Dear Sir/Madam:
My system is Debian 32bit, Tor non-exit bridge.
1. For Debian, is there any pure Tor service monitoring and analyzing software for the local machine (not the entire Tor network), with/without a GUI ?
2. Does "Vidalia" really end developing? May I ask why? May I install the "Vidalia" which is still could be found in the Debian apt system?
3. https://www.torproject.org/projects/projects.html.en "orlib" the link is dead.
4. About "Tor2web", are there any clearer figures and docs which could explain the security differences between "Tor" and "Tow2web" ? Especially for the client.
Thank you.
14.06.2015, 10:18 nks nks:
Dear Sir/Madam:
Hello,
[...]
- For Debian, is there any pure Tor service monitoring and analyzing
software for the local machine (not the entire Tor network), with/without a GUI ?
You might be interested in arm [1].
- Does "Vidalia" really end developing? May I ask why? May I install the
"Vidalia" which is still could be found in the Debian apt system?
Depends on what you call "end of development". Vidalia has no maintainer, no one is working on it, fixing stuff, etc. That's why it is no longer shipped with Tor.
I assume that if someone would be stepping up to work on Vidalia again, there would be official releases again, even though they might not be bundled with Tor anymore.
Someone could fork Vidalias' code and create his/her own Tor monitor. Since it is open source others can use it.
So development has not ended ultimately, there is just no development in this regard at the moment.
I'm unaware if Vidalia is still operational in its current state.
[...]
Best regards, Sebastian G.
I'm unaware if Vidalia is still operational in its current state.
Using Vidalia from Debian repo and still operate correctly.
Thank you, Sebastian and Aeris.
About "Arm", it runs on console. Is it the only active project/software for local machine monitoring? I don't find any manual for it in its website, either.
Thanks for the answers about "Vidalia", I got the picture now.
About "Tor2web", are there any clearer figures and docs which could explain the security differences between "Tor" and "Tow2web" ? Especially for the client.
2015-06-14 18:25 GMT+08:00 Aeris aeris+tor@imirhil.fr:
I'm unaware if Vidalia is still operational in its current state.
Using Vidalia from Debian repo and still operate correctly.
-- Aeris
Protégez votre vie privée, chiffrez vos communications GPG : EFB74277 ECE4E222 OTR : 5769616D 2D3DAC72 https://caf%C3%A9-vie-priv%C3%A9e.fr/ https://xn--caf-vie-prive-dhbj.fr/ _______________________________________________ tor-relays mailing list tor-relays@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
Good day,
About "Arm", it runs on console. Is it the only active project/software for local machine monitoring? I don't find any manual for it in its website, either.
http://manpages.ubuntu.com/manpages/natty/man1/arm.1.html
There's also nyx[0], though I'm not sure how finished it is.
About "Tor2web", are there any clearer figures and docs which could explain the security differences between "Tor" and "Tow2web" ? Especially for the client.
Is there any particular aspect you're confused about? tor2web doesn't provide any anonymity for the client, it's just a web proxy to hidden services. It would be trivial for a tor2web proxy operator to identify visitors if they're visiting directly via the internet.
Sharif
[0] https://gitweb.torproject.org/nyx.git
tor-relays@lists.torproject.org