Skip to content

Tor Setup

Gaurav Raj edited this page Apr 7, 2024 · 1 revision

Tor Setup

Approach

When it comes to TOR integration and setup, Vigilante Arch OS takes a slightly different approach compared to TailsOS. While TailsOS provides a prompt to set up TOR either for the entire system or specifically for the browser and certain applications, our approach caters more to the needs of hackers, security professionals, and enthusiasts.

Considerations

In our line of work, whether conducting reconnaissance or research, tasks often involve significant time and generate considerable network traffic. Relying solely on TOR for all these activities can quickly raise suspicion among network administrators due to the noticeable increase in TOR traffic. To address this, we adopt a more strategic approach:

  • TOR Browser Default: The TOR Browser is configured to use TOR by default, ensuring anonymity for web browsing activities.

  • Selective Proxying: For other applications and utilities, we employ proxychains to selectively route traffic through TOR, avoiding unnecessary attention and potential suspicion.

Implementation

Within the live system, we've simplified the process by creating an alias named vig with the additional configuration for maximized anonymity, for configuring proxychains through TOR. Here's how you can utilize it:

  1. Start TOR Service: Initiate the TOR service using the vigilante alias:
vigilante
  1. Monitor Network Activity: Keep track of network bandwidth and ensure maximum anonymity using the nyx utility:
nyx
  1. Proxy Commands Through TOR: Utilize the vig alias (proxychains) to run commands through TOR:
vig <command-to-be-proxied-through-tor>

# Example:
vig curl -v https://check.torproject.org

However, in the upcoming updates, we are going to also provide users with a prompt to either use this approach or just utilize the tor setup systemwide.

By following these steps, you can effectively leverage TOR for specific tasks while maintaining discretion and anonymity, essential in the realm of cybersecurity and privacy.

Clone this wiki locally