[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Nice to meet you! / WhatsApp by Tor?

On Tue, 16 Apr 2019 12:22:53 -0400
"GTI .H" <gti9070h@xxxxxxxxx> wrote:

> Em ter, 16 de abr de 2019 às 12:13, Cyaniventer
> <cyaniventer@xxxxxxxxxx> escreveu:
> > Anyways, imo you should just use orbot (probably dead) or something
> > like that and route all your traffic using orbot vpn (it sets up a
> > tunnel if you want to route other apps)  
> Is it enough to hide the IP from the source ???

No! Don't use it if you are actually very serious about this.

> > or whatever you want and set that vpn to
> > `always on`. Idk what else you can do, also your first method of
> > routing your traffic through your computer is not that good.
> >  
> Why?

because what if something fails somewhere and your ip gets leaked? are
you really sure that everything you've setup will work without fail?
Also see nathan@xxxxxxxxxxx 's email, > Since WhatsApp is executable
code on your Android phone, it can access information about your device
directly. This includes accessing your "real" IP address through local
network information APIs.
> > If you are real serious about this thing then just setup a virtual
> > machine and route all traffic from that vm through Tor. This is the
> > best method that comes to my mind.
> >  
> Could you give me more details?

The idea is you'll setup a virtual machine and route all traffic from
that vm through Tor. First search result is ->

Note: I don't know how they did it and didn't read that article.

BBBB 882A 5A00 FCB6 8704 E9BC 757D E342 DB4E 576C
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to