Miscel·lània

No recomanem utilitzar Tor amb BitTorrent. Per obtenir més informació, consulteu la nostra publicació de bloc sobre el tema.

Ho sentim molt, però ha estat infectat amb programari maliciós. El projecte Tor no ha creat aquest programari maliciós. Els autors del programari maliciós us demanen que baixeu el navegador Tor probablement per contactar-los de forma anònima amb el rescat que us demanen.

Si aquesta és la primera introducció al navegador Tor, entenem que podríeu pensar que som persones dolentes que habilitem persones encara pitjors.

Però consideri que el nostre programari s'utilitza diàriament per a diversos propòsits per activistes de drets humans, periodistes, supervivents de violència domèstica, denunciants, agents de policia i molts altres. Malauradament, la protecció que el nostre programari pot proporcionar a aquests grups de persones també pot ser maltractat pels criminals i els autors de malware. El projecte Tor no dona suport ni excusa l'ús del nostre programari per a fins maliciosos.

Ara mateix, la longitud de la ruta està codificada a 3 punts més el nombre de nodes sensibles de la vostra ruta. És a dir, en casos normals és de 3, però per exemple si accediu a un servei de onion o una adreça ".exit", podria ser més.

No volem encoratjar a les persones a utilitzar trajectes més llargs que això, ja que augmenta la càrrega a la xarxa sense (en la mesura que podem dir) que proporcioni més seguretat. A més, l'ús de rutes de més de 3 pot fer malbé l'anonimat, primer, perquè facilita els atacs de denegació de seguretat i, en segon lloc, perquè podria actuar com a identificador si només un petit nombre d'usuaris tenen la mateixa longitud de camí.

No hi ha res que els desenvolupadors de Tor puguin fer per rastrejar els usuaris de Tor. Les mateixes proteccions que eviten que les persones dolentes frenin l'anonimat de Tor també ens impedeix rastrejar els usuaris.

Tor està dissenyat per defensar els drets humans i la privadesa evitant que ningú censuri coses, fins i tot nosaltres. Odiem que hi ha algunes persones que utilitzen Tor per fer coses terribles, però no podem fer res per desfer-se'n sense que també perjudiquem als activistes de drets humans, periodistes, superviventgs d'abusos i altres persones que utilitzen Tor per a coses bones. Si volguéssim blocar determinades persones d'utilitzar Tor, bàsicament hauríem afegit una porta del darrere al programari, que obriria als nostres usuaris vulnerabilitats, atacs de mals règims i altres adversaris.

El Tor es recolza en el suport d'usuaris i voluntaris d'arreu del món per a ajudar-nos a millorar el nostre programari i recursos. Així doncs, apreciem molt els vostres comentaris (nosaltres i tots els usuaris del Tor).

Feedback template

When sending us feedback or reporting a bug, please include as many of these as possible:

  • Operating System you are using
  • Tor Browser version
  • Tor Browser Security Level
  • Step by step of how you got to the issue, so we can reproduce it (e.g. I opened the browser, typed a url, clicked on (i) icon, then my browser crashed)
  • A screenshot of the problem
  • The log

How to Reach Us

There are several ways to reach us, so please use what works best for you.

Tor Forum

We recommend asking for help on the Tor Forum. You will need to create an account to submit a new topic. Before you ask, please review our discussion guidelines. At the moment, for the fastest response, please write in English. If you found a bug, please use GitLab.

GitLab

First, check if the bug is already known. You can search and read all the issues at https://gitlab.torproject.org/. To create a new issue, please request a new account to access Tor Project's GitLab instance and find the right repository to report your issue. We track all Tor Browser related issues at Tor Browser issue tracker. Issues related to our websites should be filed under the Web issue tracker.

Telegram

If you need help installing or troubleshooting Tor Browser and the Tor Forum is blocked or censored where you are, you can reach out to us on Telegram https://t.me/TorProjectSupportBot. A Tor support specialist will assist you.

WhatsApp

You can reach our support team with a text message to our WhatsApp number: +447421000612. This service is only available for text messages; videos or calls are not supported.

Signal

You can get help by sending a text message to our Signal number: +17787431312. Signal is a free and privacy-focused messaging app. This service is only available for text messages; videos or calls are not supported. After sending a message, our support agents will guide you and help troubleshoot your issue.

Email

Send us an email to frontdesk@torproject.org

In the subject line of your email, please tell us what you're reporting. The more specific your subject line is (e.g. "Connection failure", "feedback on website", "feedback on Tor Browser, "I need a bridge"), the easier it will be for us to understand and follow up. Sometimes when we receive emails without subject lines, they're marked as spam and we don't see them.

For the fastest response, please write in English, Spanish, and/or Portuguese if you can. If none of these languages works for you, please write in any language you feel comfortable with, but keep in mind it will take us a bit longer to answer as we will need help with translation to understand it.

Blog post comments

You can always leave comments on the blog post related to the issue or feedback you want to report. If there is not a blog post related to your issue, please contact us another way.

IRC

You can find us in the #tor channel on OFTC to give us feedback or report bugs/issues. We may not respond right away, but we do check the backlog and will get back to you when we can.

Learn how to connect to OFTC servers.

Email Lists

For reporting issues or feedback using email lists, we recommend that you do so on the one that is related to what you would like to report. A complete directory of our mailing lists can be found here.

For feedback or issues related to Tor Browser, Tor network or other projects developed by Tor: tor-talk

For feedback or issues related to our websites: ux

For feedback or issues related to running a Tor relay: tor-relays

For feedback on content related to Tor Browser Manual or Support website: tor-community-team

Report a security issue

If you've found a security issue, please email security@torproject.org.

