Torrified Squid?

Hi,

yes, that discussion has been rather heated sometimes, but I am glad its helpful for other people than the participants.

I think the common term is “core developers” rather than “stakeholders” here… :wink:

And yes, we do not plan to introduce this feature.

Afraid yes: As mentioned here, this is a bad idea as most applications are not prepared or designed to have their traffic transparently routed through Tor, especially when it comes to information leaks.

For example, the (now widely defunct) Flash add-on leaked the public IP address of a Tor user, which is why the Tor developers dropped that add-on from the very beginning.

Their thoughts on torrifying things can be found here and here.

I tried to build such a setup (Squid + Tor) once, but eventually came to a point where it was practically impossible to prevent traffic anomalies (large number of users sharing the same Guard, same route for every destination, etc.) sticking out like a sore thumb to adversaries.

Unless I missed something back then, using a transparent combination of Squid and Tor is neither practical nor secure (in terms of anonymity) at the moment.

Thanks, and best regards,
Peter Müller