Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How to force whole-network Tor with LAN -> Tor -> WAN configuration?

    Scheduled Pinned Locked Moved General pfSense Questions
    48 Posts 10 Posters 48.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F
      fragged
      last edited by

      Time to loosen the tinfoil hat.

      1 Reply Last reply Reply Quote 0
      • T
        tim.mcmanus
        last edited by

        @badon:

        Because what I've described obliterates ALL encryption.

        Um, Tor…

        And, most importantly, what gives you the idea that you know anything at all about what other people are encrypting?

        Usually you encrypt things you don't want people to see.  You're either severely paranoid or doing something really bad.

        If you will kindly give me your login credentials for this forum, I will write your opinion for you, posing as you. I might then proceed to proclaim your love of evil and all things forbidden, once again, posing as you. You don't like the sound of that? Oh, then it looks like you need "THAT much really bad" encryption too.

        It's actually a violation of the terms of using this board, sharing of login credentials.  And I like it here, so, no, I won't share.

        No, sir, you can take your opinion of what I'm doing with my encryption, and shove it  - into your favorite encryption tool, and then delete the key.

        I thought what you were doing obliterated all encryption.  Are you sure you know what that word means?

        1 Reply Last reply Reply Quote 0
        • B
          badon
          last edited by

          @badon:

          Because what I've described obliterates ALL encryption.

          @tim.mcmanus:

          Um, Tor…

          Yes, Tor. Onion routing is fundamentally onion encryption. The only reason the onion routers don't know the source or destination of packets is because they're encrypted. No encryption, no Tor. Encryption backdoor, Tor backdoor.

          @badon:

          And, most importantly, what gives you the idea that you know anything at all about what other people are encrypting?

          @tim.mcmanus:

          Usually you encrypt things you don't want people to see.  You're either severely paranoid or doing something really bad.

          I wear clothes too.

          @badon:

          If you will kindly give me your login credentials for this forum, I will write your opinion for you, posing as you. I might then proceed to proclaim your love of evil and all things forbidden, once again, posing as you. You don't like the sound of that? Oh, then it looks like you need "THAT much really bad" encryption too.

          @tim.mcmanus:

          It's actually a violation of the terms of using this board, sharing of login credentials.  And I like it here, so, no, I won't share.

          You missed the point. Without effective encryption, you don't have to share your login credentials, they can simply be taken from you. Are you using an American-made CPU?

          @badon:

          No, sir, you can take your opinion of what I'm doing with my encryption, and shove it  - into your favorite encryption tool, and then delete the key.

          @tim.mcmanus:

          I thought what you were doing obliterated all encryption.  Are you sure you know what that word means?

          You missed the point again. The point was that the encryption key isn't required. Don't worry, you won't lose your opinion by encrypting it, even if you do delete the key.

          1 Reply Last reply Reply Quote 0
          • K
            kejianshi
            last edited by

            I think most people want privacy, assume they have it and therefore assume anyone excited about internet privacy must be a criminal or something.

            I don't think tor is the way to go though.  Its slow and has to many limitations.

            A good VPN would be better.

            1 Reply Last reply Reply Quote 0
            • F
              firewalluser
              last edited by

              Tor hasnt been that slow for me, but tails for example is not secure or hardened in any way, in fact alot of the so called privacy products when I started investigating them appear to do the opposite especially when considering how easy it is to stand out by virtue of running something different to everyone. In some respects the misdirection are the claims of affording some level of privacy, just like Snowden is a false flag as the spooks didnt know how to break it to the world the capabilities they have some of which go back last century.

              The US or UK is no better or worse than Russia, China or North Korea, they still ignore their own laws when it suits them.

              If anything, for privacy you'd probably want to use the most popular computer device and OS out there in order to blend into the crowds, beit a phone, laptop, tablet or desktop, and even then you still have stingrays to deal with, but if they want to target you, you have no privacy at all, lets face it even the land lines in your offices and homes are powered up 24/7 to listening in at will which is also handy in case of a powercut.

              In the mean time this still hasnt stopped a few US companies taking out patents on stuff I've been working on, which is why people are financially cleansed in the same sense as ethnic cleansing was outlawed after WW2, as money makes developments, patents, lawyers etc all possible, which a one man band like myself simple cant compete with.

              Ironic really how history repeats in many ways.

              Capitalism, currently The World's best Entertainment Control System and YOU cant buy it! But you can buy this, or some of this or some of these

              Asch Conformity, mainly the blind leading the blind.

              1 Reply Last reply Reply Quote 0
              • B
                badon
                last edited by

                @kejianshi:

                I don't think tor is the way to go though.  Its slow and has to many limitations.

                A good VPN would be better.

                Tor IS the way to go. It works very well for me. It works so well I can do VoIP with it, and still have acceptable latency. It's amazing and surprising it works, but it does indeed work. Oh, and I use a VPN via Tor to tunnel UDP traffic through Tor's TCP-only limitation. So, I have 3 Tor hops, 1 VPN hop, and one final destination VoIP hop. That means I'm routing my VoIP calls around the world at least 5 times before they arrive at at the other end of the conversation, and it still works amazingly well! Anyone could do this with satisfactory results if they wanted to.

                1 Reply Last reply Reply Quote 0
                • K
                  kejianshi
                  last edited by

                  I doubt seriously your UDP voip packets are going out via tor.  If you have a TCP solution that is routable over tor, it would not be usable.

                  1 Reply Last reply Reply Quote 0
                  • K
                    kejianshi
                    last edited by

                    I think 1 of two things is happening.  Either you are using a phone with a 2,3,4 or 5 second delay…  (horrible)
                    Or its working well and its not being handled via tor.

                    1 Reply Last reply Reply Quote 0
                    • D
                      dieterzakel @badon
                      last edited by

                      @badon

                      How did you install Tor on your pfSense system?
                      And how did you route your traffic through TOR then?
                      Thank you very much!

                      ? 1 Reply Last reply Reply Quote 0
                      • ?
                        A Former User @dieterzakel
                        last edited by

                        @dieterzakel, Do you already have it ready?

                        1 Reply Last reply Reply Quote 0
                        • JonathanLeeJ
                          JonathanLee
                          last edited by

                          Is this similar to proxy chains or apples private relay services?

                          Make sure to upvote

                          1 Reply Last reply Reply Quote 0
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.