

#RETROSHARE COMMAND LINE INSTALL#
Install onto your operating system the files of : tor and tor-geoipdb.Retroshare 06 Hidden Node Set-Up Quick Overview If you need help visit the RetroShare public chat lobbies, or IRC ( port 6697 #Retroshare channel). The Tor binary must be installed and running on your operating system.īefore starting installing and configuring Tor, please read and understand all of the information, as most problems are caused by not correctly completing one step before proceeding to the next.You must be using RetroShare v0.6+ (released mid 2015) either from a downloaded package or compiled by yourself.For RetroShare 0.6 users, Tor provides an added layer of security and anonymizing ability which additionally cloaks their local IP address. Tor users bounce their TCP streams - web traffic, ftp, ssh, etc. - around the onion routed network, and recipients, observers, and even the relays themselves have difficulty tracking the original source of the datastream. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communication can be de-anonymized through network surveillance that relies upon knowing its source and destination.įor RetroShare 0.6 users, Tor provides a distributed network of servers or relays ("onion routers") they can use after following the steps and examples listed in this wiki page. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. Tor encrypts the original data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. The term "onion routing" refers to application layers of encryption, nested like the layers of an onion, used to anonymize communication. Traffic flowing down the Tor Network circuit is unwrapped by a symmetric key at each node, which reveals the downstream node. Each node knows its predecessor and successor but idealy no others. Tor users choose a source-routed path through a set of nodes and negotiate a "virtual circuit" through the onion routed network. The Onion Router (Tor) is a connection-oriented anonymizing communication service. 6 Using only the Tor binary system file for Regular RetroShare 0.6 and Hidden Node RetroShare 0.6 thru Tor as a Hidden Service Configuration.5 Vidalia-Tor Bundle Regular RetroShare 0.6 and Hidden Node RetroShare 0.6 through Tor as a Hidden Service Configuration.4 TBB Configuration With Regular RetroShare 0.6.3.2 RetroShare 0.6 Modes of Use With Tor.2 Retroshare 06 Hidden Node Set-Up Quick Overview.
