Miscel·lània
Els fitxers del meu ordinador s'han blocat i algú demana que baixi el navegador Tor per pagar un rescat pels meus fitxers.
Ho sentim molt, però ha estat infectat amb programari maliciós. El projecte Tor no ha creat aquest programari maliciós. Els autors del programari maliciós us demanen que baixeu el navegador Tor probablement per contactar-los de forma anònima amb el rescat que us demanen.
Si aquesta és la primera introducció al navegador Tor, entenem que podríeu pensar que som persones dolentes que habilitem persones encara pitjors.
Però consideri que el nostre programari s'utilitza diàriament per a diversos propòsits per activistes de drets humans, periodistes, supervivents de violència domèstica, denunciants, agents de policia i molts altres. Malauradament, la protecció que el nostre programari pot proporcionar a aquests grups de persones també pot ser maltractat pels criminals i els autors de malware. El projecte Tor no dona suport ni excusa l'ús del nostre programari per a fins maliciosos.
Puc utilitzar el logotip Tor al meu producte?
You can read all about that on our Trademark faq page.
How do I check if my application that uses SOCKS is leaking DNS requests?
Even if your application is using the correct variant of the SOCKS protocol, there is still a risk that it could be leaking DNS queries. This problem happens in Firefox extensions that resolve the destination hostname themselves, for example to show you its IP address, what country it's in, etc. If you suspect your application might behave like this, follow the instructions below to check.
- Add
TestSocks 1
to your torrc file. - Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 server (
socks5://127.0.0.1:9050
by default). - Watch your logs as you use your application. For each socks connection, Tor will log a
notice
for safe connections, and awarn
for connections leaking DNS requests.
If you want to automatically disable all connections leaking DNS requests, set SafeSocks 1
in your torrc file.
Per què no impedeix que persones dolentres puguin fer coses dolentes quan utilitzeu Tor?
Tor està dissenyat per defensar els drets humans i la privadesa evitant que ningú censuri coses, fins i tot nosaltres. Odiem que hi ha algunes persones que utilitzen Tor per fer coses terribles, però no podem fer res per desfer-se'n sense que també perjudiquem als activistes de drets humans, periodistes, superviventgs d'abusos i altres persones que utilitzen Tor per a coses bones. Si volguéssim blocar determinades persones d'utilitzar Tor, bàsicament hauríem afegit una porta del darrere al programari, que obriria als nostres usuaris vulnerabilitats, atacs de mals règims i altres adversaris.
Tor manté els registres?
Tor no guarda registres que puguin identificar un usuari concret. Realitzem mesures segures sobre com funciona la xarxa, que podeu consultar a Tor Metrics.
Tinc problemes per actualitzar o utilitzar Vidalia.
Vidalia ja no es manté o és suportat. Una gran part de les funcions que Vidalia ofereix ara s'ha integrat al propi navegador Tor.
Puc canviar la quantitat de salts que utilitza Tor?
Ara mateix, la longitud de la ruta està codificada a 3 punts més el nombre de nodes sensibles de la vostra ruta. És a dir, en casos normals és de 3, però per exemple si accediu a un servei de onion o una adreça ".exit", podria ser més.
No volem encoratjar a les persones a utilitzar trajectes més llargs que això, ja que augmenta la càrrega a la xarxa sense (en la mesura que podem dir) que proporcioni més seguretat. A més, l'ús de rutes de més de 3 pot fer malbé l'anonimat, primer, perquè facilita els atacs de denegació de seguretat i, en segon lloc, perquè podria actuar com a identificador si només un petit nombre d'usuaris tenen la mateixa longitud de camí.
Té el Projecte Tor cap aplicació per a conversar de manera privada?
No. After eleven beta releases, we discontinued support of Tor Messenger. Encara creiem en la capacitat de Tor d'utilitzar-se en una aplicació de missatgeria, però no tenim els recursos per fer-ho en aquest moment. Do you? Contact us.
How to Report a Bug or Give Feedback
El Tor es recolza en el suport d'usuaris i voluntaris d'arreu del món per a ajudar-nos a millorar el nostre programari i recursos. Així doncs, apreciem molt els vostres comentaris (nosaltres i tots els usuaris del Tor).
Feedback template
When sending us feedback or reporting a bug, please include as many of these as possible:
- Operating System you are using
- Tor Browser version
- Tor Browser Security Level
- Step by step of how you got to the issue, so we can reproduce it (e.g. I opened the browser, typed a url, clicked on (i) icon, then my browser crashed)
- A screenshot of the problem
- The log
How to Reach Us
There are several ways to reach us, so please use what works best for you.
Tor Forum
We recommend asking for help on the Tor Forum. You will need to create an account to submit a new topic. Before you ask, please review our discussion guidelines. At the moment, for the fastest response, please write in English. If you found a bug, please use GitLab.
GitLab
First, check if the bug is already known. You can search and read all the issues at https://gitlab.torproject.org/. To create a new issue, please request a new account to access Tor Project's GitLab instance and find the right repository to report your issue. We track all Tor Browser related issues at Tor Browser issue tracker. Issues related to our websites should be filed under the Web issue tracker.
