So instead of using only tor when using tor browser, I can use tor while using firefox, the command line, etc.
I use Manjaro Cinnamon.
I know I’ll have to be careful with emails and some other applications that aren’t encrypted.
deleted by creator
Don’t. Tor is great for certain things, not all of the time. It will make you much easier to fingerprint than hardened Firefox without a VPN or Tor. It is best to only reserve Tor for your Darknet uses.
It’s not generally recommended.
It increases your fingerprintability and your end-to-end correlation. It will leak unless you have a tightly controlled firewall policy. It can strain the network depending of what you’re doing. You lose all the isolation of the Tor Browser.
There is already Tails and Whonix for system-wide Tor usage.
Don’t take my word for it:
and
http://rzuwtpc4wb3xdzrj3yeajsvm3fkq4vbeubm2tdxaqruzzzgs5dwemlad.onion/index.html#tbb-13
https://github.com/brainfucksec/archtorify
What archtorify does is it sets up iptables and a systemd service so that everything goes by default through tor. Installation shown in wiki.
What would happen if I use tor browser while using archtorify? I find it helpful to be able to change the tor circuit with a button. I wish there was something like that in firefox when using torify.
I think I’ll modify archtorify to change the circuit every so often. Perhaps I can check for internet speed and choose different circuits until it’s above a given speed.
There’s no point of using tor browser while using archtorify. I haven’t tried such a thing. Tor Browser additionally protects against fingerprinting which archtorify does not. You’ll be able to do that by restarting archtorify using “archtorify -r”.
Absolutely, that’s the advantage of free software! :) You can just have a script which checks if archtorify service is running and executes “archtorify -r” if it is on every x minutes (according to how you want).
I just install “tor” package in Debian-based OSes and, ensure that the “tor” service is started and configure the applications I want to use “tor” by setting their proxy configuration to Socks 5 in 127.0.0.1 IP with 9050 port if they allow it.
So it depends on whether each application allows setting Socks 5? Is there a list somewhere to check a list of files that allow that configuration? I would need at least alacritty, element and a couple others. And how could I block the rest of the connections that don’t go through Socks 5?
Even if you use Debian, the Arch wiki is really detailed and goes through lots of information about loads of different packages
There is a possibility to use privoxy in front of tor or even Squid but I don’t have the configuration anymore since I don’t try it since 5 years ago.