The starting idea comes from a colleague that asked me: “Is it possibile routing all system traffic thougth TOR, using it as a sort of VPN?”.
Yes, It’s possible, using a specific feature of Tor.
Continue reading “Tor transparent proxy on Linux: a simple implementation”
Some time ago I’ve written a post about Tor Onion Services (formerly known as hidden services), and how to host them on a spare android smartphone.
Continue reading “Easily setup a Onion Service using Docker”
How to reuse an old Android smartphone left in a drawer? Turn it into a server for the hidden web!
Continue reading “How to Host a Tor Hidden Service on a spare Android device”
TOR is an important tool.
It has its benefits and it could be the perfect way for end users to cover their tracks, but the use of this tool in a corporate network can open up organizations to some risks.
Continue reading “Tor in a company network: how to detect and block it?”