OK, so I don't use standalone Tor browser, just in Whonix.
And when I use Tor in Debian, I use iptables rules like:
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
-A INPUT -s 127.0.0.1/32 -d 127.0.0.1/32 -j ACCEPT
-A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j
On 01/26/2020 10:53 PM, Jim wrote:
> Forst wrote:
>> In that case, what would be best approach to achieve that all traffic
>> is forced though Tor and direct internet connection blocked,
>> preferably even if/when the system is breached?
>
> Roger gave a good reply for the case where the system
Hello,
I want to secure the internet connection of an application like Telegram. If I
set the Telegram proxy to use Socks5(127.0.0.1:9150) then is it enough?
Thank you.
--
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
Forst wrote:
In that case, what would be best approach to achieve that all traffic is
forced though Tor and direct internet connection blocked, preferably
even if/when the system is breached?
Roger gave a good reply for the case where the system is not breached.
But if your firewall is on