This repository has been archived on 2023-08-25. You can view files and clone it, but cannot push or open issues or pull requests.

1.7 KiB

Using Tor with BIFM

Using Tor with BIFM allows for your instance to be more anonymous to the sites it vists. Here's a quick start guide to enabling Tor on BIFM.

Note: Certain sites flat out block Tor exit

  1. Install Tor on your system.

This is pretty simple to do on Linux, simply ask your package manager to install Tor.


sudo apt install tor

Arch Linux

sudo pacman -S tor
  1. Enable it to run on bootup of your system.


sudo systemctl start tor && sudo systemctl enable tor
  1. Verify the Tor proxy is on.
curl --socks5 localhost:9050 --socks5-hostname localhost:9050 -s | cat | grep -m 1 Congratulations | xargs

If the command in your terminal outputs "Congratulations. This browser is configured to use Tor.", you are set to change the setting in the config, allowing Tor to run on Tor-compatible bypasses.

  1. Changing the lib.config.

Open config.json in your editor, if you haven't already.

The default file looks like this, you should change the defaults object to be something like this:

  "defaults": {
    "got": {
      "headers": {
        "User-Agent": "Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0",
        "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8"
      "proxy": {
        "type": "socks5",
        "host": "", // don't modify this object if you want tor.
        "port": "9050"
    "puppeteer": {
      "headless": true,
     "args": ["--proxy-server=socks5://", "--user-agent='Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0'"]
     // don't modify this line if you want tor.