Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.
If your logging in somewhere, please do so under https:. Tork DOES leak at the point where DNS is converted to domain on exit.
I've bundled all dependencies and updated Tor to latest version. Activate the module, uncomment line 1196 of /etc/privoxy/config and run the wizard once it starts.
You will need to change your firefox proxy setting under: Edit/preferences/Advanced/Network/Settings
Change your HTTP proxy to 127.0.0.1 port 8118 and for socks4 127.0.0.1 port 9050.
If you get an error message in logs about local time zone, make sure you set the correct time zone in the control setting of Porteus. Keep in mind if you browse the Porteus forums using this, and switching to normal IP you are likely to incur the automatic IP banning we have in place.
http://porteus.googlecode.com/files/tor ... k-i686.xzm
Post links to your 32-bit module repos here. Repo maintainers are responsible for resolving any issues caused by their xzm's.
2 posts • Page 1 of 1