Divers

Nous sommes vraiment désolés, mais vous avez été infecté par un programme malveillant, un rançongiciel. Le Projet Tor n’a pas créé ce programme malveillant. Les auteurs du programme malveillant vous demandent de télécharger le Navigateur Tor pour probablement les contacter de manière anonyme, avec la rançon qu’ils exigent de vous.

Si c’est la première fois que vous entendez parler du Navigateur Tor, nous comprenons que vous pensez que nous sommes des personnes mal intentionnées qui ouvrent la porte à des personnes encore pires.

Mais veuillez prendre en considération que nos logiciels sont utilisés tous les jours à des fins les plus diverses par des défenseurs des droits de la personne, des journalistes, des survivants de violence familiale, des lanceurs d’alerte, des représentants des forces de l’ordre et bien d’autres. Malheureusement, la protection que nos logiciels peuvent fournir à ces groupes de personnes peut aussi être détournée par des criminels et des auteurs de programmes malveillants. Le Projet Tor n’appuie ni ne cautionne l’utilisation de nos logiciels à des fins malveillantes.

Even if your application is using the correct variant of the SOCKS protocol, there is still a risk that it could be leaking DNS queries. This problem happens in Firefox extensions that resolve the destination hostname themselves, for example to show you its IP address, what country it's in, etc. If you suspect your application might behave like this, follow the instructions below to check.

  1. Add TestSocks 1 to your torrc file.
  2. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 server (socks5://127.0.0.1:9050 by default).
  3. Watch your logs as you use your application. For each socks connection, Tor will log a notice for safe connections, and a warn for connections leaking DNS requests.

If you want to automatically disable all connections leaking DNS requests, set SafeSocks 1 in your torrc file.

Tor est conçu pour défendre les droits de la personne et les droits à la vie privée en empêchant quiconque de censurer quoi que ce soit, ce qui s’applique aussi à nous. Nous détestons que certaines personnes utilisent Tor pour faire des choses horribles, mais nous ne pouvons rien faire pour nous en débarrasser sans aussi porter atteinte aux défenseurs des droits de la personne, aux journalistes, aux survivants de violence et autres personnes qui utilisent Tor à des fins louables. Si nous voulions empêcher certaines personnes d’utiliser Tor, nous ajouterions essentiellement une porte dérobée au logiciel, ce qui exposerait aux attaques de régimes condamnables et autres adversaires nos utilisateurs vulnérables.

Tor ne conserve aucun journal qui pourrait identifier un utilisateur particulier. We do take some safe measurements of how the network functions, which you can check out at Tor Metrics.

Vidalia n’est plus entretenue ni ne reçoit de soutien. Une grande partie des fonctions qu’offrait Vidalia a maintenant été intégrée dans le Navigateur Tor même.

La longueur du chemin est actuellement figée à 3 dans le code, plus le nombre de nœuds « sensibles » dans votre chemin. C’est-à-dire que pour les cas normaux c’est 3, mais possiblement plus si, par exemple, vous accédez à un service oignon ou à une adresse « .exit ».

Nous ne voulons pas encourager l’utilisation de chemins plus longs, car cela augmente la charge du réseau sans (d’après ce que nous pouvons voir) fournir une sécurité accrue. Also, using paths longer than 3 could harm anonymity, first because it makes denial of security attacks easier, and second because it could act as an identifier if only a small number of users have the same path length as you.

Non. Après onze versions bêta, nous avons cessé le soutien de la Messagerie Tor (page en anglais). Nous croyons toujours que Tor peut être utilisé dans une appli de messagerie, mais nous ne disposons pas des ressources pour le concrétiser pour le moment. Les possédez-vous ? Contactez-nous.

Tor compte sur le soutien d’utilisateurs et de bénévoles du monde entier pour nous aider à améliorer nos logiciels et nos ressources. C’est pourquoi vos rétroactions sont inestimables pour nous (et pour tous les utilisateurs de Tor).

Feedback template

When sending us feedback or reporting a bug, please include as many of these as possible:

  • Operating System you are using
  • Version du Navigateur Tor
  • Tor Browser Security Level
  • Step by step of how you got to the issue, so we can reproduce it (e.g. I opened the browser, typed a url, clicked on (i) icon, then my browser crashed)
  • Une capture d’écran du problème
  • Le journal

Comment nous joindre

Il y a plusieurs façons de nous joindre, veuillez utiliser alors ce qui vous convient le mieux.

Tor Forum

We recommend asking for help on the Tor Forum. You will need to create an account to submit a new topic. Before you ask, please review our discussion guidelines. At the moment, for the fastest response, please write in English. If you found a bug, please use GitLab.

GitLab

First, check if the bug is already known. You can search and read all the issues at https://gitlab.torproject.org/. To create a new issue, please request a new account to access Tor Project's GitLab instance and find the right repository to report your issue. We track all Tor Browser related issues at Tor Browser issue tracker. Issues related to our websites should be filed under the Web issue tracker.

Courriel

Send us an email to frontdesk@torproject.org

In the subject line of your email, please tell us what you're reporting. The more specific your subject line is (e.g. "Connection failure", "feedback on website", "feedback on Tor Browser, "I need a bridge"), the easier it will be for us to understand and follow up. Sometimes when we receive emails without subject lines, they're marked as spam and we don't see them.

For the fastest response, please write in English, Spanish, and/or Portuguese if you can. If none of these languages works for you, please write in any language you feel comfortable with, but keep in mind it will take us a bit longer to answer as we will need help with translation to understand it.

