Make apt-transport-tor use bridges

How to make apt-transport-tor to use bridges ?

It’s up to your Tor config.

once u add bridges , ap-transport-tor will use it automatically.

so no need to worry after using bridges.

Note: Bridges are Tor nodes which are not used by public Tor connection.

Forgot to mention.

How to make apt-transport-tor to use bridges in Host ?
Do I need to make a file /etc/tor/torrc and type there

UseBridges 1
ClientTransportPlugin obfs4 exec /usr/bin/obfs4proxy
bridge  obfs4 ip fingerprint

After I’ve done this how do I check if apt-transport-tor use bridges ?
Does apt-transport-tor start when Linux boot ?

Make the host use bridges.

Nothing special about apt-transport-tor.

How to use bridges on the host then? → Self Support First Policy for Whonix

No, it gets run by apt-get.

How do you make sure any application is using Tor let alone bridges? That’s actually a very hard technical question.

1 Like

Asked on stackexchange and got no answer.

Was thinking I can install arm from and check it like in whonix

found 3 deprecated methods, might they will work. thank you

For general Tor questions not directly related to Whonix like “What are end-to-end correlation attacks?”, use http://tor.stackexchange.com; the tor-talk mailing list; or IRC (Webchat)

e-mail:
help@rt.torproject.org

Arm is a Tor Controller, conceptually not a tool to find out about serious issues such as compromise or leaks. (Arm works on a different level. It is a Tor Controller. It talks to Tor using Tor’s ControlPort. It is an interface to show what Tor thinks. Neither Tor nor Arm implement anything such as virus detection, compromise detection, leak detection etc. Messages by Arm are interesting and useful but usually no reason for grave concern. For leak testing, see leak tests.)

1 Like

But arm is only way to see 1st hop of Tor - if it’s a bridge or if it’s not