I have read the wiki on avoiding Tor over Tor by disabling transparent proxying.
I have also read a whonix forum answer on this but am not allowed to post links.
To me it is not clear how this works technically.
What does the Tor bundled in the app do when transparent proxying is disabled?
a. Does it fail to connect and then the app uses the builtin whonix tor on localhost:9050?
b. What if the app checks its liveness?
When configuring this no matter what happens in the workstation machine there is no way to leak the real IP. True or false?
A whonix forum answer says that configuring the app proxy to a SocksPort can still become Tor over Tor. Is it possible to have some app in whonix scan for tor instances and modify them to do nothing but always return healthy on health check?
Without whonix, when I disable internet and start a tor daemon the process starts and fails to connect. Why would a bundled daemon in an app in whonix fail to start at all?
I understand reconfiguring is too difficult and can give up on it. How should I detect? Scan every process for strings contained in the tor daemon? Is detecting possibly a built in whonix feature in the future?