27casanov...@gmail.com:
Any links on this explaining it in depth and showing how to sett it up?
I looked in to Qubes site but dident find it.
You should be fine without doing any packet capture. As long as you
install and use the whonix VM and leave most everything as default, you
shouldn't have to worry much about leaks. It's quite a reliable setup,
as long as you don't do anything unusual when installing/configuring.
awokd is right in that your upstream will just see Tor traffic. Much
like if you use a VPN, they will see VPN traffic. Tor traffic is
designed to look (superficially) like generic HTTPS traffic. However, if
someone knows what they're looking for, it's not hard to recognize Tor
traffic based on its characteristics.
If this is a problem for you, you can try using pluggable transports[1]
and/or bridge nodes. The 'meek' transport, for example, makes Tor
traffic look like regular traffic going to Google App Engine.
Someone might be able to help you better on one of the Tor mailing
lists: https://lists.torproject.org/
[1] https://2019.www.torproject.org/docs/pluggable-transports.html.en
-------------------------------------------------
This free account was provided by VFEmail.net - report spam to ab...@vfemail.net
ONLY AT VFEmail! - Use our Metadata Mitigator to keep your email out of the
NSA's hands!
$24.95 ONETIME Lifetime accounts with Privacy Features!
15GB disk! No bandwidth quotas!
Commercial and Bulk Mail Options!
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/7243ca94-3897-d64d-7109-973b6f5894dd%40vfemail.net.
For more options, visit https://groups.google.com/d/optout.