
Send warnings and errors to the console, or with the -quiet option, which tells Tor not to log to the console at all. You can override this behavior with the -hush option, which tells Tor to only Its configuration, if the configuration tells it to log anywhere else. By default, Tor starts out logging messages at level "notice" and higher to the console. quiet| -hush Override the default console log. list-torrc-options List all valid options. nt-service Used internally to implement a Windows service. service remove| start| stop Remove, start, or stop a configured Tor Windows service. Install an instance of Tor as a Windows service, with the provided command-line options. verify-config Verify the configuration file is valid. list-fingerprint Generate your keys and output your nickname and fingerprint. hash-password Generates a hashed password for control port access. The contents of this file are overridden by those in the regular configuration file, and by defaults-torrc FILE Specify a file in which to find default values for Tor options. (Default: $HOME/.torrc, or /etc/tor/torrc if that file is not found) f FILE Specify a new configuration file to contain further Tor configuration options. h, -help Display a short help message and exit. Routers, and recipients, observers, and even the routers themselves have difficulty tracking the source of the stream. Users bounce their TCP streams - web traffic, ftp, ssh, etc - around the


Symmetric key at each node, which reveals the downstream node.īasically tor provides a distributed network of servers ("onion routers"). Traffic flowing down the circuit is unwrapped by a

Users choose a source-routed path through a set of nodes, and negotiate a "virtualĬircuit" through the network, in which each node knows its predecessor and successor, but no others. Tor is a connection-oriented anonymizing communication service.
