-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Hi,
Am 2014-10-09 um 22:11 schrieb Tor Zilla:
Also a quick question jumped in.. Say i have a Raspberry PI which is converted to a TOR router and i connect my machine to this router. Will this make the entire traffic go via TOR including something as simple as a ping request. Say i ping a machine on the web, will it stay anonymous or i will have to use proxychains, for what i know both of them are doing the same thing apart from encryption in TOR as an added feature.
you may want to read the following [1] about TOR as a transparent proxy.
Also Adrelanos from whonix wrote earlier on the list the following on topic of tunneling all traffic through tor:
There is tons of stuff that can go wrong: - not using Tor Browser - Tor over Tor - identity correlation through circuit sharing - malconfigured firewall - IPv6 leak - network time synchronization
You may want to check out their page [2] too, they are developing a system with security in mind but ready for almost daily business work, all routed over TOR.
Cheers,
Chris
[1] https://trac.torproject.org/projects/tor/wiki/doc/TransparentProxy [2] https://www.whonix.org/wiki/Main_Page