Lain-lain

Tor tidak menyimpan log apapun yang dapat mengidentifikasi pengguna tertentu. Kami melakukan beberapa pengukuran aman tentang bagaimana fungsi jaringan, yang dapat Anda lihat di Metrik Tor.

Tor dibiayai beberapa sponsor termasuk lembaga federal Amerika Serikat, yayasan swasta, dan donor individu. Check out a list of all our sponsors and a series of blog posts on our financial reports.

Kami merasa bahwa berbicara secara terbuka mengenai sponsor dan model pendanaan kami adalah cara terbaik untuk menjaga kepercayaan dengan komunitas kami. Kami selalu mencara cara lain dalam pembiayaan, termasuk dari yayasan dan orang perorangan.

Untuk berbagi berkas melalui Tor, OnionShare adalah opsi yang baik. OnionShare adalah sarana bersumber terbuka untuk mengirim dan menerima berkas secara aman dan anonim menggunakan layanan servis Tor onion. It works by starting a web server directly on your computer and making it accessible as an unguessable Tor web address that others can load in Tor Browser to download files from you, or upload files to you. It doesn't require setting up a separate server, using a third party file-sharing service, or even logging into an account.

Tidak seperti layanan surel, Google Drive, DropBox, WeTransfer, atau hampir semua cara yang biasanya dilakukan orang untuk mengirim berkas satu sama lain, saat Anda menggunakan OnionShare, Anda tidak memberikan akses kepada perusahaan mana pun ke file yang Anda bagikan. Selama Anda membagikan alamat web yang tidak dapat ditebak dengan cara yang aman (seperti menempelkannya di aplikasi perpesanan terenkripsi), tidak seorang pun kecuali Anda dan orang yang Anda ajak berbagi yang dapat mengakses berkas tersebut.

OnionShare dikembangkan oleh Micah Lee.

Banyak exit node diatur untuk menghalangi beberapa jenis lalu-lintas file sharing, seperti BitTorrent. BitTorrent pada khususnya tidak anonim melalui Tor.

Terima kasih atas dukungan Anda! Anda dapat menemukan informasi lebih lanjut untuk berdonasi di FAQ donor kami.

Tidak ada yang dapat dilakukan oleh para pengembang Tor dalam melacak pengguna Tor. Perlindungan yang menghalangi orang jahat untuk merusak anonimitas Tor juga mencegah kami melacak pengguna.

Tor dirancang untuk melindungi hak asasi manusia dan privasi dengan mencegah siapa saja dalam menyensor apapun, mencegah siapapun bahkan diri kami sendiri. Kami tidak suka kalau ada orang-orang yang menggunakan Tor untuk hal-hal buruk, tapi kami tidak dapat melakukan apapun dalam menyingkirkan mereka tanpa mengabaikan aktivis HAM, wartawan, orang-orang yang selamat dari pelecehan, dan orang lain yang menggunakan Tor untuk kebaikan. Jika kami menghalangi sebagian orang menggunakan Tor, kami pada dasarnya akan menambah pintu belakang di perangkat lunak ini, yang akan buka kelemahan pengguna kami kepada pemerintah yang tidak baik dan musuh-musuh lain.

Even if your application is using the correct variant of the SOCKS protocol, there is still a risk that it could be leaking DNS queries. This problem happens in Firefox extensions that resolve the destination hostname themselves, for example to show you its IP address, what country it's in, etc. If you suspect your application might behave like this, follow the instructions below to check.

  1. Add TestSocks 1 to your torrc file.
  2. Start Tor, and point your program's SOCKS proxy settings to Tor's SOCKS5 server (socks5://127.0.0.1:9050 by default).
  3. Watch your logs as you use your application. For each socks connection, Tor will log a notice for safe connections, and a warn for connections leaking DNS requests.

If you want to automatically disable all connections leaking DNS requests, set SafeSocks 1 in your torrc file.

Kami tidak menyarankan penggunaan Tor dengan BitTorrent. Untuk perincian lebih lanjut, silakan lihat postingan blog kami tentang subyek ini.

Tor mengandalkan dukungan dari pengguna dan sukarelawan di seluruh dunia untuk membantu meningkatkan perangkat lunak dan sumber daya kami, jadi umpan balik Anda sangat berharga untuk kami (dan untuk semua pengguna Tor).

