# Privoxy listens on TCP port 8118 bound only to localhost.
# Tor SOCKS proxy listens on TCP port 9050 (directory) bound only to localhost. This proxy anonymizes connections to servers in Internet by routing them over a randomized route trough to Tor network.
Debian packages have been uploaded to the set of official unstable (sid) and testing (etch) Debian packages.
If you are running Debian stable (sarge) or oldstable (woody), you must first add some lines to your /etc/apt/sources.list file.
If you run etch (testing) you may want to add a sources.list entry too. That way you always get the latest version of Tor, even when it has not propagated to testing yet.
Do not use the packages in ubuntu’s universe.
They are not maintained and most likely old and therefore miss out on stability and possibly security fixes.
For tor’s stable version (for amd64,i386 and sparc):
deb http://mirror.noreply.org/pub/tor main
deb-src http://mirror.noreply.org/pub/tor main
where should be replaced with either woody, sarge, etch, or sid, or – if you are using ubuntu – hoary, breezy, or dapper.
To install the packages, issue the following commands:
$ apt-get update
$ apt-get install tor
Verifying signatures with apt 0.6.x
If you are using apt version 0.6 or later you may want to add weasel’s key to your apt-keyring, so it can verify the sources:
$ gpg --keyserver subkeys.pgp.net --recv 94C09C7F
$ gpg --fingerprint 94C09C7F
should show you:
pub 1024D/94C09C7F 1999-11-10
Key fingerprint = 5B00 C96D 5D54 AEE1 206B AF84 DE7A AF6E 94C0 9C7F
uid [ultimate] Peter Palfrader
$ gpg --export 94C09C7F | sudo apt-key add -
to add the key to apt’s keyring.
Now let’s get Privoxy
$ apt-get update
$ apt-get install privoxy
Once you’ve installed Privoxy (either from package or from source), you will need to configure Privoxy to use Tor. Open Privoxy’s “config” file (look in /etc/privoxy/ or /usr/local/etc/) and add the line
forward-socks4a / localhost:9050 .
to the top of the config file. Don’t forget to add the dot at the end.
Privoxy keeps a log file of everything passed through it. In order to stop this you will need to comment out three lines by inserting a # before the line. The three lines are:
and the line
and (on some systems) the line
debug 1 # show each GET/POST/CONNECT request
You’ll need to restart Privoxy for the changes to take effect. Firefox
For Firefox (recommended), simply install the Torbutton plugin, restart your Firefox, and you’re all set: