Hello,
How to launch "tork-trinity" ? (anonymous navigator).
Thanks, regards,
André
On Thursday 25 April 2019 08:05:26 andre_debian@numericable.fr wrote:
Hello,
How to launch "tork-trinity" ? (anonymous navigator).
Thanks, regards,
Andr�
ALT-F2 then just enter "tork" in the run dialog: or you can find it in the start menu, and elsewhere.
If you need help with setting up, configuration, etc., those are different questions, but I use this tork pretty much whenever I can get any program to use Tor. (And there are many different ways, depending on what you're doing).
Once you get it open, you must choose <Tools> and <First Run Wizard> (upper left). Run it the first time as client, but thereafter I always choose the options "Custom" or "configure myself" (depends on where in program that you can find these choices).
If you are at all familiar with using proxies or Tor, then the rest should be pretty easy; if not, myself or others ought to be able to help. (And I would be curious to know how others set up, if anybody shares, as this particular program has untold hidden features.)
For myself, I would like to be able to create a hidden service for my online radio station (see previous post), so that people can listen without fear of censorship, snooping, or other interference; even if they live in places with repressive governments, or other unfriendly situations.
Bill
On Thursday 25 April 2019 17:26:07 William Morder wrote:
On Thursday 25 April 2019 08:05:26 andre_debian@numericable.fr wrote:
How to launch "tork-trinity" ? (anonymous navigator).
ALT-F2 then just enter "tork" in the run dialog: or you can find it in the start menu, and elsewhere.
Thanks, but :
Alas ! ALT-F2 : impossible to execute the command tork...
$ tork command not founded...
andré
Anno domini 2019 Thu, 25 Apr 17:44:50 +0200 andre_debian@numericable.fr scripsit:
On Thursday 25 April 2019 17:26:07 William Morder wrote:
On Thursday 25 April 2019 08:05:26 andre_debian@numericable.fr wrote:
How to launch "tork-trinity" ? (anonymous navigator).
ALT-F2 then just enter "tork" in the run dialog: or you can find it in the start menu, and elsewhere.
Thanks, but :
Alas ! ALT-F2 : impossible to execute the command tork...
$ tork command not founded...
/opt/trinity/bin/tork
andré
To unsubscribe, e-mail: trinity-users-unsubscribe@lists.pearsoncomputing.net For additional commands, e-mail: trinity-users-help@lists.pearsoncomputing.net Read list messages on the web archive: http://trinity-users.pearsoncomputing.net/ Please remember not to top-post: http://trinity.pearsoncomputing.net/mailing_lists/#top-posting
On Thursday 25 April 2019 17:57:37 Dr. Nikolaus Klepp wrote:
Anno domini 2019 Thu, 25 Apr 17:44:50 +0200 andre_debian@numericable.fr scripsit:
On Thursday 25 April 2019 17:26:07 William Morder wrote:
On Thursday 25 April 2019 08:05:26 andre_debian@numericable.fr wrote:
How to launch "tork-trinity" ? (anonymous navigator).
ALT-F2 then just enter "tork" in the run dialog: or you can find it in the start menu, and elsewhere.
Alas ! ALT-F2 : impossible to execute the command tork... $ tork command not founded...
/opt/trinity/bin/tork
# updatedb # locate tork no tork founded, and no tork in /opt/trinity/bin/
On Thursday 25 April 2019 13:41:01 andre_debian@numericable.fr wrote:
On Thursday 25 April 2019 17:57:37 Dr. Nikolaus Klepp wrote:
Anno domini 2019 Thu, 25 Apr 17:44:50 +0200
andre_debian@numericable.fr scripsit:
On Thursday 25 April 2019 17:26:07 William Morder wrote:
On Thursday 25 April 2019 08:05:26 andre_debian@numericable.fr wrote:
How to launch "tork-trinity" ? (anonymous navigator).
ALT-F2 then just enter "tork" in the run dialog: or you can find it in the start menu, and elsewhere.
Alas ! ALT-F2 : impossible to execute the command tork... $ tork command not founded...
/opt/trinity/bin/tork
# updatedb # locate tork no tork founded, and no tork in /opt/trinity/bin/
Then it must not be installed. Did you try installing those packages from my list?
On Thursday 25 April 2019 23:28:57 William Morder wrote:
Then it must not be installed. Did you try installing those packages from my list?
