Interesting but I doubt whether you really want to route /all/ your network traffic through Tor.<p>As soon as some packet that reaches the internet (through an exit node) that includes some identity information your Tor connection is no longer private. Routing all your traffic via Tor, increases the chance this will happen.<p>Also if many people use Tor for all their traffic, this will become a scalability problem for Tor (lack of exit nodes).
It's a terrible idea to route <i>all</i> your traffic over tor. If you have any expectation of anonymity you'll be disappointed. Since tor does not do any application level filtering, it is easy for exit nodes to track you.<p>It's a neat idea but has the same problems as network wide tor routers.
How does this compare to Tails? Conceptually they look similar, both having the kernel enforce that all traffic goes through Tor.<p>But Tails is a configured with security and Tor in mind. I don't see when I'd want to install such a kernel module on a normal distribution over a specialized distribution. (Or a multi-vm setup like whonix, instead of trusting the kernel)