portdirty.blogg.se

Lost in random torrent
Lost in random torrent













lost in random torrent
  1. LOST IN RANDOM TORRENT HOW TO
  2. LOST IN RANDOM TORRENT INSTALL

Correct me if I’m wrong / have misunderstood that. While it seemed to me that whonix was providing additional measures beyond those inherent to such a setup. Yes, but this is true of any such virtual workstation plus gateway combo. What this does, is make IP leaks almost impossible, since to find out were, which traffic is from it would be necessary to both exploit the gateway and workstation at the same time.

lost in random torrent

Then, it connects with the workstation, which is not connected to the outside world in any direct way.

LOST IN RANDOM TORRENT HOW TO

So what I have asked is how to have it ALSO choose to send certain other traffic down the NON-Tor network. The gateway has access (to a virtual NAT’ting router, not the) network, and CHOOSES to force all that traffic down the TOR pipe. If that were true, whonix wouldn’t exist / there would be no reason for it to exist - so, whonix is bringing much more than that in the special sauce it brings to the table.

LOST IN RANDOM TORRENT INSTALL

(Not just through the compartmentalization inherent to such setups.)īy your statement, since one’s typical physical router, or inlining a second one, is essentially equivalent to the virtualbox nat / whonix-gateway combination, merely running torbrowser on any host install is the equivalent to whonix. And ignores what intuitively seems to be (correct me if I’ve misunderstood) the whonix-gateway’s special sauce that further massages such traffic into additional anonymity. Arguably, this is true of anything used as a gateway. The gateway has access to your network card and uses this access, to connect to the Tor network. The reason Whonix is able to prevent IP leaks is that the only connection to the outside world happens over the gateway. Then you have read, not, been shown, VERY wrongly. OK, (a) why is that / explanatory documentation? (Not do anything to gateway, that is.) (b) VPN is in essence a routing of traffic, so intuitively this seems the appropriate sweet spot to put it.This question shows me that you seem to not really have read any of the basic documentation for Whonix.

lost in random torrent

Had I seen the answer, having perused the documentation, I wouldn’t have asked. (However, I don’t see accompanying ‘See (this section) part of the documentation?’ (rather than did you read the entirety of the documentation), would be more than fine. I get that whonix (TOR) only passes TCP traffic.Īnd I see that TOR asks that it not be used for bittorrent use, understandably. I see there are documents surrounding whonix-/vpn use in the wiki, in the (advanced) security topics.















Lost in random torrent