[tor-talk] restricting output to the tor process, when using Tor browser

2020-01-27 Thread Mirimir
OK, so I don't use standalone Tor browser, just in Whonix. And when I use Tor in Debian, I use iptables rules like: *filter :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [0:0] -A INPUT -s 127.0.0.1/32 -d 127.0.0.1/32 -j ACCEPT -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j

Re: [tor-talk] Ports required for Tor and hidden services

2020-01-27 Thread Mirimir
On 01/26/2020 10:53 PM, Jim wrote: > Forst wrote: >> In that case, what would be best approach to achieve that all traffic >> is forced though Tor and direct internet connection blocked, >> preferably even if/when the system is breached? > > Roger gave a good reply for the case where the system

[tor-talk] Use Tor in a right track.

2020-01-27 Thread Jason Long
Hello, I want to secure the internet connection of an application like Telegram. If I set the Telegram proxy to use Socks5(127.0.0.1:9150) then is it enough? Thank you. -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to

Re: [tor-talk] Ports required for Tor and hidden services

2020-01-27 Thread Jim
Forst wrote: In that case, what would be best approach to achieve that all traffic is forced though Tor and direct internet connection blocked, preferably even if/when the system is breached? Roger gave a good reply for the case where the system is not breached. But if your firewall is on