Sorry, shame on me, confusion with another computer.
Ok, tork-trinity installed, works.
Not so easy to use it, I only need as anonymous navigator.
I prefer keep "tor", navigator : www.torproject.org/download/
Regards,
André
On Friday 26 April 2019 05:53:51 andre_debian@numericable.fr wrote:
On Thursday 25 April 2019 23:28:57 William Morder wrote:
Then it must not be installed. Did you try installing those packages from my list?
Sorry, shame on me, confusion with another computer.
Ok, tork-trinity installed, works.
Not so easy to use it, I only need as anonymous navigator.
It is pretty easy for me, now that I am used to it. If I can help you get it set up, let me know.
Tork makes it fairly easy to "torify" programs that otherwise refuse to operate over proxies.
Bill
I prefer keep "tor", navigator : www.torproject.org/download/
Regards,
André
On Friday 26 April 2019 18:16:12 William Morder wrote:
On Friday 26 April 2019 05:53:51 andre_debian@numericable.fr wrote:
Sorry, shame on me, confusion with another computer. Ok, tork-trinity installed, works. Not so easy to use it, I only need as anonymous navigator.
It is pretty easy for me, now that I am used to it. If I can help you get it set up, let me know. Tork makes it fairly easy to "torify" programs that otherwise refuse to operate over proxies.
Thanks Bill.
tork-trinity needs privoxy or a proxy. (not installed on my stretch debian).
My only objective is to use tork-trinity as navigator, but I saw that it proposes many other options...
If you can help me to introduce in that way.
Regards,
andré
On Friday 26 April 2019 09:37:05 andre_debian@numericable.fr wrote:
On Friday 26 April 2019 18:16:12 William Morder wrote:
On Friday 26 April 2019 05:53:51 andre_debian@numericable.fr wrote:
Sorry, shame on me, confusion with another computer. Ok, tork-trinity installed, works. Not so easy to use it, I only need as anonymous navigator.
It is pretty easy for me, now that I am used to it. If I can help you get it set up, let me know. Tork makes it fairly easy to "torify" programs that otherwise refuse to operate over proxies.
Thanks Bill.
tork-trinity needs privoxy or a proxy. (not installed on my stretch debian).
My only objective is to use tork-trinity as navigator, but I saw that it proposes many other options...
If you can help me to introduce in that way.
Regards,
andré
Okay, so I apologize in advance for the length, but I tried to cover all the steps. Here, I realize, it may look like a bit much; and I didn't just jump into this all at once. This is the accumulation of research and experience of using tork-trinity (or its earlier KDE3 version) since about 2005 or thereabouts. And I am sure that there are a dozen or more people reading the Trinity mailing list, who know better than I about some of this. (And please add your own tested recipes!) Make small changes, one thing at a time, until you get it configured as you want.
I am running Devuan Jessie, but this is close enough to Debian Stretch, and ought to work for you. And anyway, I am trying to move up to Stretch or Buster ASAP.
Yes, you do need to install privoxy, although tor can use some other proxies, such as polipo, etc.; but I haven't tried them.
1. You need to make sure that you have certain packages installed in order to get full functionality.
These are all the packages that I have installed specifically for tor/tork/privoxy. It is especially important that you get everything for libevent and geoip, torsocks (or maybe tsocks on some systems, but torsocks is newer); you can probably do without anything dbg or dev. I tend to do overkill, and try out everything, then discard later.
sudo apt-get install apt-transport-https apt-transport-tor geoclue geoip-bin geoip-database-extra libanyevent-perl libevent-core libevent-dbg libevent-dev libevent-execflow-perl libevent-extra libevent-loop-ruby libevent-openssl libevent-perl libevent-pthreads libevent-rpc-perl libeventviews4 libgeocode-glib0 libghc-socks-dev libghc-socks-prof libghc-vector-dev libghc-vector-doc libghc-vector-prof libkimproxy4 libseccomp2 privoxy python-geoip python-torctl tor tor-arm tor-geoipdb tork-data-trinity tork-trinity torsocks tzdata tzdata-java
You don't need these, but maybe you'll want to try them out, just because. sudo apt-get install myproxy myproxy-admin myproxy-dbg myproxy-server obfs4proxy obfsproxy ocproxy onionshare torbrowser-launcher torchat
2. It is good to have sysv-rc-conf installed (as mentioned previously), so that you can disable tor and privoxy from starting up automatically. Disable all lines for both tor and privoxy; otherwise, run "pkill tor | pkill privoxy"; but it's a bother to do this every time.
