Great points raised there with your post. Thanks for the reply.
I definitely don't understand everything about Tor but I'm gradually
getting there. The public Tor entry guard relay ran great for over a
year but we ended up taking it down for a while once I realized
something was wrong with
Date: Sun, 24 May 2015 08:47:20 +1000
From: Zenaan Harkness z...@freedbms.net
3. Disable the polipo proxy on the Tor relay in your network, you do
not need that. Run a bridge instead of a relay. Make it a non public
bride (PublishServerDescriptor 0) and run Tor Browser on all the
On 5/20/15, s7r s...@sky-ip.org wrote:
On 5/20/2015 12:07 PM, Tor User wrote:
If I'm wrong about this, that's great - I'd love to see some
documentation to explain it better if you have any links handy.
But if I'm right, how can I configure our TBB clients to actually
MAKE them use our TOR
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi
Glad you understood what you are doing wrong. In this case, you can
use your relay as a guard for the clients in your network. See in my
previous email suggestion #2, and all your clients will have the
desired guard. Install Tor browser on each
Hello,
We have been operating a moderately successful public tor relay for a
while now. Having read about how TOR works back a couple of years ago, I
was more or less sold on the idea that if traffic originating on your
local network uses your own TOR relay as the first hop (entry node), then