Computing
How to stay ANONYMOUS on Tor.
Submitted by love u, 12-04-2018, 04:47 AM, Thread ID: 84241
Thread Closed
12-04-2018, 04:47 AM
#1 How to stay ANONYMOUS on Tor.
- Beginner Guide -
*DISCLAIMER* You are never fully anonymous on Tor. These are tips to improve youranonymity, not be completely anonymous.
Anonymity
Anonymity, adjective "anonymous", is derived from the Greek word ,anonymia, meaning "without a name" or "namelessness". In colloquial use, "anonymous" is used to describe situations where the acting person's name is unknown. Some writers have argued that namelessness, though technically correct, does not capture what is more centrally at stake in contexts of anonymity. The important idea here is that a person is non-identifiable, unreachable, or untrackable. Anonymity is seen as a technique, or a way of realizing, certain other values, such as privacy, or liberty.
Virtual Private Network (VPN)
What Is A VPN?
VPN connectivity overview
A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running across the VPN may, therefore, benefit from the functionality, security, and management of the private network.
VPNs may allow employees to securely access a corporate intranet while located outside the office. They are used to securely connect geographically separated offices of an organization, creating one cohesive network. Individual Internet users may secure their transactions with a VPN, to circumvent geo-restrictions and censorship, or to connect to proxy servers for the purpose of protecting personal identity and location in order to stay anonymous on the internet. However, some Internet sites block access to known VPN technology to prevent the circumvention of their geo-restrictions. Therefore, many personal use VPN providers have been developing technologies to bypass the blocking of proxies.
A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption. A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely.
How Does A VPN Work?
[spoiler]A VPN protects your privacy by creating a secure "tunnel" across the Internet between you and your Internet destination. This tunnel is created by first authenticating your client; a PC, tablet, or smartphone; with a VPN server. The server, which you can run yourself with programs such as OpenVPN, then uses one of several encryption protocols to make sure that everything sent between you and websites and Internet services can't be monitored. It does this by creating an encrypted tunnel, which is like putting a package into a box and then sending it to someone. Nobody can see what it's inside the box until it's opened/decrypted.
VPN connectivity overview
A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running across the VPN may, therefore, benefit from the functionality, security, and management of the private network.
VPNs may allow employees to securely access a corporate intranet while located outside the office. They are used to securely connect geographically separated offices of an organization, creating one cohesive network. Individual Internet users may secure their transactions with a VPN, to circumvent geo-restrictions and censorship, or to connect to proxy servers for the purpose of protecting personal identity and location in order to stay anonymous on the internet. However, some Internet sites block access to known VPN technology to prevent the circumvention of their geo-restrictions. Therefore, many personal use VPN providers have been developing technologies to bypass the blocking of proxies.
A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption. A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely.
How Does A VPN Work?
[spoiler]A VPN protects your privacy by creating a secure "tunnel" across the Internet between you and your Internet destination. This tunnel is created by first authenticating your client; a PC, tablet, or smartphone; with a VPN server. The server, which you can run yourself with programs such as OpenVPN, then uses one of several encryption protocols to make sure that everything sent between you and websites and Internet services can't be monitored. It does this by creating an encrypted tunnel, which is like putting a package into a box and then sending it to someone. Nobody can see what it's inside the box until it's opened/decrypted.
Why Should I Use A VPN?
A VPN alone is just a way to bolster your security and access resources on a network youre not physically connected to. What you choose to do with a VPN is a different story. Usually, VPN users fall into a few separate categories:
The student/worker.This person has responsibilities to attendto,and uses a VPN provided by their school or company to access resources on their network when theyre at home or traveling. In most cases, this person already has a free VPN service provided to them, so theyre not exactly shopping around. Also, if theyre worried about security, they can always fire up their VPN when using airport or cafe WI-Fi to ensure no ones snooping on their connection. Photo by Ed Yourdon.
Thedownloader.Whether theyre downloading legally or illegally, this person doesnt want on some companys witch-hunt list just because they have a torrenting app installed on their computer. VPNs are the only way to stay safe when using something like BitTorrenteverything else is just a false sense of security. Better safe than trying to defend yourself in court or paying a massive fine for something you may or may not have even done, right?
Theprivacy mindedand security advocate.Whether theyrea ina strictly monitored environment or a completely free and open one, this person uses VPN services to keep their communications secure and encrypted and away from prying eyes whether theyre at home or abroad. To them, unsecured connections mean someones reading what you say.
The globetrotter.This person wants to watch the Olympics live as they happen, without dealing with their crummy local networks. They want to check out their favorite TV shows as they air instead of waiting for translations or re-broadcasts (or watch the versions aired in other countries,) listen to location-restricted streaming internet radio, or want to use a new web service or application that looks great but for some reason is limited to a specific country or region.
Some combination of the above.Odds are, even if youre not one of these people more often than not, youre some mix of them depending on what youre doing. In all of these cases, a VPN service can be helpful, whether its just a matter of protecting yourself when youre out and about, whether you handle sensitive data for your job and dont want to get fired, or youre just covering your own ass from the MPAA.
Even if none of the above really sound right to you, you can still benefit from using a VPN. You should definitely use one when you travel or work on an untrusted network (read: a network you dont own, manage, or trust who manages.) That means opening your laptop at the coffee shop and logging in to Facebook or using your phones Wi-Fi to check your email at the airport can all potentially put you at risk.
