To reconfigure Tor Browser so you can access the local web interface, apply the following six steps.
Step one) Terminate Tor Browser if currently running.
echo 'pref("xpinstall.signatures.required", false);' > /home/user/.tb/tor-browser/Browser/TorBrowser/Data/Browser/profile.default/preferences/50_addons_unsigned_allow.js
Step three) Install FoxyProxy:
sudo apt-get install xul-ext-foxyproxy-standard
Step four) To access the proxy/local WebUI of the desired application, the FoxyProxy add-on and its configuration need to be made available to Tor Browser. Run:
ln -s /usr/share/xul-ext/foxyproxy-standard/ /home/user/.tb/tor-browser/Browser/TorBrowser/Data/Browseremail@example.com
cp /usr/share/usability-misc/tbb-foxyproxy/foxyproxy.xml /home/user/.tb/tor-browser/Browser/TorBrowser/Data/Browser/profile.default/
Step six) Restart Tor Browser.
To find out how to reverse this Tor Browser configuration and to restore Tor Browser's default fingerprint, please press expand on the right side.
- This doesn't lower security too much - unless you install add-ons from unsafe sources. It is required because Tor Browser is based on a newer version of Firefox while the add-ons in Debian are "unsigned". They are signed and verified when apt-get downloads them, so this is safe, but they do not have the signature that Firefox's code is expecting. (It wouldn't make them safer anyhow.)