Ulissux – Tor
Tor protects against traffic analysis by transmitting information through a network of servers (onion routers) managed by volunteers, allowing anonymous traffic and the creation of hidden anonymous services. Communications are low latency making it suitable for web browsing, mail, messaging, SSH, IRC and more, it supports TCP protocol only.
Tor is the ally of those who want to communicate, get informed and collaborate without being discovered. Used for sensitive research such as diseases, sexual orientation, addictions, psychological problems and support, sexual abuse etc.

Ulissux is equipped with a transparent proxy which has the purpose of intercepting and anonymizing the traffic that for one reason or another may not cross Tor directly. Transparent torification may not completely anonymize. Here, too, customer and recipient address isolation, protocol isolation and port isolation have been added.
Ulissux excludes by default the 5 eyes (AU – CA – GB – NZ – US) as output nodes, it is also possible to exclude 9 or 14 eyes according to preferences / needs. These nodes are excluded at the exit, because the traffic that crosses the last node of the onion routers is transmitted in clear and unencrypted, since these countries are now known for controlling the network, it may be useful to exclude them. If the exit node falls within the “X eyes” but is required to access the service, this node will be used. Furthermore, the nodes that fall under the “X eyes” will be used as entry and central nodes. Totally excluded nodes are those whose country cannot be identified.
Ulissux – DNS

Ulissux has configured the dhcp client not to manage DNS, in this way the dhcp client will give precedence to the localhost address over the addresses contained in the DNS configuration file. The connection manager is also configured not to manage DNS. These measures allow the internal DNS resolver to listen only to requests from the local computer and to use TorDNS as the sole provider of DNS responses.
Ulissux – MAC Address
The MAC address is unique and permanent, unlike IP addresses which (not always) change with each connection. This feature allows those who want to control you to keep track of the actions carried out on the network.
