
This is a "fast" SOCKS port suitable for browser use a new circuit is established every ten minutes.īy default, the Privoxy HTTP proxy is enabled if you enable Tor client functionality ( ). Privoxy listens on port 8118 and is configured to route to the fast SOCKS port. Tor wrappers: torsocks, torsocks-faster and tsocks It is highly advisable to route HTTP traffic via Privoxy rather than via SOCKS directly. Tor wrappers such as torsocks and tsocks can be used to intercept network API calls in applications to direct network activity over a Tor socks port. This allows non-Tor-aware, non-SOCKS-aware applications to have their traffic routed over Tor. Tor wrappers cannot reliably prevent an application from establishing connections outside of the Tor network they merely ensure that non-malicious code using networking APIs in straightforward ways have their direct connection attempts routed via Tor. As such, Tor wrappers are not a secure isolation mechanism. Some applications, such as those using the KDE KIO framework, don't make direct connections and instead use kdeinit4 to spawn worker processes, rendering the wrappers useless.įor full isolation, run an application inside a virtual machine and configure its network activity to be routed via Tor only, with non-Tor traffic blocked. Torsocks is slightly more secure than tsocks because it blackholes UDP traffic and private IP traffic, TOR BROWSER SLOW FULL If you choose to use a wrapper, use torsocks where possible. Use torsocks-faster/the fast port/Privoxy for HTTP or protocols which break if used from several IPs (such as ICQ or FTP). Tsocks is the weakest wrapper, but it is necessary if your application needs to make localĬonnections or makes DNS queries in a way not handled by torsocks. Only works with tsocks and leaks DNS queries. However, it isn't unheard of for proxy support to have bugs or for application plugins to ignore proxy Some applications have native support for SOCKS proxies, and it is tempting to use such support.