3. Once you have the packages you need, run the first-run wizard. First time you start it up, run as client, then configure as you wish; but I generally choose custom or "configure myself". Make sure that you are set up to run socks5.
4. When tork is up and running, click on <settings> and <configure tork>. Under <My Tor Client>, you want to set a password (study up on password security, if you haven't done so already). Under <Network View>, you will find categories where you can set servers to avoid, or those that you prefer as exit servers. If this is your first run, these ought to be empty. You click okay, and it's running.
Now you want to find those servers that you prefer; and later, you'll discover some that you might want to avoid.
You ought to see four columns: <Anonymize>, <Tor Network>, <Tor Log>, and <Traffic Log>. Click on <Tor Network>, then look at the top for <Servers>. Click on that, and you'll see a list of options. I currently click the choices for Valid, Fast, Exit, Running, Guard, Stable. (The others don't work so well.) Once you have clicked on these choices, you'll see that your list of servers at the left have all turned green, and all say exit. Hit ctrl-A, and capture (like copying text), then right-click, choose [* see below] "From now on", then either "Always use server as exit" or "Try to use server as exit". If you go back into Settings/Configure Tork/My Network View/Preferred Exit Servers, you will now see that your list is filled with preferred exit servers, all the ones that got branded with the green onion. You'll also note that there is a little box that reads "Use only these servers for exit"; which corresponds to that choice you made above.*
5. Another thing that you can do is to change your apparent location, by choosing in what country you want your exit server. If the EU blocks you from reading the LATimes or Washington Post (for example), you can change your server to a US server.
6. Now your tork-trinity ought to be all set up to manage tor; and this is just fine for browsing. But if you just wanted to use it for browsing, you wouldn't go to all this trouble; and there are so many more neat things that you can do now.
Click on Anonymize, and you'll see one-click choices for anonymizing Firefox, Kopete, Pidgin, etc. (This varies according on what you have installed, and not everything shows up; Opera shows up, but not Icecat or PaleMoon; Kopete and Pidgin show up, but not other chat programs.)
Farther down that list, though, is where you can do some weirder stuff.
7. Anonymous SSH Session - or, occasional god-like powers Click on this, and you will have secure shells in Konsole, which is nice for torifying various programs; for example, torrents, some browsers (arora, midori, etc.) I torify xmms over the ssh session. Also, I can download with wget, curl, youtube-dl, etc. I can do whois lookups over the ssh, and so on. (This is useful if you get blocked from certain sites for using Tor, yet you might also be blocked because you live in the "wrong" country. If you torify your program, you can sometimes have your cake and eat it, too.) In order to torify, just put that word into your command, usually preceding the usual command; e.g.: torify youtube-dl -v -c -f mp4 --no-check-certificate -R 999999 torify wget -c -t 0 --retry-connrefused --no-check-certificate
8. Anonymous Shell for Command-line Programs using HTTP/HTTPS I use it for downloading deb packages, etc., but there are other uses. In this case, instead of "sudo apt-get install" (for example), the command changes to "sudo torify apt-get install"; and modify accordingly for other apt commands.
9. There are also some configuration files that I use to modify my firewall, tor and privoxy. I use firestarter as my firewall, because I can watch activity in real time, rather than opening a log file all the time; however, I also disable ipv6, which takes some more doing. I don't know if the user-pre file can be adapted to other firewalls, or iptables, etc.
10. See attachments for config files. Here are locations for those files: /etc/privoxy/config /etc/tor/torrc /etc/tor/torsocks.conf /etc/firestarter/user-pre (NOTE that I got these configurations from somewhere on the torproject website, though I don't remember the links now.)
Not everybody cares if the Man knows that they play chess or watch cat videos; but maybe people live in places where normal innocent behavior has become suspect.
I know this seems like a lot; and it is a lot of trouble, if all you want to do is read the LATimes and WaPo where you live. But once you have figured out how to torify various programs, or to run hidden services (not there myself yet), then I feel sure that you will start to think about other possibilities.
For example, I run my own online radio station, but I cannot listen to it over a proxy, unless I torify xmms; and then it works fine. Or maybe I want to look up my local TV listings, but I don't really want to get advertising based on my viewing habits. Or I want to watch a YouTube video, but I find that it is not available in various countries.