Format Masukan

When sending us feedback or reporting a bug, please include as many of these as possible:

  • Operating System you are using
  • Tor Browser version
  • Tor Browser Security Level
  • Step by step of how you got to the issue, so we can reproduce it (e.g. I opened the browser, typed a url, clicked on (i) icon, then my browser crashed)
  • A screenshot of the problem
  • The log

Cara Menghubungi Kami

There are several ways to reach us, so please use what works best for you.

Forum Tor

We recommend asking for help on the Tor Forum. You will need to create an account to submit a new topic. Before you ask, please review our discussion guidelines. At the moment, for the fastest response, please write in English. If you found a bug, please use GitLab.

GitLab

First, check if the bug is already known. You can search and read all the issues at https://gitlab.torproject.org/. To create a new issue, please request a new account to access Tor Project's GitLab instance and find the right repository to report your issue. We track all Tor Browser related issues at Tor Browser issue tracker. Issues related to our websites should be filed under the Web issue tracker.

Telegram

If you need help installing or troubleshooting Tor Browser and the Tor Forum is blocked or censored where you are, you can reach out to us on Telegram https://t.me/TorProjectSupportBot. A Tor support specialist will assist you.

WhatsApp

You can reach our support team with a text message to our WhatsApp number: +447421000612. This service is only available for text messages; videos or calls are not supported.

Signal

You can get help by sending a text message to our Signal number: +17787431312. Signal is a free and privacy-focused messaging app. This service is only available for text messages; videos or calls are not supported. After sending a message, our support agents will guide you and help troubleshoot your issue.

Surel

Send us an email to frontdesk@torproject.org.

In the subject line of your email, please tell us what you're reporting. The more specific your subject line is (e.g. "Connection failure", "feedback on website", "feedback on Tor Browser, "I need a bridge"), the easier it will be for us to understand and follow up. Sometimes when we receive emails without subject lines, they're marked as spam and we don't see them.

For the fastest response, please write in English, Spanish, and/or Portuguese if you can. If none of these languages works for you, please write in any language you feel comfortable with, but keep in mind it will take us a bit longer to answer as we will need help with translation to understand it.

Komentar pada posting blog

You can always leave comments on the blog post related to the issue or feedback you want to report. If there is not a blog post related to your issue, please contact us another way.

IRC

You can find us in the #tor channel on OFTC to give us feedback or report bugs/issues. We may not respond right away, but we do check the backlog and will get back to you when we can.

Learn how to connect to OFTC servers.

Daftar Surel

For reporting issues or feedback using email lists, we recommend that you do so on the one that is related to what you would like to report. A complete directory of our mailing lists can be found here.

For feedback or issues related to our websites: ux

For feedback or issues related to running a Tor relay: tor-relays

Laporkan isu keamanan

If you've found a security issue, please email security@torproject.org.

If you want to encrypt your mail, you can get the OpenPGP public key for this address from keys.openpgp.org. Here is the current fingerprint:

  pub   rsa3072/0x3EF9EF996604DE41 2022-11-15 [SC] [expires: 2024-12-11]
      Key fingerprint = 835B 4E04 F6F7 4211 04C4  751A 3EF9 EF99 6604 DE41
  uid Tor Security Contact <security@torproject.org>
  sub   rsa3072/0xF59EF1669B798C36 2022-11-15 [E] [expires: 2024-12-11]
      Key fingerprint = A16B 0707 8A47 E0E1 E5B2  8879 F59E F166 9B79 8C36

If you wish to participate in our bug bounty program, please be aware, submitting a security issue to a third-party website carries certain risks that we cannot control, as a result we'd prefer the report directly.

Saat ini panjangnya path terkode dalam 3 plus jumlah node di path Anda yang sensitif. Yaitu, di keadaan normal, adalah 3, tapi misalnya jika Anda mengakses sebuah onion service atau sebuah alamat ".exit", jumlah ini dapat lebih besar.