If you want to encrypt your mail, you can get the OpenPGP public key for this address from keys.openpgp.org. Here is the current fingerprint:

  pub   rsa3072/0x3EF9EF996604DE41 2022-11-15 [SC] [expires: 2024-12-11]
      Key fingerprint = 835B 4E04 F6F7 4211 04C4  751A 3EF9 EF99 6604 DE41
  uid Tor Security Contact <security@torproject.org>
  sub   rsa3072/0xF59EF1669B798C36 2022-11-15 [E] [expires: 2024-12-11]
      Key fingerprint = A16B 0707 8A47 E0E1 E5B2  8879 F59E F166 9B79 8C36

If you wish to participate in our bug bounty program, please be aware, submitting a security issue to a third-party website carries certain risks that we cannot control, as a result we'd prefer the report directly.

Even if your application is using the correct variant of the SOCKS protocol, there is still a risk that it could be leaking DNS queries. This problem happens in Firefox extensions that resolve the destination hostname themselves, for example to show you its IP address, what country it's in, etc. If you suspect your application might behave like this, follow the instructions below to check.

  1. Add TestSocks 1 to your torrc file.
  2. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 server (socks5://127.0.0.1:9050 by default).
  3. Watch your logs as you use your application. For each socks connection, Tor will log a notice for safe connections, and a warn for connections leaking DNS requests.

If you want to automatically disable all connections leaking DNS requests, set SafeSocks 1 in your torrc file.

Gràcies pel teu suport! Podeu trobar més informació sobre la donació a les nostres preguntes freqüents sobre els donants.

For sharing files over Tor, OnionShare is a good option. OnionShare is an open source tool for securely and anonymously sending and receiving files using Tor onion services. It works by starting a web server directly on your computer and making it accessible as an unguessable Tor web address that others can load in Tor Browser to download files from you, or upload files to you. It doesn't require setting up a separate server, using a third party file-sharing service, or even logging into an account.

Unlike services like email, Google Drive, DropBox, WeTransfer, or nearly any other way people typically send files to each other, when you use OnionShare you don't give any companies access to the files that you're sharing. So long as you share the unguessable web address in a secure way (like pasting it in an encrypted messaging app), no one but you and the person you're sharing with can access the files.

OnionShare is developed by Micah Lee.

Molts nodes de sortida es configuren per blocar certs tipus de trànsit per compartir fitxers, com ara BitTorrent. BitTorrent in particular is not anonymous over Tor.

No. After eleven beta releases, we discontinued support of Tor Messenger. Encara creiem en la capacitat de Tor d'utilitzar-se en una aplicació de missatgeria, però no tenim els recursos per fer-ho en aquest moment. Do you? Contact us.

Vidalia ja no es manté o és suportat. Una gran part de les funcions que Vidalia ofereix ara s'ha integrat al propi navegador Tor.

Tor està finançat per diversos patrocinadors, incloent agències federals nord-americanes, fundacions privades i donants individuals. Check out a list of all our sponsors and a series of blog posts on our financial reports.

We feel that talking openly about our sponsors and funding model is the best way to maintain trust with our community. Sempre busquem més diversitat en les nostres fonts de finançament, especialment de fundacions i particulars.

A few things everyone can do now:

  1. Please consider running a relay to help the Tor network grow.
  2. Tell your friends! Get them to run relays. Get them to run onion services. Get them to tell their friends.
  3. If you like Tor's goals, please take a moment to donate to support further Tor development. We're also looking for more sponsors - if you know any companies, NGOs, agencies, or other organizations that want anonymity / privacy / communications security, let them know about us.
  4. We're looking for more good examples of Tor users and Tor use cases. If you use Tor for a scenario or purpose not yet described on that page, and you're comfortable sharing it with us, we'd love to hear from you.

Documentation

  1. Help localize the documentation into other languages. See becoming a Tor translator if you want to help out. We especially need Arabic or Farsi translations, for the many Tor users in censored areas.

Advocacy

  1. The Tor community uses the Tor Forum, IRC/Matrix, and public mailing lists.
  2. Create a presentation that can be used for various user group meetings around the world.
  3. Create a poster around a theme, such as "Tor for Human Rights!".
  4. Spread the word about Tor at a symposium or conference and use these Tor brochures as conversation starter.

There are a few reasons we don't:

  1. We can't help but make the information available, since Tor clients need to use it to pick their paths. So if the "blockers" want it, they can get it anyway. Further, even if we didn't tell clients about the list of relays directly, somebody could still make a lot of connections through Tor to a test site and build a list of the addresses they see.
  2. If people want to block us, we believe that they should be allowed to do so. Obviously, we would prefer for everybody to allow Tor users to connect to them, but people have the right to decide who their services should allow connections from, and if they want to block anonymous users, they can.
  3. Being blockable also has tactical advantages: it may be a persuasive response to website maintainers who feel threatened by Tor. Giving them the option may inspire them to stop and think about whether they really want to eliminate private access to their system, and if not, what other options they might have. The time they might otherwise have spent blocking Tor, they may instead spend rethinking their overall approach to privacy and anonymity.

No, no oferim cap servei en línia. Podeu trobar una llista de tots els nostres projectes de programari a la nostra pàgina de projectes.

Tor no guarda registres que puguin identificar un usuari concret. Realitzem mesures segures sobre com funciona la xarxa, que podeu consultar a Tor Metrics.

Quant a Documentació Premsa Feina Blog Butlletí Contacte Feu una donació Assistència Comunitat Preguntes més freqüents Quant al Tor Navegador Tor Tor Messenger Tor mòbil GetTor Connexió al Tor Censura HTTPS Operadors Serveis Onion Repositori Debian RPM Repository Alternate Designs little-t-tor Miscel·lània Abuse FAQs Contacte