I hope that this gives you a good start with tork. It is definitely a program worth keeping around.
Bill
On Friday 26 April 2019 20:30:42 William Morder wrote:
On Friday 26 April 2019 09:37:05 andre_debian@numericable.fr wrote:
Not so easy to use it, I only need as anonymous navigator.
Okay, so I apologize in advance for the length, but I tried to cover all the steps. Here, I realize, it may look like a bit much; and I didn't just jump into this all at once. This is the accumulation of research and experience of using tork-trinity (or its earlier KDE3 version) since about 2005 or thereabouts. And I am sure that there are a dozen or more people reading the Trinity mailing list, who know better than I about some of this. (And please add your own tested recipes!) Make small changes, one thing at a time, until you get it configured as you want.
I am running Devuan Jessie, but this is close enough to Debian Stretch, and ought to work for you. And anyway, I am trying to move up to Stretch or Buster ASAP. Yes, you do need to install privoxy, although tor can use some other proxies, such as polipo, etc.; but I haven't tried them.
- You need to make sure that you have certain packages installed in order
to get full functionality. These are all the packages that I have installed specifically for tor/tork/privoxy. It is especially important that you get everything for libevent and geoip, torsocks (or maybe tsocks on some systems, but torsocks is newer); you can probably do without anything dbg or dev. I tend to do overkill, and try out everything, then discard later. sudo apt-get install apt-transport-https apt-transport-tor geoclue geoip-bin geoip-database-extra libanyevent-perl libevent-core libevent-dbg libevent-dev libevent-execflow-perl libevent-extra libevent-loop-ruby libevent-openssl libevent-perl libevent-pthreads libevent-rpc-perl libeventviews4 libgeocode-glib0 libghc-socks-dev libghc-socks-prof libghc-vector-dev libghc-vector-doc libghc-vector-prof libkimproxy4 libseccomp2 privoxy python-geoip python-torctl tor tor-arm tor-geoipdb tork-data-trinity tork-trinity torsocks tzdata tzdata-java You don't need these, but maybe you'll want to try them out, just because. sudo apt-get install myproxy myproxy-admin myproxy-dbg myproxy-server obfs4proxy obfsproxy ocproxy onionshare torbrowser-launcher torchat 2. It is good to have sysv-rc-conf installed (as mentioned previously), so that you can disable tor and privoxy from starting up automatically. Disable all lines for both tor and privoxy; otherwise, run "pkill tor | pkill privoxy"; but it's a bother to do this every time. 3. Once you have the packages you need, run the first-run wizard. First time you start it up, run as client, then configure as you wish; but I generally choose custom or "configure myself". Make sure that you are set up to run socks5. 4. When tork is up and running, click on <settings> and <configure tork>. Under <My Tor Client>, you want to set a password (study up on password security, if you haven't done so already). Under <Network View>, you will find categories where you can set servers to avoid, or those that you prefer as exit servers. If this is your first run, these ought to be empty. You click okay, and it's running. Now you want to find those servers that you prefer; and later, you'll discover some that you might want to avoid. You ought to see four columns: <Anonymize>, <Tor Network>, <Tor Log>, and <Traffic Log>. Click on <Tor Network>, then look at the top for <Servers>. Click on that, and you'll see a list of options. I currently click the choices for Valid, Fast, Exit, Running, Guard, Stable. (The others don't work so well.) Once you have clicked on these choices, you'll see that your list of servers at the left have all turned green, and all say exit. Hit ctrl-A, and capture (like copying text), then right-click, choose [* see below] "From now on", then either "Always use server as exit" or "Try to use server as exit". If you go back into Settings/Configure Tork/My Network View/Preferred Exit Servers, you will now see that your list is filled with preferred exit servers, all the ones that got branded with the green onion. You'll also note that there is a little box that reads "Use only these servers for exit"; which corresponds to that choice you made above.* 5. Another thing that you can do is to change your apparent location, by choosing in what country you want your exit server. If the EU blocks you from reading the LATimes or Washington Post (for example), you can change your server to a US server. 