Tor transparent proxy on Linux: a simple implementation

The starting idea comes from a colleague that asked me: “Is it possibile routing all system traffic thougth TOR, using it as a sort of VPN?”.

Yes, It’s possible, using a specific feature of Tor.

Continue reading “Tor transparent proxy on Linux: a simple implementation”

Tor in a company network: how to detect and block it?

TOR is an important tool.

It has its benefits and it could be the perfect way for end users to cover their tracks, but the use of this tool in a corporate network can open up organizations to some risks.

Continue reading “Tor in a company network: how to detect and block it?”