Connections are forced through Tor®. DNS leaks are impossible, and even malware with root privileges cannot discover the user's real IP address. Leak tested through corridor (Tor traffic whitelisting gateway) and other leak tests.
Download PDF tutorial
"Wisdom is like a river, the deeper it is the less noise it makes"