I'm a noob when it comes to using tor. I used to use Parrot Linux where Tor-Browser was installed by default and I used that. Here in parabola, there are a few resources,
How to use these, please help.
torsocks as written in documentation can help torify applications. How to torify iceweasel?
Even better, how to torify everything, if it's even possible?
Thanks in advance.
RE: Torifying Parabola - danielp3344 - about 2 years ago -
If you have already installed tor you first need to do `sudo systemctl enable tor` and `sudo systemctl start tor`
That will start the tor service so programs can connect to it, once it's been enabled it will start every time your computer boots.
Next, for any program you want to connect over tor, you need to set proxy settings. If you use GNOME, and want all your programs to go through tor, go to settings->network->proxy turn on 'manual proxy' and where it says SOCKS put in 'localhost' and '9050'
The procedure for icecat is similar (It ignores system proxy settings), I recommend ticking the box for proxying DNS
Hope that helps.
One more thing, some programs will ignore systemwide proxy settings, so be careful if anonymity is essential and test them first to make sure the traffic is going through tor. Also, to run a program via tor on the command line use the 'torify' command IE `torify pacman -Syu'
RE: Torifying Parabola - nona - 7 months ago -
It is technically not possible or advisable to route all traffic through Tor by itself. To do that, there is software which helps Tor to reroute traffic from HTTP, for instance. (More information (or look for on the Tor website .) You would have to look into those solutions. One such solution is to create what is called a transparent-proxy. There are non-free operating systems which also accomplish the same task, and I only mention it, because it would be nice to make them free or you can adapt their code to Parabola.
Regarding using Tor in your system, you can just install
tor-openrc like this:
pacman -S tor torsocks tor-openrc
You will have to modify
/etc/tor/torrcas indicated by
tor-openrc, which you can do by opening an editor with super-user privileges or simply replacing
<contents>with what you need in the following code:
su cat << EOF >> /etc/tor/torrc <contents> EOF
<contents>is indicated when
tor-openrcis installed, and you can uninstall and reinstall it to check the message, if needed.
Regarding browsers, and please, read the links I already provided, you can use your installed Tor with a SOCKS5 proxy, but in that case, you would have to consider about browser fingerprinting, leaked DNS, UDP and all those other terms mentioned in the links that I already provided.