Set up Tor as a SOCKS proxy that tunnels requests through the Tor network
Find a file
2024-05-28 12:08:01 +02:00
.github/workflows Don't use QEMU 2024-05-23 19:08:21 +02:00
rootfs/etc/tor Place files to copy inside a subdirectory 2024-03-23 13:33:23 +01:00
docker-compose.yml Add docker-compose.yml file 2023-11-01 12:54:31 +01:00
Dockerfile Use sh instead of bash for heredocs 2024-05-28 12:08:01 +02:00
LICENSE Add LICENSE 2023-11-01 13:23:39 +01:00
README.md Add README file 2023-11-01 13:28:30 +01:00

aguslr/docker-tor

docker-pulls image-size

This Docker image sets up Tor to be used as a SOCKS proxy that can redirect traffic through the Tor network.

Tor is a free and open-source software for enabling anonymous communication by directing Internet traffic through a free, worldwide, volunteer overlay network to conceal a user's location and usage from anyone performing network surveillance or traffic analysis.

Installation

To use Tor for improved privacy, follow these steps:

  1. Clone and start the container:

    docker run -p 9050:9050 docker.io/aguslr/tor:latest
    
  2. Change your Web browser's proxy settings to point to the appropriate proxy:

    • All traffic through Tor: use SOCKSv5 proxy with 127.0.0.1:9050.

Using a SOCKSv5 proxy is preferred as it provides added security.

Build locally

Instead of pulling the image from a remote repository, you can build it locally:

  1. Clone the repository:

    git clone https://github.com/aguslr/docker-tor.git
    
  2. Change into the newly created directory and use docker-compose to build and launch the container:

    cd docker-tor && docker-compose up --build -d