Recent comments in /f/Tor

not_bob wrote

Let me go into more detail. Don't use the same browser for clearnet and tor. Never do this.

It's best to clear the data from whatever browser you use for tor every time you start it. The tor browser does this on it's own. It would be easy enough to correlate you via left-over browser data.

You should really be using the tor browser unless you have a specific need to not.

Don't use javascript unless you really need it. That can expose you. Not only that, but who wants to run untrusted code? This will break some sites.

Don't mix your lives. Your bank account should never be accessed over tor. Nor your facebook, twitter or whatever else. Unless that's the only way you ever access it. Think political bloggers in some less than free countries. It depends on your case use. But, never login with the same account on both networks.

4

Rambler OP wrote

Thanks!

~$ torsocks curl -s https://check.torproject.org/ | grep Congratulations.
 Congratulations. This browser is configured to use Tor.
 Congratulations. This browser is configured to use Tor.

Still no go in Thunderbird with setting up the proxy. I'll dig into it more, because I think that's the ticket. The TorBirdy plugin is outdated and has been for a while, which is what seems to be used previously. I may boot up in Tails or something similar to see if the issue persists.

1

Rambler wrote

Reply to comment by boobs in Requirement for a exit node? by Jogger

the primary requirement for an exit node that no one tells you about:

balls of steel.

Has anyone ever been arrested or held legally liable for running an exit node (in a modern country, like the US/CA/UK/Etc)?

I've thought about running one as well since my server provider is okay with it as long as I handle the abuse complaints which is basically copy/pasting a cookie cutter response on how it's an exit-node and not possible to tell the origin of whatever it is the complaint is about.

1