Or you could just get a user agent switcher and a oscpu switcher and use a firefox derivative on linux and look like you are still using the tor browser with windows like a idiot.
I always read about how people get caught when they are the only ones using tor on a network
Did you completely skip the
hardware Whonix gateway
on purpose?
Ah, you don't even know what you are talking about, nigger. Tor browser always has Windows user agent.
Holy shit are you stupid? The tor browser has (((unfixed))) javascript parser (((bugs))). If you use icefox or palemoon and change the data it emits to be exactly like the tor browser on windows you are much less likely to get hacked. Especially if (((they))) have developed CSS exploits for the tor browser.
Because then you get attacked as if you were using the default tor browser bundel on windows, instead of a entirely different browser on *nix. Sure you can still use whonix as the desktop/laptop OS. But make sure you fucking secure that router with something that changes the MTU to look like a windows machine.
MTUs are changed on each tor node to generic linux/freebsd, if they have the first one, you are already fucked.
Weak.
If you are accessing tor over a bridge it will look a while lot nicer on that obfs4 connection if your MTU is of windows to your ISP then it would if it were unix based. Especially considering in such a case as all traffic being intercepted and cataloged automatically. If someone is using a windows MTU it won't stand out as much, as say openbsd.
The reason he got caught (assuming I am thinking of the same story) is because he made a bomb threat. Obviously someone making a bomb threat to a specific location is highly likely to be a person who is in the general vacinity of that location. This makes it easy to simply check who is access Tor from that location. Are you planning on announcing a bomb threat to your building or engage in any other localized criminal activity?
...
...
bump for the reference