I asked and you responded:
A Guide on how to proxy your firefox traffic through KORE's Tor implementation
Step 1: Open up firefox and click on the hamburger menu (three lines) at the top right
img snipped for scalingStep 2: click on "options" to open the settings
Step 3: scroll down all the way and click on the network settings's settings button
img snipped for scalingStep 4:
- Select "Manual proxy configuration"
- Set the "SOCKS Host" address to: 127.0.0.1
- Set the "SOCKS Host" Port to: 9979
- Select "SOCKS v5"
When you finish your Connection Settings should look like this:
img snipped for scalingStep 5: Select "OK"
Step 6: Restart firefox and browse freely, while being on Tor!
NOTES:
- Make sure you have the KORE wallet running, I myself have forgotten to start the KORE wallet before opening firefox.
- You do not need to change any settings in your kore.conf
- I HAVE ONLY TESTED THIS IN WINDOWS, please confirm if it works for you in linux.
Q/A
Q: Is this the Surfs Up browser?!
A: NO! This is just to hold you over until we finalize the implementation of Surfs Up browser.
Q: How can I tell if this is working?
A: there are two ways,
- first you can open your tor.log and look for this line (likely it will show up several times)
New control connection opened from 127.0.0.1.
- secondly, you can go to whatismyip.com or other sites similar and look at the location and IP that it displays
Q: Does this work with obfs4?
A: This uses the bridge settings of the KORE wallet as it is currently running, so if you have obfs4 configured then yes, this will work.
Matrix
If you wish to reply to the guide please reply to this post so as not to spam images.