Send us an email to frontdesk@torproject.org
In the subject line of your email, please tell us what you're reporting. The more specific your subject line is (e.g. "Connection failure", "feedback on website", "feedback on Tor Browser, "I need a bridge"), the easier it will be for us to understand and follow up. Sometimes when we receive emails without subject lines, they're marked as spam and we don't see them.
For the fastest response, please write in English, Spanish, and/or Portuguese if you can. If none of these languages works for you, please write in any language you feel comfortable with, but keep in mind it will take us a bit longer to answer as we will need help with translation to understand it.
Blog post comments
You can always leave comments on the blog post related to the issue or feedback you want to report. If there is not a blog post related to your issue, please contact us another way.
IRC
You can find us in the #tor channel on OFTC to give us feedback or report bugs/issues. We may not respond right away, but we do check the backlog and will get back to you when we can.
Learn how to connect to OFTC servers.
Email Lists
For reporting issues or feedback using email lists, we recommend that you do so on the one that is related to what you would like to report. A complete directory of our mailing lists can be found here.
For feedback or issues related to Tor Browser, Tor network or other projects developed by Tor: tor-talk
For feedback or issues related to our websites: ux
For feedback or issues related to running a Tor relay: tor-relays
For feedback on content related to Tor Browser Manual or Support website: tor-community-team
Report a security issue
If you've found a security issue in one of our projects or in our infrastructure, please email tor-security@lists.torproject.org. If you've found a security bug in Tor or Tor Browser, feel free to submit it for our bug bounty program. Si voleu xifrar el vostre correu, podeu obtenir la clau GPG pública de la llista si contacteu amb tor-security-sendkey@lists.torproject.org o des de pool.sks-keyservers.net. Aquí teniu l'empremta:
gpg --fingerprint tor-security@lists.torproject.org
pub 4096R/1A7BF184 2017-03-13
Key fingerprint = 8B90 4624 C5A2 8654 E453 9BC2 E135 A8B4 1A7B F184
uid tor-security@lists.torproject.org
uid tor-security@lists.torproject.org
uid tor-security@lists.torproject.org
sub 4096R/C00942E4 2017-03-13
Com puc compartir fitxers de forma anònima a través de Tor?
For sharing files over Tor, OnionShare is a good option. OnionShare is an open source tool for securely and anonymously sending and receiving files using Tor onion services. It works by starting a web server directly on your computer and making it accessible as an unguessable Tor web address that others can load in Tor Browser to download files from you, or upload files to you. It doesn't require setting up a separate server, using a third party file-sharing service, or even logging into an account.
Unlike services like email, Google Drive, DropBox, WeTransfer, or nearly any other way people typically send files to each other, when you use OnionShare you don't give any companies access to the files that you're sharing. So long as you share the unguessable web address in a secure way (like pasting it in an encrypted messaging app), no one but you and the person you're sharing with can access the files.
OnionShare is developed by Micah Lee.
Molts nodes de sortida es configuren per blocar certs tipus de trànsit per compartir fitxers, com ara BitTorrent. BitTorrent in particular is not anonymous over Tor.
Com puc donar diners al projecte Tor?
Gràcies pel teu suport! Podeu trobar més informació sobre la donació a les nostres preguntes freqüents sobre els donants.
Qui finança Tor?
Tor està finançat per diversos patrocinadors, incloent agències federals nord-americanes, fundacions privades i donants individuals. Check out a list of all our sponsors and a series of blog posts on our financial reports.
We feel that talking openly about our sponsors and funding model is the best way to maintain trust with our community. Sempre busquem més diversitat en les nostres fonts de finançament, especialment de fundacions i particulars.
Puc utilitzar Tor amb BitTorrent?
No recomanem utilitzar Tor amb BitTorrent. Per obtenir més informació, consulteu la nostra publicació de bloc sobre el tema.
El projecte Tor ofereix allotjament?
No,el projecte Tor no ofereix serveis d'allotjament?
Tor Project ofereix serveis de correu electrònic o altres serveis web que protegeixen la privacitat?
No, no oferim cap servei en línia. Podeu trobar una llista de tots els nostres projectes de programari a la nostra pàgina de projectes.
Com puc participar voluntariament amb Tor Project?
Please see our community page for how to get involved!
Tinc un motiu important per rastrejar un usuari de Tor. Em podeu ajudar?
No hi ha res que els desenvolupadors de Tor puguin fer per rastrejar els usuaris de Tor. Les mateixes proteccions que eviten que les persones dolentes frenin l'anonimat de Tor també ens impedeix rastrejar els usuaris.
You should hide the list of Tor relays, so people can't block the exits.
There are a few reasons we don't:
- We can't help but make the information available, since Tor clients need to use it to pick their paths. So if the "blockers" want it, they can get it anyway. Further, even if we didn't tell clients about the list of relays directly, somebody could still make a lot of connections through Tor to a test site and build a list of the addresses they see.
- If people want to block us, we believe that they should be allowed to do so. Obviously, we would prefer for everybody to allow Tor users to connect to them, but people have the right to decide who their services should allow connections from, and if they want to block anonymous users, they can.
- Being blockable also has tactical advantages: it may be a persuasive response to website maintainers who feel threatened by Tor. Giving them the option may inspire them to stop and think about whether they really want to eliminate private access to their system, and if not, what other options they might have. The time they might otherwise have spent blocking Tor, they may instead spend rethinking their overall approach to privacy and anonymity.