Tor: Documentation
Running Tor:
- Why should I run Tor?
- Should I run a client or a server?
- Installing Tor on Win32
- Installing Tor on Mac OS X
- Installing Tor
- Configuring a client
- Configuring a server
- Configuring a hidden service
- Setting up your own network
The design document (published at Usenix Security 2004) gives our justifications and security analysis for the Tor design:
Our follow-up paper on challenges in low-latency anonymity (still in draft form) details more recent experiences and directions: PDF version.
The specification aims to give developers enough information to build a compatible version of Tor:
The manual provides detailed instructions for how to install and use Tor, including configuration of client and server options.
Look at the slides from the 21C3 talk. For something more obsolete, look at the slides from the Codecon 2004 talk, or listen to the audio from the talk.
Guide to Tor-ifying various applications
Running Tor in a chroot, and another chroot guide for OpenBSD.