Kami tidak ingin mendorong orang untuk menggunakan path lebih panjang dari ini karena akan meningkatkan beban jaringan (sejauh yang kami ketahui) tanpa menambah keamanan. Selain itu, menggunakan jalur yang lebih panjang dari 3 dapat membahayakan anonimitas, pertama karena membuat serangan penolakan keamanan lebih mudah, dan kedua karena dapat bertindak sebagai pengenal jika hanya sejumlah kecil pengguna yang memiliki panjang jalur yang sama dengan Anda.

Kami minta maaf, tapi Anda telah terinfeksi dengan malware. Tor Project tidak menciptakan malware ini. Pencipta malware itu meminta Anda mengunduh Tor Browser supaya Anda dapat menghubungi mereka secara anonim dengan tebusannya.

Jika ini adalah perkenalan pertama Anda dengan Tor Browser, kami paham kalau Anda berpikir kami adalah orang-orang jahat yang membantu orang-orang yang lebih jahat.

Namu, mohon ketahui bahwa perangkat lunak kami digunakan untuk beragam tujuan oleh aktivis hak asasi manusia, wartawan, orang-orang yang selamat dari kekerasan rumah tangga, whistle blower, penegak hukum, dan banyak lain. Sayangnya, perlindungan yang disediakan perangkat lunak kami kepada orang-orang tersebut dapat disalahgunakan oleh penjahat dan pembuat malware. Tor Project tidak mendukung atau merestui penggunaan perangkat lunak kami untuk tujuan jahat.

A few things everyone can do now:

  1. Please consider running a relay to help the Tor network grow.
  2. Tell your friends! Get them to run relays. Get them to run onion services. Get them to tell their friends.
  3. If you like Tor's goals, please take a moment to donate to support further Tor development. We're also looking for more sponsors - if you know any companies, NGOs, agencies, or other organizations that want anonymity / privacy / communications security, let them know about us.
  4. We're looking for more good examples of Tor users and Tor use cases. If you use Tor for a scenario or purpose not yet described on that page, and you're comfortable sharing it with us, we'd love to hear from you.

Documentation

  1. Help localize the documentation into other languages. See becoming a Tor translator if you want to help out. We especially need Arabic or Farsi translations, for the many Tor users in censored areas.

Advocacy

  1. The Tor community uses the Tor Forum, IRC/Matrix, and public mailing lists.
  2. Create a presentation that can be used for various user group meetings around the world.
  3. Create a poster around a theme, such as "Tor for Human Rights!".
  4. Spread the word about Tor at a symposium or conference and use these Tor brochures as conversation starter.

There are a few reasons we don't:

  1. We can't help but make the information available, since Tor clients need to use it to pick their paths. So if the "blockers" want it, they can get it anyway. Further, even if we didn't tell clients about the list of relays directly, somebody could still make a lot of connections through Tor to a test site and build a list of the addresses they see.
  2. If people want to block us, we believe that they should be allowed to do so. Obviously, we would prefer for everybody to allow Tor users to connect to them, but people have the right to decide who their services should allow connections from, and if they want to block anonymous users, they can.
  3. Being blockable also has tactical advantages: it may be a persuasive response to website maintainers who feel threatened by Tor. Giving them the option may inspire them to stop and think about whether they really want to eliminate private access to their system, and if not, what other options they might have. The time they might otherwise have spent blocking Tor, they may instead spend rethinking their overall approach to privacy and anonymity.

Vidalia sudah tidak dipelihara atau didukung. Sebagian besar fitur Vidalia sudah terintegrasi ke Tor Browser.

Tidak. Setelah sebelas rilis beta, kami menghentikan dukungan Tor Messenger. Kita masih bisa percaya kemampuan Tor untuk digunakan dalam aplikasi pesan, tapi kita tidak memiliki sumber daya untuk membuat hal itu terjadi sekarang. Apakah Anda? Hubungi kami.

Tentang Dokumentasi Pers Pekerjaan Blog Buletin Kontak Donasi Dukungan Komunitas Pertanyaan yang Sering Diajukan Tentang Tor Tor Browser Tor Messenger Tor Mobile GetTor Menghubungkan ke Tor Penyensoran HTTPS Operator Layanan Onion Repositori Debian Repositori RPM Perubahan Desain little-t-tor Lain-lain Penyalahgunaan FAQs Hubungi Kami