My very first considerations...
> What are the dangers of using apt-get over Tor?
>
> Is privoxy + Tor the safest way to go?
I don't think so.
> What attacks are possible?
1. Some are documented in the Torify HOWTO. [1]
2. Stale mirror attack. [2]
3. What kind of software you have installed. [
What are the dangers of using apt-get over Tor?
Is privoxy + Tor the safest way to go? What attacks are possible? Any idea if
there a way to setup a iptables firewall to prevent leaks? I don't think it
currently leaks although should there be a risk introduced in the future a
firewall that cou