Blog post comments

You can always leave comments on the blog post related to the issue or feedback you want to report. If there is not a blog post related to your issue, please contact us another way.

IRC

You can find us in the #tor channel on OFTC to give us feedback or report bugs/issues. We may not respond right away, but we do check the backlog and will get back to you when we can.

Learn how to connect to OFTC servers.

Email Lists

For reporting issues or feedback using email lists, we recommend that you do so on the one that is related to what you would like to report. A complete directory of our mailing lists can be found here.

For feedback or issues related to Tor Browser, Tor network or other projects developed by Tor: tor-talk

For feedback or issues related to our websites: ux

For feedback or issues related to running a Tor relay: tor-relays

For feedback on content related to Tor Browser Manual or Support website: tor-community-team

Report a security issue

If you've found a security issue in one of our projects or in our infrastructure, please email tor-security@lists.torproject.org. If you've found a security bug in Tor or Tor Browser, feel free to submit it for our bug bounty program. Si vous souhaitez chiffrer votre courriel, vous pouvez obtenir la clé publique GPG de la liste en contactant tor-security-sendkey@lists.torproject.org ou sur pool.sks-keyservers.net. En voici l’empreinte numérique :

  gpg --fingerprint tor-security@lists.torproject.org
  pub 4096R/1A7BF184 2017-03-13
  Fingerprint=8B90 4624 C5A2 8654 E453 9BC2 E135 A8B4 1A7B F184
  uid tor-security@lists.torproject.org
  uid tor-security@lists.torproject.org
  uid tor-security@lists.torproject.org
  sub 4096R/C00942E4 2017-03-13

For sharing files over Tor, OnionShare is a good option. OnionShare is an open source tool for securely and anonymously sending and receiving files using Tor onion services. It works by starting a web server directly on your computer and making it accessible as an unguessable Tor web address that others can load in Tor Browser to download files from you, or upload files to you. It doesn't require setting up a separate server, using a third party file-sharing service, or even logging into an account.

Unlike services like email, Google Drive, DropBox, WeTransfer, or nearly any other way people typically send files to each other, when you use OnionShare you don't give any companies access to the files that you're sharing. So long as you share the unguessable web address in a secure way (like pasting it in an encrypted messaging app), no one but you and the person you're sharing with can access the files.

OnionShare is developed by Micah Lee.

De nombreux nœuds de sortie sont configurés pour bloquer certains types de trafic de partage de fichiers tels que BitTorrent. BitTorrent in particular is not anonymous over Tor.

Nous vous remercions de votre soutien ! You can find more information about donating on our donor FAQ.

Tor est financé par un certain nombre de commanditaires différents, dont des organismes fédéraux étatsuniens, des fondations privées et des donateurs particuliers. Check out a list of all our sponsors and a series of blog posts on our financial reports.

Nous estimons que parler ouvertement de nos commanditaires et de notre modèle de financement est la meilleure façon de maintenir un rapport de confiance avec notre communauté. Nous cherchons toujours à diversifier nos sources de financement, particulièrement de fondations et de particuliers.

Nous ne recommandons pas d’utiliser Tor avec BitTorrent. For further details, please see our blog post on the subject.

Non, le Projet Tor n’offre pas de service d’hébergement.

A few things everyone can do now:

  1. Please consider running a relay to help the Tor network grow.
  2. Tell your friends! Get them to run relays. Get them to run onion services. Get them to tell their friends.
  3. If you like Tor's goals, please take a moment to donate to support further Tor development. We're also looking for more sponsors - if you know any companies, NGOs, agencies, or other organizations that want anonymity / privacy / communications security, let them know about us.
  4. We're looking for more good examples of Tor users and Tor use cases. If you use Tor for a scenario or purpose not yet described on that page, and you're comfortable sharing it with us, we'd love to hear from you.

Documentation

  1. Help localize the documentation into other languages. See becoming a Tor translator if you want to help out. We especially need Arabic or Farsi translations, for the many Tor users in censored areas.

Advocacy

  1. The Tor community uses the Tor Forum, IRC/Matrix, and public mailing lists.
  2. Create a presentation that can be used for various user group meetings around the world.
  3. Create a poster around a theme, such as "Tor for Human Rights!".
  4. Spread the word about Tor at a symposium or conference and use these Tor brochures as conversation starter.

Les développeurs de Tor ne peuvent rien faire pour suivre les utilisateurs de Tor à la trace. Les mêmes protections qui empêchent les personnes mal intentionnées de percer l’anonymat de Tor nous empêchent aussi de suivre les utilisateurs à la trace.

There are a few reasons we don't:

  1. We can't help but make the information available, since Tor clients need to use it to pick their paths. So if the "blockers" want it, they can get it anyway. Further, even if we didn't tell clients about the list of relays directly, somebody could still make a lot of connections through Tor to a test site and build a list of the addresses they see.
  2. If people want to block us, we believe that they should be allowed to do so. Obviously, we would prefer for everybody to allow Tor users to connect to them, but people have the right to decide who their services should allow connections from, and if they want to block anonymous users, they can.
  3. Being blockable also has tactical advantages: it may be a persuasive response to website maintainers who feel threatened by Tor. Giving them the option may inspire them to stop and think about whether they really want to eliminate private access to their system, and if not, what other options they might have. The time they might otherwise have spent blocking Tor, they may instead spend rethinking their overall approach to privacy and anonymity.