server, and I feel the need to go through Tor to hide my tracks, I really *don’t* want my traffic going to the NSA (or CSIS).

    I also would have liked to have seen some sort of speed measurement, whereby I would be able to test several curcuits out before selecting one. But the biggest problem I had was in making the initial conection to the entry server. Three times out of four starting the TorPark browser I was denied the connection, or it timed out.

    The really nice parts are the ability to force an IP change, or rather, to switch circuits and use a different exit server, anytime you wish, and you are also able to force IP changes at an interval of between 17 and 1422 minutes, so your IP changes automagically. That option might create problems with some authentication schemes, though, so by default, your exit server does not change regularly. You can even randomize your browser name and change the user-agent string easily through the extensions menu.

    All in all, a very well written and convenient application, although it can definitely be expanded on and improved.

  2. Erik
    March 7th, 2008 at 10:13 | #2

    I cant get it to work keps saying connecting T or curcuit… wont go beyond that point ever!!

  1. No trackbacks yet.