Proxy Chain
<center>#Proxy Chain[/center]
[center]###What is proxy Chain</center>
Proxy chain is Using many proxies at same time so if anyone tried to get your Ip he got redirected to the other proxy :D in this tutorial we will use 3 programs
[*][Tor](https://www.torproject.org/)
[*][AnonymoX](https://addons.mozilla.org/en-US/firefox/addon/anonymox/?src=ss)
[*][HotSpot Shield](http://www.hotspotshield.com/) or any another proxy
Now Download tor after you end downloading it and installing it download on it the add-on AnonymoX
After Tor and AnonymoX are install download hotspot Shield
ok now since we have everything downloaded it's time to connect them together
1- go to Tor ( Make sure your IP is changed )
2- Turn in AnonymoX
3- Turn on your Proxy
And you are done with this now you can browse internet safe and anonymous
if any data is incorrect be sure to let me know as i am relaying this fro ma friend im going to try later and i cant take credit
i bake therefore im fried!!
No problem should ever have to be solved Twice
No problem should ever have to be solved Twice
It must be terribly slow… Do you surf the net in text mode? The last time I used Tor it was a pain. Also, Tor already works using multiple proxy simultaneously…
I’m not sure that using proxy is completely secure… What if someone in the chain eavesdrop the traffic? There is nothing that prevent the government or the mafia (is it different?) to start their own servers? Of course they must be able to trace you in every proxy to find you… But they can still see the traffic… Unless you also use a VPN…
There is also those studies that shows that it’s possible to monitor PNP network by publishing fake stuff (I red this a long time ago…). It is kinda scary… I might unplug my PC one day and start doing some ASCII ART.
DaGr8
Just because I am paranoid doesnt mean theyre not after me…
Need help with math homework? Hit me up! I can help out with integral calculus and below.
Need help with math homework? Hit me up! I can help out with integral calculus and below.
Thanks for the post @oxide
When solving problems, dig at the roots instead of just hacking at the leaves.
Nice post :) I personally would say that if you dont use a VPN then it just means your slowing the person down trying to find you.
@gninja : Are you saying that it’s better not to use a VPN? If you use a VPN all your communication will be encrypted. This way no router or proxy will be able to know what you are doing… It’s a good thing? What is the best defense?
Just because I am paranoid doesnt mean theyre not after me…
reading through the discussion, i’m lost. Do i need the add-ons or can i use tor and take it as secure already.
Suite the person. Boot The program
Tor on its own has become less secure from the government as they now have Tor exit nodes, but if you do what Oxide said you will be pretty secure.
“You don’t have enough space in your inventory”
only thing with this is that tor severly will slow you down and expose you data to exit nodes as well as using anonymx will cap you at a certain bandwith usage per day for the standard service using their free vpn so weigh your options
i bake therefore im fried!!
i notaced that on a basic Wifi this method is pretty useless, After all the Bandwidth caps, it’s not optional for a short term out in the open hack or browser. this would be good on a 10meg bandwidth.
is there any other tricks without cutting 85% bandwith?
Suite the person. Boot The program
ya pay for a vpn or hack a wifi access point and drop it to a modified client bridge using ddwrt or openwrt
i bake therefore im fried!!
Nice and very helpful tutorial. I never knew about the add on Anonymox. I appreciate it. Stay anonymous and Stay SECURE my friends.
They are trying to control you, open your eyes and don’t let them.
i bake therefore im fried!!
They are trying to control you, open your eyes and don’t let them.
who said im afraid perhaps i dont need to use tor like i said i have otehr ways i modify a linksys router to a ddwrt client bridge
than i use a cracked wifi key when i go black
so i dont have any thing that ties to me theres a difference between afraid and knowing better some of the code and shit i grab on black sessions in the past i would never use a home connection or anything like that but since i went legit i dont really use this style but i have no problem showing you guys how to hack a wifi network you own and set up a linksys or dlink router with a modified firmware that allows you to have ethernet to a device over wifi and plug in 4 ports including the wan port on the router
i bake therefore im fried!!
Help me with Cookie Stealer
who said im afraid perhaps i dont need to use tor like i said i have otehr ways i modify a linksys router to a ddwrt client bridge
than i use a cracked wifi key when i go black
so i dont have any thing that ties to me theres a difference between afraid and knowing better some of the code and shit i grab on black sessions in the past i would never use a home connection or anything like that but since i went legit i dont really use this style but i have no problem showing you guys how to hack a wifi network you own and set up a linksys or dlink router with a modified firmware that allows you to have ethernet to a device over wifi and plug in 4 ports including the wan port on the router
I am very interested if you could share a tutorial or have some time to discuss on jabber..
Now regarding the post
I came accross recently with this: https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN
Worth reading
I think proxies are very easy to be traced (public ones much easier) i mean if you do soomething serius the combination of tor+PublicProxy will definatly send you in jail…afterall traffic through proxy is not even encrypted..
Imo TOr+Vpn when the vpn is the exit node could increase privacy (only if the vpn provider is 100% safe,anonymous payments,etc)
it could prevent you being traced by pcs used as exit nodes set by the feds..
e.g.
First post nice to meet you all
Isn’t tor a ‘proxy’ chain on itself? :-)
I prefer I2P though.. http://www.i2p2.de/ There are rumours that some onion servers are controlled by higher instances.
Paranoia is our friend gudgip, i was anonymous online before Snowden made it cool, another method to consider is to"hide in the open" , using multiple emails and fake names on all sites you use, run a tor exit node , run a public WiFi hotspot. No traffic will ever be linked to your name specific . I would also recommend a mac address changer, www.fakenamegenerator.com , www.guerrillamail.com, TOR , spotflux(dont use spotflux in its own ) and finally of the top of my head www.hidemyass.com(also not to be used on its own). And remember to clear history and cookies on all browsers you use. I could go on but the most important thing is to be paranoid. I will check out I2P now…
Yay, I like friends ;-) I am only anonymous online when I feel the need for it. I personally don’t like hidemyass.com at all, it’s slow and I’d like to see their logs. I2P and tor, maybe chained if you don’t mind to browse slow (if you use irssi and lynx, there shouldn’t be any problem).
I still prefer the good old backdoor chain on several cracked servers actually. You have full control of the logs and it’s easy to automate a chain. If you chain some backdoors with I2P and/or tor you won’t get caught easily. Except for some human errors.