[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-talk] Getting of Tor Browser



We talk about it day ago on some web-resource. Possible with you personally :-)

Linux provided system Tor-daemon seems more secure then tor started from user.

I propose next steps but concern about any "Gotcha!" here:

1) Download, check gnupg signatures and unpack tor-browser. 

Keep system Tor-daemon from deb-package http://deb.torproject.org/torproject.org with carefully settings including your transparent firewalling.

2) Activate plug-ins (HTTPS-Everywhere, NoScipt, TorButton) with copying:

cp -r ../tor-browser_en-US/Data/profile/extensions/* ../tor-browser_en-US/App/Firefox/extensions

(or use symlinks).

3) Don't run Bundle start script, ignore vidalia and tor from bundle.

Run '../tor-browser_en-US/App/Firefox/firefox' directly. Check that plugins is working and you use system tor correctly without leaking information (Use Torstatus check sites, local sniffers).

4) Don't use vidalia. Use 'sudo killall -SIGHUP tor' instead of vidalia newnym control-port command. And restart your tor-browser after that newnym.

Any comments? 



_______________________________________________
tor-talk mailing list
tor-talk@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk