Without this, Tor has started complaining about not being able to access
/dev/zero (despite Firejail making it available). Somebody should write
a real profile for this at some point...
An update at some point in the past week or two caused tor to break when
it was launched within Firejail as the tor user. Instead we launch the
jail as root and then have Tor drop privileges. I'm not sure why this is
necessary.
Only running Tor on trusted networks seems a little strange. However, I
like having the system stop as many background network services as
possible when I connect to untrusted networks. This means that the
majority of traffic that I generate is due to explicit action taken by
the user, which makes me feel a bit more sneaky. If I'm on an untrusted
network and want to do something through tor, I'm happy to just
`systemctl start tor.service`.