6. Now your tork-trinity ought to be all set up to manage tor; and this is just fine for browsing. But if you just wanted to use it for browsing, you wouldn't go to all this trouble; and there are so many more neat things that you can do now. Click on Anonymize, and you'll see one-click choices for anonymizing Firefox, Kopete, Pidgin, etc. (This varies according on what you have installed, and not everything shows up; Opera shows up, but not Icecat or PaleMoon; Kopete and Pidgin show up, but not other chat programs.) Farther down that list, though, is where you can do some weirder stuff. 7. Anonymous SSH Session - or, occasional god-like powers Click on this, and you will have secure shells in Konsole, which is nice for torifying various programs; for example, torrents, some browsers (arora, midori, etc.) I torify xmms over the ssh session. Also, I can download with wget, curl, youtube-dl, etc. I can do whois lookups over the ssh, and so on. (This is useful if you get blocked from certain sites for using Tor, yet you might also be blocked because you live in the "wrong" country. If you torify your program, you can sometimes have your cake and eat it, too.) In order to torify, just put that word into your command, usually preceding the usual command; e.g.: torify youtube-dl -v -c -f mp4 --no-check-certificate -R 999999 torify wget -c -t 0 --retry-connrefused --no-check-certificate 8. Anonymous Shell for Command-line Programs using HTTP/HTTPS I use it for downloading deb packages, etc., but there are other uses. In this case, instead of "sudo apt-get install" (for example), the command changes to "sudo torify apt-get install"; and modify accordingly for other apt commands. 9. There are also some configuration files that I use to modify my firewall, tor and privoxy. I use firestarter as my firewall, because I can watch activity in real time, rather than opening a log file all the time; however, I also disable ipv6, which takes some more doing. I don't know if the user-pre file can be adapted to other firewalls, or iptables, etc. 10. See attachments for config files. Here are locations for those files: /etc/privoxy/config /etc/tor/torrc /etc/tor/torsocks.conf /etc/firestarter/user-pre (NOTE that I got these configurations from somewhere on the torproject website, though I don't remember the links now.) Not everybody cares if the Man knows that they play chess or watch cat videos; but maybe people live in places where normal innocent behavior has become suspect. I know this seems like a lot; and it is a lot of trouble, if all you want to do is read the LATimes and WaPo where you live. But once you have figured out how to torify various programs, or to run hidden services (not there myself yet), then I feel sure that you will start to think about other possibilities. For example, I run my own online radio station, but I cannot listen to it over a proxy, unless I torify xmms; and then it works fine. Or maybe I want to look up my local TV listings, but I don't really want to get advertising based on my viewing habits. Or I want to watch a YouTube video, but I find that it is not available in various countries. I hope that this gives you a good start with tork. It is definitely a program worth keeping around. Bill
Long answer, so good, precise, thanks Bill.
Now, I have to try ASAP...
Good labor day tomorrow (1st may).
andré
On Tuesday 30 April 2019 02:35:13 andre_debian@numericable.fr wrote:
On Friday 26 April 2019 20:30:42 William Morder wrote:
On Friday 26 April 2019 09:37:05 andre_debian@numericable.fr wrote:
Not so easy to use it, I only need as anonymous navigator.
Okay, so I apologize in advance for the length, but I tried to cover all the steps. Here, I realize, it may look like a bit much; and I didn't just jump into this all at once. This is the accumulation of research and experience of using tork-trinity (or its earlier KDE3 version) since about 2005 or thereabouts. And I am sure that there are a dozen or more people reading the Trinity mailing list, who know better than I about some of this. (And please add your own tested recipes!) Make small changes, one thing at a time, until you get it configured as you want.
I am running Devuan Jessie, but this is close enough to Debian Stretch, and ought to work for you. And anyway, I am trying to move up to Stretch or Buster ASAP. Yes, you do need to install privoxy, although tor can use some other proxies, such as polipo, etc.; but I haven't tried them.
