this post was submitted on 14 Feb 2022
2 points (100.0% liked)

Privacy

33216 readers
265 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

So instead of using only tor when using tor browser, I can use tor while using firefox, the command line, etc.

I use Manjaro Cinnamon.

I know I'll have to be careful with emails and some other applications that aren't encrypted.

all 8 comments
sorted by: hot top controversial new old
[–] [email protected] 1 points 3 years ago (1 children)

I just install "tor" package in Debian-based OSes and, ensure that the "tor" service is started and configure the applications I want to use "tor" by setting their proxy configuration to Socks 5 in 127.0.0.1 IP with 9050 port if they allow it.

[–] [email protected] 0 points 3 years ago* (last edited 3 years ago) (1 children)

So it depends on whether each application allows setting Socks 5? Is there a list somewhere to check a list of the software that allow that configuration? I would need at least alacritty, element and a couple others. And how could I block the rest of the connections that don't go through Socks 5?

[–] [email protected] 1 points 3 years ago

Even if you use Debian, the Arch wiki is really detailed and goes through lots of information about loads of different packages

[–] [email protected] 1 points 3 years ago

https://github.com/brainfucksec/archtorify

What archtorify does is it sets up iptables and a systemd service so that everything goes by default through tor. Installation shown in wiki.

[–] [email protected] 1 points 3 years ago

I only connect to it with specific programs

[–] [email protected] 0 points 3 years ago* (last edited 3 years ago)

It's not generally recommended.

It increases your fingerprintability and your end-to-end correlation. It will leak unless you have a tightly controlled firewall policy. It can strain the network depending of what you're doing. You lose all the isolation of the Tor Browser.

There is already Tails and Whonix for system-wide Tor usage.

Don't take my word for it:

http://eweiibe6tdjsdprb4px6rqrzzcsi22m4koia44kc5pcjr7nec2rlxyad.onion/legacy/trac/-/wikis/doc/TorifyHOWTO

and

http://rzuwtpc4wb3xdzrj3yeajsvm3fkq4vbeubm2tdxaqruzzzgs5dwemlad.onion/index.html#tbb-13

[–] [email protected] 0 points 3 years ago

Don't. Tor is great for certain things, not all of the time. It will make you much easier to fingerprint than hardened Firefox without a VPN or Tor. It is best to only reserve Tor for your Darknet uses.