Tor VM for Microsoft Windows INTRODUCTION Tor VM is a transparent proxy that routes all your DNS request and TCP traffic though the Tor network. The major advantage of running Tor VM is the protection you get from IP disclosure attacks that could leak your true IP address. Tor VM will not protect you from leaking personal information while in use; please take caution in protecting your personal identity and information by not sending it across the Tor network. The use of encryption (HTTPS) whenever possible is highly recommended. USAGE To use Tor VM, simply open the torvm.exe in the folder you extracted it into. A black console window will be displayed while Tor VM is running. DO NOT CLOSE THIS WINDOW WHILE TOR VM IS RUNNING! There is also a second window for QEMU which is running the tor_vm.iso image. Close this window when you are finished and want to stop using Tor VM. When you close the QEMU window, the other console window will remain open for several seconds while your original IP configuration is restored. If this takes more than 3 minutes, something went wrong and you may have to reconfigure your network settings. TROUBLESHOOTING A Tap32 network interface is automatically installed with Tor VM. This is required for Tor VM to communicate securely with Windows and not leak any packets into the physical network. After Tor VM exits, this Tap32 adapter will remain installed. If the Tap32 adapter was to be removed after Tor VM exits, Windows would have to be rebooted in order to run Tor VM again. This is why it remains installed. Tor VM also changes the IP configuration of the primary network adapter to a static IP. Your original setting are restored when Tor VM is close correctly. If for some reason your original IP configuration is not restored, we apologize in advance because you will have to reconfigure it manually. Sorry. :( [THIS SECTION WILL BE EXPANDED AS BUG REPORTS COME IN] LICENSE Tor VM is distributed under this license: Copyright (c) 2008, The Tor Project, Inc. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the names of the copyright owners nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.