• makeasnek@lemmy.ml
    link
    fedilink
    arrow-up
    38
    arrow-down
    2
    ·
    1 year ago

    Tor Browser has many security changes made to it from vanilla firefox to make sure your privacy is protected. This is an interesting project, but it can’t provide that same level of security. A disclaimer about this really should be on the github page.

    • eterps@sopuli.xyzOP
      link
      fedilink
      arrow-up
      16
      ·
      1 year ago

      Lots of people use their vanilla browser when connected to a VPN, this is not just for Tor, neither does it claim to be an alternative to using Tor browser or Mullvad browser.

    • cooopsspace@infosec.pub
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 year ago

      I run a bunch of stuff from my phone down Tor on an app by app basis. It’s not necessarily the added security but generating traffic and noise.

      • Clay_pidgin
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        How do you do that? It sounds cool. I’d be happy to add traffic to the network.

  • candyman337
    link
    fedilink
    arrow-up
    5
    ·
    1 year ago

    Oh man I’ve been looking for something like this, hell yeah

  • pazukaza@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    I usually have a VPN client running in a container and then attach the browser instance to the network namespace of the container.

      • pazukaza@lemmy.ml
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        Mmm do you know Linux containers? Like Docker containers, for example?

        You need to understand Linux namespace and Linux containers to understand this trick. It isn’t super advanced to be honest, just a Linux feature that is very useful.

        It can be overwhelming if you haven’t worked with containers before: https://youtu.be/fTcit7F5Bcg?si=rQlq0mJyapIpOlx8

        Basically you can have multiple “network stacks” in the same machine, and they are isolated. By network stacks I mean things like the netfilter rules and the routing rules.

        So, if you deploy a VPN inside a network namespace that isn’t the host’s namespace, the host won’t route the traffic to the VPN by default. Only the processes that are attached to that network namespace will process the network packets with the netfilter and routing rules of that namespace. So, if you only attach the Firefox process to the network namespace of the VPN, only the traffic generated by that process will go through the tunnel.

  • Asymptote@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    2
    arrow-down
    6
    ·
    1 year ago

    Why not both? Both is cool. Some people don’t trust VPNs. Some people don’t trust Tor.

    Using both means if someone wants to get at you they likely have to compromise both.