

Oh! Make sure you're gateway and routers are secure, otherwise, again, what's the point? For that matter, tor has a page for good and bad ISPs.ĭo be careful with what you click on and where you browse on Tor. but also wifi and bluetooth, obviously, kind of defeats the purpose of encrypting things when someone can easily access your encryption keys and everything you've ever typed in your system. Especially unencrypted keyboards and mice. Oh and if you're worried about security, everything should be wired, no wireless devices. but TBH tails does a decent job, especially with a VPN, of anonymizing traffic (though, as stated before, anonymous traffic != secure! But with a setup like that, you might just get hired at the NSA, assuming they'll give you any kind of clearance after you start your anti-psychotics. FreeBSD+Jailed vbox/bhyve+tails+a dns caching server or two, and ZFS and/or NetBSD's upgraded UFS, virtual hosts/networking, VPN (or two, or three). We can probably help with specefics but it all depends on how much tin foil you need to wear/what you are doing etc.īreeze through the synopses of the Handbook, figure out a desired setup, and then perhaps we can give better advice.įor ultimate tinfoil hat, hardened NetBSD (I'm not sure about OpenBSD and Xen, but if there's a Xen kernel, maybe OpenBSD). I'd read all of the Security section of the handbook (Chapter 13) (probably a must), 14: Jails, 15: Mandatory Access Control, 29: Firewalls, and 30: Advanced Networking The handbook and man pages are a man's best friend Jails are also another option. with the exception of Microsoft (and possibly Apple's) keylogging and constant data flow, the most minimal system you can have, hardened, and trusted would provide the best security, along with virtual networking devices, etc. Tor guides will generally steer you in a safe direction. I can't give you specific advise because I don't know your intended designs/requirements, nor am I an expert Tor. Maybe best to start with this on OpenBSD, NetBSD, or Mir (which I have virtually know knowledge of).

Use pf, ipfw, or whatever you're most comfortable with, then just run Tails (linux-OS in a virtual machine).

If possible, configure/install with hardened options (ram/swap encryption, disk encryption).

I'd recommend an encrypted disk zfs(8)() and geli(8)(). #Add to your kernel config file for Xen support.ĭevice xenpciusing bHyve bhyve(8)(), or Virtualbox ( emulators/virtualbox-ose. NoScript addon can be useful also, also try HTTPS Everywhere, Disconnect and uBlock. Play Station 4: Mozilla/5.0 (PlayStation 4 3.15) AppleWebKit/537.73 (KHTML, like Gecko) Add them to "User Agent Overrider" settings. Google Bot: Mozilla/5.0 (compatible Googlebot/2.1 + )
#Tor browser mac mirror mac os
IOS / Safari 7: Mozilla/5.0 (iPad CPU OS 7_0_4 like Mac OS X) AppleWebKit/537.51.1 (KHTML, like Gecko) Version/7.0 Mobile/11B554a Safari/9537.53
#Tor browser mac mirror android
Windows / IE 10: Mozilla/5.0 (compatible MSIE 10.0 Windows NT 6.1 WOW64 Trident/6.0)Īndroid / Firefox 53: Mozilla/5.0 (Android Mobile rv:53.0) Gecko/29.0 Firefox/53.0Īndroid / Chrome 57: Mozilla/5.0 (Linux Android 4.4.2 Nexus 4 Build/KOT49H) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/.133 Mobile Safari/537.36
#Tor browser mac mirror mac os x
Mac / Chrome 57: Mozilla/5.0 (Macintosh Intel Mac OS X 10_9_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/.133 Safari/537.36
