9
1
How can I set Tor to route all of my internet traffic? So, if I want to use any program to connect to a website or send requests to it, is there any way that I can make Tor hide my IP at all times?
9
1
How can I set Tor to route all of my internet traffic? So, if I want to use any program to connect to a website or send requests to it, is there any way that I can make Tor hide my IP at all times?
5
Yes you can use Tortilla is a program designed to create a virtual adapter which uses only tor connection, the program is here https://github.com/CrowdStrike/Tortilla
4
This is a near-identical question to this. In the program you're looking to redirect, find the setting for defining a 'proxy', and use IP 127.0.0.1 (or 'localhost) and port 8118.
1
That being answered, you may not want to. Vidalia includes a browser configured with settings, protocols, along with certain features removed to cover 'holes' in a normal network-application's use. If you feel the need to ask this, then you shouldn't feel confident that you'll be secure. As @Keltari noted, Tor's article is a good explanation as to why you shouldn't.
– Solemnity – 2013-01-21T03:11:20.3771
If you run the Tor Browser then go into your network settings and tell all network activity to go through the Tor proxy then that theoretically should do it.
Like in this how to: http://www.wikihow.com/Route-All-Network-Traffic-Through-the-Tor-Network
1
This scripts seems to be exactly what you're looking for:
https://github.com/GouveaHeitor/nipe
This Perl Script enables you to directly route all your traffic from your computer to the Tor Network ...
1
You really wouldnt want to. Tor is an extremely slow network, designed for viewing web pages anonymously (with lots of caveats). Also, there is no guarantee that your application would keep your anonymity. A perfect example of not running other applications through Tor's network is explained by this article from the developers of Tor.
6-1. This does not answer the question. – gsingh2011 – 2015-11-19T23:20:25.643
1+1. I disagree wit those stating this should not be an answer, If there is no way to do something with the effect the OP would like to achieve (in this case, a reasonable assurance of anonimity), then there is no good way to do it, and to point out that this is so is a better answer than providing a recipe which is leaking from its every pore. – MariusMatutiae – 2016-11-12T16:22:55.420
@MariusMatutiae there are legitimate reasons for wanting to do this, so this answer is just a comment. Whether or not it's sage advice in most situations is irrelevant. – quant – 2019-02-03T18:01:07.240
9This is better-stated as a comment than an answer, however wise this statement is. – Solemnity – 2013-01-21T03:38:08.487
What is the operating system used and is this going to include the kernel level network calls, such as phone home calls to check for updates, or is this going to apply to only the application layer of the user space? – Yokai – 2017-09-18T03:56:47.267