Users really need to dissect and understand how
each method of constraining application traffic to tor
works before choosing one, then set it up and test
extensively before use. And deploying an out of band
managed catchall packet filter is essential to helping
prevent eventual IP leaks.
Four
Hello, first of all, thank you for the feedback.
On 2018-04-08 15:40, Me wrote:
It can be complicated. Tor itself provides a multi-hop anonymizing TCP
connection, however what your application may or
may not do outside of Tor is uncontrolled, this is why the Tor Browser
is recommended for use
It can be complicated. Tor itself provides a multi-hop anonymizing TCP
connection, however what your application may or
may not do outside of Tor is uncontrolled, this is why the Tor Browser is
recommended for use instead of simply proxying
your regular browser through Tor, TBB is designed to