How to make apt-transport-tor to use bridges ?
It’s up to your Tor config.
once u add bridges , ap-transport-tor will use it automatically.
so no need to worry after using bridges.
Note: Bridges are Tor nodes which are not used by public Tor connection.
Forgot to mention.
How to make apt-transport-tor to use bridges in Host ?
Do I need to make a file /etc/tor/torrc and type there
UseBridges 1
ClientTransportPlugin obfs4 exec /usr/bin/obfs4proxy
bridge obfs4 ip fingerprint
After I’ve done this how do I check if apt-transport-tor use bridges ?
Does apt-transport-tor start when Linux boot ?
Make the host use bridges.
Nothing special about apt-transport-tor.
How to use bridges on the host then? → Free Support for Whonix ™
No, it gets run by apt-get.
How do you make sure any application is using Tor let alone bridges? That’s actually a very hard technical question.
Asked on stackexchange and got no answer.
Was thinking I can install arm from and check it like in whonix
found 3 deprecated methods, might they will work. thank you
For general Tor questions not directly related to Whonix like “What are end-to-end correlation attacks?”, use http://tor.stackexchange.com; the tor-talk mailing list; or IRC (Webchat)
e-mail:
help@rt.torproject.org
Arm is a Tor Controller, conceptually not a tool to find out about serious issues such as compromise or leaks. (Arm works on a different level. It is a Tor Controller. It talks to Tor using Tor’s ControlPort. It is an interface to show what Tor thinks. Neither Tor nor Arm implement anything such as virus detection, compromise detection, leak detection etc. Messages by Arm are interesting and useful but usually no reason for grave concern. For leak testing, see leak tests.)
But arm is only way to see 1st hop of Tor - if it’s a bridge or if it’s not