- You need to make sure that you have certain packages installed in
order to get full functionality. These are all the packages that I have installed specifically for tor/tork/privoxy. It is especially important that you get everything for libevent and geoip, torsocks (or maybe tsocks on some systems, but torsocks is newer); you can probably do without anything dbg or dev. I tend to do overkill, and try out everything, then discard later. sudo apt-get install apt-transport-https apt-transport-tor geoclue geoip-bin geoip-database-extra libanyevent-perl libevent-core libevent-dbg libevent-dev libevent-execflow-perl libevent-extra libevent-loop-ruby libevent-openssl libevent-perl libevent-pthreads libevent-rpc-perl libeventviews4 libgeocode-glib0 libghc-socks-dev libghc-socks-prof libghc-vector-dev libghc-vector-doc libghc-vector-prof libkimproxy4 libseccomp2 privoxy python-geoip python-torctl tor tor-arm tor-geoipdb tork-data-trinity tork-trinity torsocks tzdata tzdata-java You don't need these, but maybe you'll want to try them out, just because. sudo apt-get install myproxy myproxy-admin myproxy-dbg myproxy-server obfs4proxy obfsproxy ocproxy onionshare torbrowser-launcher torchat 2. It is good to have sysv-rc-conf installed (as mentioned previously), so that you can disable tor and privoxy from starting up automatically. Disable all lines for both tor and privoxy; otherwise, run "pkill tor | pkill privoxy"; but it's a bother to do this every time. 3. Once you have the packages you need, run the first-run wizard. First time you start it up, run as client, then configure as you wish; but I generally choose custom or "configure myself". Make sure that you are set up to run socks5. 4. When tork is up and running, click on <settings> and <configure tork>. Under <My Tor Client>, you want to set a password (study up on password security, if you haven't done so already). Under <Network View>, you will find categories where you can set servers to avoid, or those that you prefer as exit servers. If this is your first run, these ought to be empty. You click okay, and it's running. Now you want to find those servers that you prefer; and later, you'll discover some that you might want to avoid. You ought to see four columns: <Anonymize>, <Tor Network>, <Tor Log>, and <Traffic Log>. Click on <Tor Network>, then look at the top for <Servers>. Click on that, and you'll see a list of options. I currently click the choices for Valid, Fast, Exit, Running, Guard, Stable. (The others don't work so well.) Once you have clicked on these choices, you'll see that your list of servers at the left have all turned green, and all say exit. Hit ctrl-A, and capture (like copying text), then right-click, choose [* see below] "From now on", then either "Always use server as exit" or "Try to use server as exit". If you go back into Settings/Configure Tork/My Network View/Preferred Exit Servers, you will now see that your list is filled with preferred exit servers, all the ones that got branded with the green onion. You'll also note that there is a little box that reads "Use only these servers for exit"; which corresponds to that choice you made above.* 5. Another thing that you can do is to change your apparent location, by choosing in what country you want your exit server. If the EU blocks you from reading the LATimes or Washington Post (for example), you can change your server to a US server. 6. Now your tork-trinity ought to be all set up to manage tor; and this is just fine for browsing. But if you just wanted to use it for browsing, you wouldn't go to all this trouble; and there are so many more neat things that you can do now. Click on Anonymize, and you'll see one-click choices for anonymizing Firefox, Kopete, Pidgin, etc. (This varies according on what you have installed, and not everything shows up; Opera shows up, but not Icecat or PaleMoon; Kopete and Pidgin show up, but not other chat programs.) Farther down that list, though, is where you can do some weirder stuff. 7. Anonymous SSH Session - or, occasional god-like powers Click on this, and you will have secure shells in Konsole, which is nice for torifying various programs; for example, torrents, some browsers (arora, midori, etc.) I torify xmms over the ssh session. Also, I can download with wget, curl, youtube-dl, etc. I can do whois lookups over the ssh, and so on. (This is useful if you get blocked from certain sites for using Tor, yet you might also be blocked because you live in the "wrong" country. If you torify your program, you can sometimes have your cake and eat it, too.) In order to torify, just put that word into your command, usually preceding the usual command; e.g.: torify youtube-dl -v -c -f mp4 --no-check-certificate -R 999999 torify wget -c -t 0 --retry-connrefused --no-check-certificate 8. Anonymous Shell for Command-line Programs using HTTP/HTTPS I use it for downloading deb packages, etc., but there are other uses. In this case, instead of "sudo apt-get install" (for example), the command changes to "sudo torify apt-get install"; and modify accordingly for other apt commands. 9. There are also some configuration files that I use to modify my firewall, tor and privoxy. I use firestarter as my firewall, because I can watch activity in real time, rather than opening a log file all the time; however, I also disable ipv6, which takes some more doing. I don't know if the user-pre file can be adapted to other firewalls, or iptables, etc. 10. See attachments for config files. Here are locations for those files: /etc/privoxy/config /etc/tor/torrc /etc/tor/torsocks.conf /etc/firestarter/user-pre (NOTE that I got these configurations from somewhere on the torproject website, though I don't remember the links now.) Not everybody cares if the Man knows that they play chess or watch cat videos; but maybe people live in places where normal innocent behavior has become suspect. I know this seems like a lot; and it is a lot of trouble, if all you want to do is read the LATimes and WaPo where you live. But once you have figured out how to torify various programs, or to run hidden services (not there myself yet), then I feel sure that you will start to think about other possibilities. For example, I run my own online radio station, but I cannot listen to it over a proxy, unless I torify xmms; and then it works fine. Or maybe I want to look up my local TV listings, but I don't really want to get advertising based on my viewing habits. Or I want to watch a YouTube video, but I find that it is not available in various countries. I hope that this gives you a good start with tork. It is definitely a program worth keeping around. Bill
Long answer, so good, precise, thanks Bill.
