![]() This would require the use of the control_auth_cookie (CookieAuthentication) or HashedControlPassword, and about:config _tor=false. Repeat 3-10 for each Tor Browser folderĪlternatively, this might be possible with a single Tor instance as the SocksPort and ControlPort.Optional: Turn on “Forbid Scripts Globally” in NoScript for further security and privacy (also reduces browser fingerprint).Add all the new SocksPort and ControlPort to the list (Copy the ports from other Tor Browsers) Type “banned" and modify the ports of the two entries.Optional: Test your browser fingerprint at.Optional: Go to for IP, DNS, Geolocation, Browser and other info.Note: It may not say that you are using Tor, but this is incorrect. Test should be all green and orange except Tab name. Homepage (about:tor) should say "Congratulations!".Launch Tor Browser, and check that everything was configured correctly.Change ControlPort to what you set in step 4.Change SocksPort to what you set in step 5.Edit torrc-defaults in Browser\TorBrowser\Data\Tor.Modify _privoxy to false (doesn't exist on newer versions). ![]() ![]() Modify _applied to false (doesn't exist on newer versions).Modify _host (on newer versions this is ) to 127.0.0.1.Modify _port (on newer versions this is _port) to a new port (eg.Edit TorButton Preferences (without the GUI ).Modify _port to a new ControlPort (eg.Make copies of the Tor Browser folder with different names (eg.Optional: Download, verify, and install Tor Browser.However, someone should confirm that I haven't missed anything that could compromise TBs security. This ensures that the Tor Browsers are fully functional, portable, and self-contained. This method launches multiple Tor instances, each with its own SocksPort and ControlPort.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |