[ stealthprivacy.eu ]

About

// WHAT IS TOR?

The Tor Project is a non-profit organization conducting research and development into online privacy and anonymity.

// WHY IS IT IMPORTANT?

In an age of surveillance capitalism and increasing internet censorship, Tor provides a vital lifeline for journalists, activists, and ordinary citizens to access the open internet without fear of surveillance or retribution. It protects the human right to privacy in the digital age.

// BRIDGE & RELAY TYPES

OBFS4 Bridges

Obfs4 bridges are Tor relays that try to make Tor traffic look like random unreadable data. This makes it difficult for censors to identify and block the connection.

WebTunnel

WebTunnel wraps Tor traffic in HTTPS, making it appear as if the user is simply browsing a normal website. This is highly effective against sophisticated censorship systems that allow HTTPS traffic.

Snowflake

Snowflake uses temporary WebRTC proxies (often run by volunteers in their browser) to connect users to the Tor network. It's like a peer-to-peer entry point that is very hard to block completely.

Guard Relays

Guard relays are the first hop in a Tor circuit. Your Tor client selects a small set of guard relays and uses them consistently for several months. This protects against certain timing attacks by limiting the entry points to the network.

Middle Relays

Middle relays pass traffic between other relays in the network. They don't see the source or destination of the traffic, only the previous and next hop, ensuring anonymity.

Exit Relays

Exit relays are the final hop in the Tor circuit. They send traffic out to the destination website. The destination sees the exit relay's IP address instead of the user's.

// OBFUSCATION MODES (IAT)

Inter-Arrival Time (IAT) obfuscation changes the timing between packets to defeat traffic analysis algorithms that try to identify Tor traffic based on timing patterns.


iat-mode=0 (Disabled)

No additional timing obfuscation is applied. This offers the best performance and is suitable for most users where deep packet inspection is less sophisticated.


iat-mode=1 (Enabled)

Adds random delays to packet timing. This makes traffic analysis more difficult for censors but has a minor impact on throughput.


iat-mode=2 (Paranoid)

Adds significant random delays and padding. This provides the highest level of resistance against sophisticated traffic analysis. Bridges marked with the MAX_PRIVACY tag use this mode. Note that this mode impacts connection speed the most.

// MISSION STATEMENT

This initiative is driven by a commitment to digital freedom and a desire to give back to the global community. The primary goal is to provide reliable access to the open internet for individuals living under restrictive network environments, ensuring that information remains accessible to all.

// DONATIONS

If you'd like to support the operation of these nodes, consider donating.


Monero / XMR : 42whZjNSwLSZ7vtYXwUTUZd8xmNWa8EzYhfCBDYMP5jkgn3orztgUjvaZ5CCZuWqmaPgTMBRFdVASjesq3g4KWfKEEqwgbZ
Litecoin / LTC : LRisSqwatDjNDY5Cf7QNcKKjk89riq4VbX

// CONTACT

For inquiries, private bridges, or just to say hi:


Email: tor[at]stealthprivacy.de