2/13/2023 0 Comments Setting up a private tor bridge![]() ![]() ![]() I've been writing a script pack for this occasion, your lucky day, because I just published the first draft of a script pack that when done will also allow for auditing your configurations security too. Though I wouldn't recommend using WiFi the guides that cover the subject can easily be modified via trading wlan0 for eth1 on your gateway and wlan0 for eth0 on your workstation. These guides also go under the name of "Tor WiFi hot-spot" too so perhaps expand your search queries to Linux in general and Tor specifically. The requirements for your gateway will be that it has two network interfaces, this can be eth0 and eth1 or usb0 or ppp0 and your workstation (client) should only have one physical network interface preferrably eth0 or usb0 try to avoid wlan0 as tempting it is you'll leave yourself open to more localized attacks and monitoring that is not simple to mitigate and easy to attack. ![]() The RaspberryPi team at Adafruit host a fairly well put togeather guide on how to set up physical isolation with custom torrc configs and iptables magics. What you are likely looking for is referred to as a middle-box or private bridge for your gateway device and client ( trans-proxy) setup. These terms are used interchangeably and there are other terms that these kinds of setups are called, I'll try as much as possible to use the Whonix terms for most of the following. Proxied client Tor ~=~ workstation Whonix ![]() First some notes I hit the StackExchange character limit so this is an abriged answer use wisely -) ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |