Online Privacy: An introduction to TOR network and online security: How to stay anonymous in the Internet by Rowley William
Author:Rowley, William [Rowley, William]
Language: eng
Format: azw3
Published: 2015-04-27T16:00:00+00:00
Chapter 5: LongLivedPorts in Tor
After re-visiting certain websites from a different IP, you might be logged out. This feature relies on the LongLivedPorts. You can choose to add the following to the torrc which will establish connections to certain ports using the same circuit for a longer time:
LongLivedPorts 80,23,21,22,706,1863,5050,5190,5222,5223,6667,8300,8888
The services identified by these ports usually have long running connections. A good example of this is the interactive shell or the chat. Circuits for the streams using these ports usually have high-uptime nodes. This helps in keeping a node high until the stream is finished. Client and server circuits, which involve hidden services with a virtual port, contained in the list also honor this. MapAddress is a good alternative to LongLivedPorts. However, this applies only to certain sites.
With this, connections to a given site will always go through the same connection. In case you need your site to be visited through a particular country, this is a good option for you. Consider the example shown below:
MapAddress www.mywebsite.com www.mywebsite.com.node.exit
In the above example, visits to the site www.mywebsite.com will only be through node. However, this should be replaced with the node that you know, including its location. Suppose that you are the only person in use of this node, this means that when connections come from the same node, www.mywebsite.com will easily know that it is the same person.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(21441)
Hello! Python by Anthony Briggs(20695)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(19130)
Dependency Injection in .NET by Mark Seemann(18771)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(18368)
Kotlin in Action by Dmitry Jemerov(18123)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(18025)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16942)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(16863)
Grails in Action by Glen Smith Peter Ledbrook(16000)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(13715)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(11736)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(10601)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10582)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(9669)
Hit Refresh by Satya Nadella(9093)
The Kubernetes Operator Framework Book by Michael Dame(8530)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8353)
Robo-Advisor with Python by Aki Ranin(8299)