So instead of using only tor when using tor browser, I can use tor while using firefox, the command line, etc.
I use Manjaro Cinnamon.
I know I’ll have to be careful with emails and some other applications that aren’t encrypted.
deleted by creator
It’s not generally recommended.
It increases your fingerprintability and your end-to-end correlation. It will leak unless you have a tightly controlled firewall policy. It can strain the network depending of what you’re doing. You lose all the isolation of the Tor Browser.
There is already Tails and Whonix for system-wide Tor usage.
Don’t take my word for it:
and
http://rzuwtpc4wb3xdzrj3yeajsvm3fkq4vbeubm2tdxaqruzzzgs5dwemlad.onion/index.html#tbb-13
I just install “tor” package in Debian-based OSes and, ensure that the “tor” service is started and configure the applications I want to use “tor” by setting their proxy configuration to Socks 5 in 127.0.0.1 IP with 9050 port if they allow it.
So it depends on whether each application allows setting Socks 5? Is there a list somewhere to check a list of the software that allow that configuration? I would need at least alacritty, element and a couple others. And how could I block the rest of the connections that don’t go through Socks 5?
Even if you use Debian, the Arch wiki is really detailed and goes through lots of information about loads of different packages
https://github.com/brainfucksec/archtorify
What archtorify does is it sets up iptables and a systemd service so that everything goes by default through tor. Installation shown in wiki.
What would happen if I use tor browser while using archtorify? I find it helpful to be able to change the tor circuit with a button. I wish there was something like that in firefox when using torify.
I think I’ll modify archtorify to change the circuit every so often. Perhaps I can check for internet speed and choose different circuits until it’s above a given speed.
There’s no point of using tor browser while using archtorify. I haven’t tried such a thing. Tor Browser additionally protects against fingerprinting which archtorify does not. You’ll be able to do that by restarting archtorify using “archtorify -r”.
Absolutely, that’s the advantage of free software! :)