Show HN: Transparent Tor Proxy – Route all Linux system traffic through Tor
Transparent Tor Proxy (TTP) is a Linux CLI tool that routes all system traffic through the Tor network using nftables, requiring no per-application configuration. It includes features like DNS and IPv6 leak prevention, crash-safe operations, and IP rotation via circuit renewal. The tool is intended for privacy enhancement but does not guarantee full anonymity and is not recommended for high-risk users.
- ▪TTP routes all Linux system traffic through Tor using nftables without requiring individual application setup.
- ▪The tool prevents DNS and IPv6 leaks, supports atomic firewall rule updates, and includes SELinux policy compilation for Fedora/RHEL.
- ▪TTP warns users that it does not ensure 100% anonymity and advises high-risk individuals to use officially audited tools like TailsOS or Tor Browser.
- ▪The project is open to contributions, especially from developers with expertise in Linux networking, Tor internals, and system-level Python.
- ▪TTP supports multiple Linux distributions and can be installed via native packages, source, or pipx, with varying levels of system integration.
Opening excerpt (first ~120 words) tap to expand
🛡️ TTP — Transparent Tor Proxy A Linux CLI tool that transparently routes all system traffic through the Tor network using nftables. Features • Contribute • Requirements • Installation • Usage • How It Works No per-application setup needed — just sudo ttp start and every connection goes through Tor. CautionTTP is a tool designed to aid privacy by routing traffic through Tor. However, no tool can guarantee 100% anonymity. Your safety also depends on your behavior (e.g., using a regular browser vs. Tor Browser, signing into accounts, etc.). Always use TTP as part of a multi-layered security strategy. WarningIf you are a whistleblower or are engaging in high-risk activities, DO NOT use TTP. Instead, use officially audited and reliable tools like TailsOS or the Tor Browser directly.
…
Excerpt limited to ~120 words for fair-use compliance. The full article is at Hacker News: Show HN.