back when I used ubuntu derivatives I used privoxy and edited the config file to route all my traffic through tor.
I just did the same on debian 12.6 and wonder if there’s a better alternative.
You point your main active network interface gateway to a tor gateway or proxy.
You point your main active network interface gateway to a tor gateway or proxy.
Am I doing that editing the privoxy config file with this line?
‘forward-socks5t / 127.0.0.1:9050 .’
I now set up tor for firefox manually using https://www.wikihow.com/Use-Tor-with-Firefox. If the edited privoxy cofig file is the right way to go, didn’t I just double torify?
#Whonix is what you need, unless you find this solution too heavy
Install tor (from the official repo) then set up a proxy for SOCKS5 localhost port 9050
You may want to look into Qubes, it can natively route an entire OS through Tor. Note that routing all your traffic may hurt your anonymity. For example, there what if an app on your machine reaches out to somewhere and reports the serial number of a piece of hardware and it does it through your “anonymous” Tor connection? Virtualizing that hardware can help avoid that. Think through your threat model.