Professional Documents
Culture Documents
Changing /etc/network/inetrfaces
Reboot
Before Filtering:
Mac Filtering:
After Filtering:
b. You will then install TOR Browser’s application on your smartphone and open browserleaks.com to
see whether it leaks real identity or not.
c. You will then compare all three applications in tabular form (see next page), after you share necessary
screenshots which reveal the originality of your work. Do attach screenshot of your actual public IP first.