@shelldozer
Its another drone-training website for Screw-gle.

Its fine, we know is sub-optimal and to use . As per , we also know TorBrowser performs better whenever add-on is used.

We recommend implementing , including for ie. ones firewall should redirect all port 53 DNS requests to Tor's 5353 port. One may need to find creative ways to set the time, but it's better than not doing .
@lproven @anomalocaris

#brave #torbrowser #TailOS #ublock #TransparentTorification #dns #torification

Last updated 1 year ago

@Rob @mconley @gunchleoc
Yes, even better by using TorBrowser in Safest Mode you are helping defeat a lot of bad actors, too. Not just 'Screw'-gle.

We say , ie. putting all your traffic through Tor, is fine too and for heaven's sake use , especially for .

Onion all the things — if your bank doesn't like it, get them to send you out a cheque book. They will **love** that

#TransparentTorification #i2p #torrenting #onionMaximalist #makejavascriptoptional

Last updated 1 year ago

@jens
DoH goes to a clearnet IP address, and port 443, but is supposed to take any new connection not going through Tor and put it through Tor, no?

So unless the application itself, in this case , outs your IP address, you should be safe.

@JulianOliver

#TransparentTorification #doh

Last updated 2 years ago

We've identified a flaw in the Wiki on .

If the queries are sent direct to your then the following rule/line in their setup will permit that **before** the DNS query is redirected to 5353.

--ipv4 -A OUTPUT -d 192.168.0.0/16 -j RETURN

The above line must be moved down two lines, to below the "udp --dport 53" line.

See wiki.archlinux.org/title/Tor#T

Please fix ASAP if you have access.

#archlinux #TransparentTorification #dns #router #iptables #transparentProxy #tor #archLinuxWiki

Last updated 2 years ago