Tor only safeguards applications that happen to be effectively configured to deliver their Web traffic as a result of Tor. Observe that these instructions use instance file names and yours is going to be different: you will have to substitute the instance file names with precise names in the documents https://antonioz852lor4.tokka-blog.com/profile