Now, I have to try ASAP...
Good labor day tomorrow (1st may).
andr�
Thanks, I hope it works as well for you as it does for me. It took me a few years to learn those tricks, and there are more to discover. I myself want to figure out hidden services, so that I can give my radio station an onion URL; but all in good time.
Let me know how it goes for you.
Bill
On Thursday 25 April 2019 08:44:50 andre_debian@numericable.fr wrote:
On Thursday 25 April 2019 17:26:07 William Morder wrote:
On Thursday 25 April 2019 08:05:26 andre_debian@numericable.fr wrote:
How to launch "tork-trinity" ? (anonymous navigator).
ALT-F2 then just enter "tork" in the run dialog: or you can find it in the start menu, and elsewhere.
Thanks, but :
Alas ! ALT-F2 : impossible to execute the command tork...
$ tork command not founded...
andré
I seem to recall that on some systems (Ubuntu?), I had to run tork-trinity; you could also change the path to make sure that the command "tork" points to its home in /opt/trinity/bin/tork
Another thing I discovered the hard way: If you have installed tor and t=tork-trinity, as well as necessary dependencies, you will find that tor and privoxy start up automatically, which actually causes problems and you don't want it. Therefore,
pkill tor | pkill privoxy
- and try running it again. In future, you will save some trouble if you will first run sysv-rc-conf (please install, if you don't already have it), and uncheck ALL lines for tor and privoxy. Then you start them manually when you run "tork" or "tork-trinity".
Maybe you don't have all the necessary packages and dependencies installed?
I keep text files with saved commands, which include whatever packages I use when I am going through a new installation. So I have these two lists under the heading PROXY, with much overlapping. (Someday I will combine them into one, but not today.) These might not work perfectly for you, because you do things a little differently; but if you edit them according to your own system and needs, I think you'll find that this covers most of the tork-trinity and related stuff. (Don't ask me why some items like kuickshow-trinity; I don't know, but maybe they get added when installing another package.)
sudo apt-get install sudo-trinity kdebase-trinity tork-trinity tde-trinity compiz-trinity compiz-core-trinity compiz-trinity compiz-core-trinity tde-xparts-extras-trinity kmyfirewall-trinity kuickshow-trinity kdf-trinity kdesudo-trinity kwin-trinity kdm-trinity kdesktop-trinity compiz-tde-trinity kdesudo-trinity doc-base libseccomp2 libyaml-tiny-perl tor-geoipdb libyaml-tiny-perl rarian-compat mixmaster socat tor-arm apparmor-utils obfsproxy obfs4proxy dlang-libevent libeventviews4 libev4 libevent-2.0-5 libevent-core-2.0-5 libevent-dbg libevent-dev libevent-extra-2.0-5 libevent-openssl-2.0-5 libevent-pthreads-2.0-5 libevent-perl libevent-rpc-perl libevhtp-dev libevhtp-doc libevhtp0 libevhtp0-dbg lua-event-dev libevent-loop-ruby libevent-loop-ruby1.8 ruby-event-loop libevent-execflow-perl
sudo apt-get install dlang-libevent libeventviews4 libev4 libevent-2.0-5 libevent-core-2.0-5 libevent-dbg libevent-dev libevent-extra-2.0-5 libevent-openssl-2.0-5 libevent-pthreads-2.0-5 libevent-perl libevent-rpc-perl libevhtp-dev libevhtp-doc libevhtp0 libevhtp0-dbg lua-event-dev libevent-loop-ruby libevent-loop-ruby1.8 ruby-event-loop libevent-execflow-perl apt-transport-tor
See if this finds any missing parts.
Bill