https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO
https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/IsolatingProxy

quote:
In short, do not torify any applications yourself unless you know exactly what you are doing... If you don't fall into one of these two categories then for your own security, stick with the Tor(IceCat) or
https://www.torproject.org/docs/debian.html.en

Do not use automatic software updates over Tor that do not verify downloads. That being said, operating system updates are generally secure. If you use GNU/Linux and only your package management software suite, then you can consider your self safe

http://pkgs.org/debian-wheezy/debian-main-i386/anon-proxy_00.05.38+20081230-2.1_i386.deb.html
https://en.wikipedia.org/wiki/Squid_%28software%29
http://www.blackhatworld.com/blackhat-seo/proxies/222258-create-your-private-secure-high-anonymous-proxy-step-step-guide.html

Reply via email to