fe.settings:getUserBoardSettings - non array given[os] - Endchan Magrathea
To post on here with links -g, you need to set the cache to 0,
ESC -> SETUP -> Cache

set all the values to zero, and uncheck aggressive cache. Then you can get the captcha updates by refreshing with CNTRL +r .   

My setup:
Tor Browser on Xorg (twm) -> headless server port 9050 as socks proxy -> Tor ->distant country for 1st hop + 7 hops ->exit=> 3 hops as per regular 

or :
Links2 -g or links in terminal
-> 9050 on headless server-> 7 hops -> endchan.

Other options:

Close all ports except port 9050 outbound, proxy to port 9050 on headless server with tor socks5 proxy -> 15 hops -> target. 

experiment with adding 2-3 https or socks 5 non tor proxies at the end depending on what you're doing.  If you're sending endmail to a endfix server , with 15 hops, and 1 port I think you're probably OK. 

My preference for operating systems is MS DOS 5 + links -> proxy
or FreeDOS +links -> proxy. 

A retail box of MS DOS 5 from 1988 has no malware or keylogging on it by default, it's a single tasking OS, you need to install a packet driver, and the browser software (links), then that's all you have to worry about.  With unix/linux there's usually way to much going on.

Those are just my opinions on the matter. Try different things, and see what works for you.

I say DOS + Links + TCP/IP driver -> linux/unix server on arm or other non x86-64 system running tor with 15 hops mod.  DOS will give you privacy, linux/Unix security, and Tor with Links browser anonymity. Using a physical proxy will isolate the systems. With DOS you only need to worry about 2 pieces of software spying on you (the browser and the packet driver). In linux top says there are around  200 proceses working in the background.  That's 198 too many.