To post on here with links -g, you need to set the cache to 0,
ESC -> SETUP -> Cache
set all the values to zero, and uncheck aggressive cache. Then you can get the captcha updates by refreshing with CNTRL +r .
My setup:
Tor Browser on Xorg (twm) -> headless server port 9050 as socks proxy -> Tor ->distant country for 1st hop + 7 hops ->exit=> 3 hops as per regular
or :
Links2 -g or links in terminal
-> 9050 on headless server-> 7 hops -> endchan.
Other options:
Close all ports except port 9050 outbound, proxy to port 9050 on headless server with tor socks5 proxy -> 15 hops -> target.
experiment with adding 2-3 https or socks 5 non tor proxies at the end depending on what you're doing. If you're sending endmail to a endfix server , with 15 hops, and 1 port I think you're probably OK.
My preference for operating systems is MS DOS 5 + links -> proxy
or FreeDOS +links -> proxy.
A retail box of MS DOS 5 from 1988 has no malware or keylogging on it by default, it's a single tasking OS, you need to install a packet driver, and the browser software (links), then that's all you have to worry about. With unix/linux there's usually way to much going on.
Those are just my opinions on the matter. Try different things, and see what works for you.
I say DOS + Links + TCP/IP driver -> linux/unix server on arm or other non x86-64 system running tor with 15 hops mod. DOS will give you privacy, linux/Unix security, and Tor with Links browser anonymity. Using a physical proxy will isolate the systems. With DOS you only need to worry about 2 pieces of software spying on you (the browser and the packet driver). In linux top says there are around 200 proceses working in the background. That's 198 too many.