There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

Johnny123123 , (edited )

I don’t use tor that often but as my understanding tor is basically a socks5 proxy, which operates at application layer, so there is no way you can route all your traffic through tor, at least not the ICMP packets.

Some applications are willing to use your proxy settings like http_proxy and https_proxy environment variables, but some of them not, especially for udp based applications (most games). The workaround that i am aware of is to use a rule-based proxy program that supports TUN mode, such as Clash Meta (the link is a fork of clash meta called mihomo, which is the one that i am currently using). Basically it creates a virtual interface and traps all the higher layer traffic into this interface, so it can route them through the configured proxy (tor in your case), even for applications that don’t honor your proxy settings at all.

In Clash Meta you can use configurations such as this to route all your layer 5 and 4 traffic through tor, the important part is to enable the tun mode. After that you can simply use command mihomo -f config.yaml to start it.


<span style="color:#323232;">port: 7890
</span><span style="color:#323232;">socks-port: 7891
</span><span style="color:#323232;">redir-port: 7892
</span><span style="color:#323232;">mode: rule
</span><span style="color:#323232;">tun:
</span><span style="color:#323232;">  enable: true
</span><span style="color:#323232;">  stack: gvisor
</span><span style="color:#323232;">  auto-route: true
</span><span style="color:#323232;">  auto-redirect: true
</span><span style="color:#323232;">  auto-detect-interface: true
</span><span style="color:#323232;">proxies:
</span><span style="color:#323232;">  -
</span><span style="color:#323232;">    name: 'tor'
</span><span style="color:#323232;">    type: socks5
</span><span style="color:#323232;">    server: localhost
</span><span style="color:#323232;">    port: 9050
</span><span style="color:#323232;">proxy-groups:
</span><span style="color:#323232;">  -
</span><span style="color:#323232;">    name: DEFAULT
</span><span style="color:#323232;">    type: select
</span><span style="color:#323232;">    proxies:
</span><span style="color:#323232;">      - 'tor'
</span><span style="color:#323232;">rules:
</span><span style="color:#323232;">  - MATCH,DEFAULT
</span>
OsrsNeedsF2P ,

Someone else mentioned Qubes, but that is also a rather advanced distro for journalists and other users with a high threat model.

If you want to be able to use your computer as normal, but have a session with maximum privacy and route through Tor, Whonix is your best bet.

If you want something that you cannot possibly mess up, even at the cost of less functionality on your computer, TAILS is your best bet.

Turbo ,

If you can, set this up on your router and then specify which devices should route through.

You may also want to use pihole for ad blogging and as your DNS server. and in pihole use your VPN server’s DNS such that you don’t have DNS leak.

And if the VPN is down, your computer won’t work until it comes back up.

Helpful if you run the network at your house

makeasnek ,
@makeasnek@lemmy.ml avatar

You may want to look into Qubes, it can natively route an entire OS through Tor. Note that routing all your traffic may hurt your anonymity. For example, there what if an app on your machine reaches out to somewhere and reports the serial number of a piece of hardware and it does it through your “anonymous” Tor connection? Virtualizing that hardware can help avoid that. Think through your threat model.

refalo ,
LodeMike ,

Install tor (from the official repo) then set up a proxy for SOCKS5 localhost port 9050

pinganini ,

@merompetehla

is what you need, unless you find this solution too heavy

just_another_person ,

You point your main active network interface gateway to a tor gateway or proxy.

merompetehla OP ,

You point your main active network interface gateway to a tor gateway or proxy.

Am I doing that editing the privoxy config file with this line?

‘forward-socks5t / 127.0.0.1:9050 .’

I now set up tor for firefox manually using www.wikihow.com/Use-Tor-with-Firefox. If the edited privoxy cofig file is the right way to go, didn’t I just double torify?

electro1 ,
@electro1@infosec.pub avatar

deleted_by_author

  • Loading...
  • merompetehla OP ,

    how does carburetor work? Do I simply activate it and that means all my traffic goes through tor? just like that? even if I open a terminal and sudo apt update, flatpak or yt-dlp something?

    illectrility ,

    (Not directly answering your question but) if it works like a VPN service then yeah. However, P2P connections might not be routed through TOR in that case. Be careful about that

    Steamymoomilk ,

    You run carburetor and use it has a proxy for your internet. Ie go to network settings and fill out the ports for your connections in proxy

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • random
  • lifeLocal
  • goranko
  • All magazines