Table of Contents
Running Tor
- Why should I run Tor?
- Should I run a client or a server?
- Installing Tor on Win32
- Installing Tor on Mac OS X
- Installing Tor
- Configuring a client
- Configuring a server
- Configuring a hidden service
- Setting up your own network
Design Documents
The design document (published at Usenix Security 2004) gives our justifications and security analysis for the Tor design:
Our follow-up paper on challenges in low-latency anonymity (still in draft form) details more recent experiences and directions: PDF version.
The specification aims to give developers enough information to build a compatible version of Tor:
The manual for the latest stable version
provides detailed instructions for how to install and use Tor, including configuration
of client and server options.
If you are running the CVS version the manual is available
here.
Look at the slides from the 21C3 talk, and listen to the audio from the talk.
Various HOWTO Docs
Guide to Tor-ifying various applications
How to Run a Secure Tor Server
Running Tor in a Linux chroot, and chroot guide for OpenBSD.
Mailing List Information
- The or-announce mailing list is a low volume list for announcements of new releases.
- The or-dev mailing list is for posting by developers only and is where we send notifications of prereleases and release candidates.
- The or-talk mailing list is where a lot of the discussion happens.
- There's also a list for cvs commits.