

For example, a threat actor that Nusenu has been tracking as BTCMITM20 ran thousands of malicious Tor exit nodes in order to replace Bitcoin wallet addresses inside web traffic and hijack user payments. Nusenu said this is strange as most threat actors operating malicious Tor relays tend to focus on running exit points, which allows them to modify the user’s traffic. The actor’s servers are typically located in data centers spread all over the world and are typically configured as entry and middle points primarily, although KAX17 also operates a small number of exit points. Grouping these servers under the KAX17 umbrella, Nusenu says this threat actor has constantly added servers with no contact details to the Tor network in industrial quantities, operating servers in the realm of hundreds at any given point. See below.Since 2017, someone is running about a thousand-10% of the total-Tor servers in an attempt to deanonymize the network: If you're unable to use the application's native proxy settings, all hope is not lost. Privoxy has an example configuration of Tor and Privoxy. However, please realize that this approach is not recommended for novice users. If your application doesn't support SOCKS proxies, feel free to install privoxy. Typically Tor listens for SOCKS connections on port 9050. Step one should be to try to use a SOCKS proxy rather than an HTTP proxy.

If you are trying to use some external application with Tor, step zero should be to reread the set of warnings for ways you can screw up. That said, if you are absolutely sure that you want to use the tor proxy manually, read this faq entry which will answer your question. Using any other browser besides tor browser to browse the internet is highly discouraged and will likely not provide any anonymity because your browser will give up your real ip address or enough information to fingerprint you uniquely. Any unencrypted traffic will be seen by a potentially malicious exit node. Warning: be extremely careful about sending traffic through tor when not using the tor browser.
