

nt-service Used internally to implement a Windows service. service remove| start| stop Remove, start, or stop a configured Tor Windows service. Install an instance of Tor as a Windows service, with the provided command-line options. verify-config Verify the configuration file is valid. list-fingerprint Generate your keys and output your nickname and fingerprint. hash-password Generates a hashed password for control port access. The contents of this file are overridden by those in the regular configuration file, and by

defaults-torrc FILE Specify a file in which to find default values for Tor options. (Default: $HOME/.torrc, or /etc/tor/torrc if that file is not found) f FILE Specify a new configuration file to contain further Tor configuration options. h, -help Display a short help message and exit. Routers, and recipients, observers, and even the routers themselves have difficulty tracking the source of the stream. Users bounce their TCP streams - web traffic, ftp, ssh, etc - around the Symmetric key at each node, which reveals the downstream node.īasically tor provides a distributed network of servers ("onion routers"). Traffic flowing down the circuit is unwrapped by a Users choose a source-routed path through a set of nodes, and negotiate a "virtualĬircuit" through the network, in which each node knows its predecessor and successor, but no others. Tor is a connection-oriented anonymizing communication service.
