ashleybrown...@tutanota.com wrote on 2/19/19 4:05 PM:


Creating a tor
netvm is rather straight forward (and a dispvm that includes the Tor
Browser if you like to use that as well). If there is enough interest, I
can also write up a summary on how to do that in Qubes.


Please, it would be greatly appreciated. Especially on how to ensure no clear 
traffic happens and that it only goes over tor.

What you're describing is one of the primary goals of Whonix. They have also done a lot of work around anonymizing applications and time sync, which I doubt the procedure above will cover. Unless you know and are prepared to address the possible anonymity compromising details of the individual applications and distribution you are planning on using (see https://phabricator.whonix.org/maniphest/query/all/ for ones they've considered), it's likely safer to stick with Whonix. See also http://www.dds6qkxpwdeubwucdiaord2xgbbeyds25rbsgr73tbfpqpt4a6vjwsyd.onion/wiki/Trust for a longer discussion on Whonix and trust.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/369d71c9-d570-b5cc-bb3d-9a0e5e5006fa%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.

Reply via email to