I just install "tor" package in Debian-based OSes and, ensure that the "tor" service is started and configure the applications I want to use "tor" by setting their proxy configuration to Socks 5 in 127.0.0.1 IP with 9050 port if they allow it.
Privacy
A place to discuss privacy and freedom in the digital world.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
Some Rules
- Posting a link to a website containing tracking isn't great, if contents of the website are behind a paywall maybe copy them into the post
- Don't promote proprietary software
- Try to keep things on topic
- If you have a question, please try searching for previous discussions, maybe it has already been answered
- Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
- Be nice :)
Related communities
much thanks to @gary_host_laptop for the logo design :)
So it depends on whether each application allows setting Socks 5? Is there a list somewhere to check a list of the software that allow that configuration? I would need at least alacritty, element and a couple others. And how could I block the rest of the connections that don't go through Socks 5?
Even if you use Debian, the Arch wiki is really detailed and goes through lots of information about loads of different packages
https://github.com/brainfucksec/archtorify
What archtorify does is it sets up iptables and a systemd service so that everything goes by default through tor. Installation shown in wiki.
I only connect to it with specific programs
It's not generally recommended.
It increases your fingerprintability and your end-to-end correlation. It will leak unless you have a tightly controlled firewall policy. It can strain the network depending of what you're doing. You lose all the isolation of the Tor Browser.
There is already Tails and Whonix for system-wide Tor usage.
Don't take my word for it:
and
http://rzuwtpc4wb3xdzrj3yeajsvm3fkq4vbeubm2tdxaqruzzzgs5dwemlad.onion/index.html#tbb-13
Don't. Tor is great for certain things, not all of the time. It will make you much easier to fingerprint than hardened Firefox without a VPN or Tor. It is best to only reserve Tor for your Darknet uses.