Tor (dn42 mirror) is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.
Tor bridges allow for the Tor client to connect to a specific IP address and validate the fingerprint to permit safe connections into the Tor network for networks that do not directly access the public Internet, for example hosts that only have dn42 connections. The following bridges are currently available for use:
|photon.flat.dn42:8443||500kBfirstname.lastname@example.org||obfs4||83B02FB88253A7FD313B7912B12B05AF2A42D3B9||Limited to 100GB transfer per week|
There is an anycast address, 172.22.0.94 and fd42:d42:d42:9001::1 aka tor.dn42, that provides the following services:
It should be noted that the host providing the SOCKS services is able to see all of the traffic going through it, you will not be protected for the portion of the journey between your machine and the Tor service. There is also no guarantee that the SOCKS proxy even provides a Tor service, it may simply just be a SOCKS proxy and you have no means by which to verify it.
There is also unfortunately no means by which to tell Tor to use a specific IP address as the entry point for a plain relay and while in theory you could connect to the ORPort and have a safe connection to Tor, there is no configuration option available for this.
Note that the same warnings above also apply to the following proxies.
Last edited by KIOUBIT-MNT, 2021-06-01 15:29:59