DebianThis forum is for the discussion of Debian Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Remind me again; what is the advantage of Vidalia?
You can always configure Tor and either use it as a socks proxy or via other proxy-software. Also look for torsocks and torify.
Distribution: Slackware64-current with "True Multilib" and KDE4Town.
Posts: 9,096
Rep:
I've used the Vidalia and Tor combinationi for years, but it no longer considered "safe" by the Tor-project, so I switched to their Tor Browser.
OTOH, the people over at pc-bsd have made Tor available from the system tray and once activated everything you do, regardless of browser, is routed through Tor. I guess "safety" is a matter of opinion (and good browsering habits).
OTOH, the people over at pc-bsd have made Tor available from the system tray and once activated everything you do, regardless of browser, is routed through Tor. I guess "safety" is a matter of opinion (and good browsering habits).
Code:
user@machine:~$ type w3m
w3m ist ein Alias von `torsocks /usr/bin/w3m -no-proxy'.
user@machine:~$ type wget
wget ist ein Alias von `torsocks /usr/bin/wget -nc --no-proxy'.
user@machine:~$ echo $http_proxy
http://localhost:8250
Sorry for the uncivilized language in the response to type.
Distribution: Slackware64-current with "True Multilib" and KDE4Town.
Posts: 9,096
Rep:
Quote:
Originally Posted by Michael Uplawski
Code:
user@machine:~$ type w3m
w3m ist ein Alias von `torsocks /usr/bin/w3m -no-proxy'.
user@machine:~$ type wget
wget ist ein Alias von `torsocks /usr/bin/wget -nc --no-proxy'.
user@machine:~$ echo $http_proxy
http://localhost:8250
Sorry for the uncivilized language in the response to type.
Care to translate? I don't understand the purpose of this post?
Care to translate? I don't understand the purpose of this post?
I was simply showing a way to insist on routing via tor that does not include having some program installed which is supposed to do the same. The 'type' command shows you what is really behind a command. In my post above, I present aliases that I have defined for calls to network-tools. These aliases replace the original calls by a call to torsocks, which, itself, then calls the tool. All traffic that I am aware of, is then routed via tor.
Basically it does the same as any nifty routine which sits in the tray somewhere to route all traffic via tor. But my solution works without X and I feel much more in control.
When I talk about the language, it is because my system uses the German locale and the response to the type-command, above, is in German.
I think I have to write too much explanatory text, but in this case ignore how I should prevent more misunderstanding. On a sidenote, this is a bit frustrating.
Last edited by Michael Uplawski; 05-09-2016 at 01:28 PM.
Distribution: Slackware64-current with "True Multilib" and KDE4Town.
Posts: 9,096
Rep:
Quote:
Originally Posted by Michael Uplawski
I was simply showing a way to insist on routing via tor, that does not include having some program installed which is supposed to do the same. The 'type' command shows you what is really behind a command. In my post above, I present aliases, that I have defined for calls to network-tools. These aliases replace the original calls by a call to torsocks, which, itself then calls the tool. All traffic that I am aware of, is then routed via tor.
Basically it does the same as any nifty routine which sits in the tray somewhere to route all traffic via tor. But my solution works without X and I feel much more in control..........
Thank you.
Not everyone speaks fluent "Geek," so it is appreciated.
Last edited by cwizardone; 05-09-2016 at 02:20 PM.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.