Thanks Daniil. I'll try that.

Em terça-feira, 19 de maio de 2020 08:53:09 UTC-3, Daniil Travnikov 
escreveu:
>
> Try this on your browser:
>
>
> About:config
>
> network.proxy.socks_remote_dns  >> Choose >>  false
> preferences  --advanced----netowork----settings----   >> Choose >>   No 
> Proxy
> network.proxy.type    >> Choose >>    0
> network.http.sendRefererHeader    >> Choose >>    0
> network.cookie.cookieBehavior    >> Choose >>    2
>
>
>
> On Sunday, April 19, 2020 at 12:06:06 AM UTC+3, Anhangá wrote:
>
>>
>>
>> Em sábado, 18 de abril de 2020 16:24:22 UTC-3, Chris Laprise escreveu:
>>>
>>> On 4/18/20 9:26 AM, Anhangá wrote: 
>>> > But is it possible to somehow make TOR Browser to access clearnet 
>>> using 
>>> > a VPN connection after the TOR routing? Do I have to do some special 
>>> > config in the TOR Browser to allow that? 
>>> > 
>>> > Em sábado, 18 de abril de 2020 10:07:16 UTC-3, Jarrah escreveu: 
>>> > 
>>> >      > My goal is connect to my VPN after the TOR routing (Bypass the 
>>> >      > tor censorpship in some websites). 
>>> >     This somewhat defeats the purpose of using TOR. You now have an 
>>> >     identifiable address due to having a (hopefully paid) vpn. They 
>>> can 
>>> >     track you. Any anonymity provided by TOR is taken away by the VPN. 
>>> >      > The problem is, when I set mt whonix-workstation to connect to 
>>> >     sys-VPN over 
>>> >      > whonix-gw, My Tor Browser do not work anymore. If I disconnect 
>>> >     the VPN 
>>> >      > inside sys-VPN, the Tor Browser start working as usual, but 
>>> when 
>>> >     my VPN is 
>>> >      > connected, it stops. 
>>> > 
>>> >     This is by design. TOR browser assumes it can speak TOR protocols 
>>> and 
>>> >     connect to .onion addresses (etc). However, the VPN will come out 
>>> onto 
>>> >     the clearnet, rather than TOR's network. TOR browser cannot lookup 
>>> TOR 
>>> >     addresses, nor can it connect to anything relying on TOR. 
>>> > 
>>> >     If you want to do this to access clearnet sites, you'd have to use 
>>> a 
>>> >     standard browser. The VPN should work just fine, so long as you're 
>>> not 
>>> >     trying to connect to TOR specific services through it. Though, 
>>> please 
>>> >     see above warning about doing so. 
>>> > 
>>> >     The only reason I can think of to do this is if you live in a 
>>> location 
>>> >     that blocks VPNs, but is fine with TOR. Otherwise, you have 
>>> exactly the 
>>> >     same security model as just using the VPN, plus the overhead and 
>>> attack 
>>> >     surface of TOR/Whonix. 
>>>
>>> Someone on the Whonix forums might know the definitive answer to your 
>>> question. But I'd guess there is little or no advantage to using 
>>> Torbrowser over Firefox when it can't speak to the Tor router. 
>>>
>>> Note that Firefox has recently incorporated some Torbrowser features, so 
>>> you could use it with Tracking Protection set to Strict, and 
>>> 'privacy.firstparty.isolate' set to True, 'privacy.resistFingerprinting' 
>>> set to True, in addition to using the User-Agent Switcher extension. I 
>>> think these are a good idea whether or not you use a tunnel or proxy. 
>>>
>>> -- 
>>> Chris Laprise, tas...@posteo.net 
>>> https://github.com/tasket 
>>> https://twitter.com/ttaskett 
>>> PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886 
>>>
>>
>> Thank you for the answer Chris.
>>
>> I'm not planning to use Firefox over a TOR connection. I just want to use 
>> the TOR browser but, in the tor end node, route my traffic to a VPN and 
>> then to the Internet.
>>
>> I set the ProxyVM as you said in the qubes-vpn-support and it worked just 
>> fine. LINK IS UP and running. But if my ProxyVM is running my VPN 
>> connection, TOR browser in the Whonix-WS do not work. If I disconnect the 
>> VPN inside my ProxyVM, TOR browser also works just fine. The problem is 
>> only when I'm trying to use TOR Browser with VPN link UP. So, I'm guessing 
>> that is some config that I have to do inside TOR Browser to use my VPN
>>
>> The newest firefox has some really good anti-fingerprint features, but 
>> nothing compares to TOR Browser, like in-depth fingerprinting combining 
>> settings as Screen Resolution and viewport...
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/3833f72e-5235-4969-bea6-7ada065bd19b%40googlegroups.com.

Reply via email to