So instead of using only tor when using tor browser, I can use tor while using firefox, the command line, etc.
I use Manjaro Cinnamon.
I know I’ll have to be careful with emails and some other applications that aren’t encrypted.
I just install “tor” package in Debian-based OSes and, ensure that the “tor” service is started and configure the applications I want to use “tor” by setting their proxy configuration to Socks 5 in 127.0.0.1 IP with 9050 port if they allow it.
So it depends on whether each application allows setting Socks 5? Is there a list somewhere to check a list of the software that allow that configuration? I would need at least alacritty, element and a couple others. And how could I block the rest of the connections that don’t go through Socks 5?
Even if you use Debian, the Arch wiki is really detailed and goes through lots of information about loads of different packages
https://github.com/brainfucksec/archtorify
What archtorify does is it sets up iptables and a systemd service so that everything goes by default through tor. Installation shown in wiki.
I only connect to it with specific programs
deleted by creator
It’s not generally recommended.
It increases your fingerprintability and your end-to-end correlation. It will leak unless you have a tightly controlled firewall policy. It can strain the network depending of what you’re doing. You lose all the isolation of the Tor Browser.
There is already Tails and Whonix for system-wide Tor usage.
Don’t take my word for it:
and
http://rzuwtpc4wb3xdzrj3yeajsvm3fkq4vbeubm2tdxaqruzzzgs5dwemlad.onion/index.html#tbb-13
Don’t. Tor is great for certain things, not all of the time. It will make you much easier to fingerprint than hardened Firefox without a VPN or Tor. It is best to only reserve Tor for your Darknet uses.