The student/worker.This person has responsibilities to attendto,and uses a VPN provided by their school or company to access resources on their network when theyre at home or traveling. In most cases, this person already has a free VPN service provided to them, so theyre not exactly shopping around. Also, if theyre worried about security, they can always fire up their VPN when using airport or cafe WI-Fi to ensure no ones snooping on their connection. Photo by Ed Yourdon.
Thedownloader.Whether theyre downloading legally or illegally, this person doesnt want on some companys witch-hunt list just because they have a torrenting app installed on their computer. VPNs are the only way to stay safe when using something like BitTorrenteverything else is just a false sense of security. Better safe than trying to defend yourself in court or paying a massive fine for something you may or may not have even done, right?
Theprivacy mindedand security advocate.Whether theyrea ina strictly monitored environment or a completely free and open one, this person uses VPN services to keep their communications secure and encrypted and away from prying eyes whether theyre at home or abroad. To them, unsecured connections mean someones reading what you say.
The globetrotter.This person wants to watch the Olympics live as they happen, without dealing with their crummy local networks. They want to check out their favorite TV shows as they air instead of waiting for translations or re-broadcasts (or watch the versions aired in other countries,) listen to location-restricted streaming internet radio, or want to use a new web service or application that looks great but for some reason is limited to a specific country or region.
Some combination of the above.Odds are, even if youre not one of these people more often than not, youre some mix of them depending on what youre doing. In all of these cases, a VPN service can be helpful, whether its just a matter of protecting yourself when youre out and about, whether you handle sensitive data for your job and dont want to get fired, or youre just covering your own ass from the MPAA.
Even if none of the above really sound right to you, you can still benefit from using a VPN. You should definitely use one when you travel or work on an untrusted network (read: a network you dont own, manage, or trust who manages.) That means opening your laptop at the coffee shop and logging in to Facebook or using your phones Wi-Fi to check your email at the airport can all potentially put you at risk.
Paid VPN Services
Currently, I like to use IPVanish or NordVPN.
I will suggest some VPNs but don't use to do extreme illegal activities.
IPVanish
NordVPN
PureVPN
VyprVPN
TorGuard
Hide My Ass VPN
I will suggest some VPNs but don't use to do extreme illegal activities.
IPVanish
NordVPN
PureVPN
VyprVPN
TorGuard
Hide My Ass VPN
Free VPN Services
Never in a million years would I use a free VPN but I will still suggest some since people don'talways have the money to afford a paid VPN.
A free VPN is better than nothing,amiright?
ExpressVPN
TunnelBear
Hide.Me
WindScribe
OperaVPN
GooseVPN
ProtonVPN
[/spoiler]A free VPN is better than nothing,amiright?
ExpressVPN
TunnelBear
Hide.Me
WindScribe
OperaVPN
GooseVPN
ProtonVPN
Proxy Server
What Is A Proxy?
A proxy server, also known as a "proxy" or "application-level gateway", is a computer that acts as a gateway between a local network (e.g., all the computers at one company or in one building) and a larger-scale network such as the Internet. Proxy servers provide increased performance and security. In some cases, they monitor employees' use of outside resources.
A proxy server works by intercepting connections between sender and receiver. All incoming data enters through one port and is forwarded to the rest of the network via another port. By blocking direct access between two networks, proxy servers make it much more difficult for hackers to get internal addresses and details of a private network.
Some proxy servers are a group of applications or servers that block common Internet services. For example, an HTTP proxy intercepts web access, and an SMTP proxy intercepts email. A proxy server uses a network addressing scheme to present one organization-wide IP address to the Internet. The server funnels all user requests to the Internet and returns responses to the appropriate users. In addition to restricting access from outside, this mechanism can prevent inside users from reaching specific Internet resources (e.g., certain websites). A proxy server can also be one of the components of a firewall.
Proxies may also cache web pages. Each time an internal user requests a URL from outside, a temporary copy is stored locally. The next time an internal user requests the same URL, the proxy can serve the local copy instead ofretrievingthe original across the network, improving performance.
Note: Do not confuse a proxy server with a NAT (Network Address Translation) device. A proxy server connects to, responds to, and receives traffic from the Internet, acting on behalf of the client computer, while a NAT device transparently changes the origination address of traffic coming through it before passing it to the Internet.
For those who understand the OSI (Open System Interconnection) model of networking, the technical difference between a proxy and a NAT is that the proxy server works on the transport layer (layer 4) or higher of the OSI model, whereas a NAT works on the network layer (layer 3).
How Does A Proxy Work?
[spoiler]A proxy server is a computer on the web that redirects your web browsing activity. Here's what that means.
- Normally, when you type in a website name (Amazon.com or any other), your Internet Service Provider (ISP) makes the request for you and connects you with the destination; and reveals your real IP address, as mentioned before.
- When you use a proxy your online requests get rerouted.
- While using a proxy, your Internet request goes from your computer to your ISP as usual, but then gets sent to the proxy server, and then to the website/destination. Along the way, the proxy uses the IP address you chose in your setup, masking your real IP address.
A proxy server, also known as a "proxy" or "application-level gateway", is a computer that acts as a gateway between a local network (e.g., all the computers at one company or in one building) and a larger-scale network such as the Internet. Proxy servers provide increased performance and security. In some cases, they monitor employees' use of outside resources.
A proxy server works by intercepting connections between sender and receiver. All incoming data enters through one port and is forwarded to the rest of the network via another port. By blocking direct access between two networks, proxy servers make it much more difficult for hackers to get internal addresses and details of a private network.
Some proxy servers are a group of applications or servers that block common Internet services. For example, an HTTP proxy intercepts web access, and an SMTP proxy intercepts email. A proxy server uses a network addressing scheme to present one organization-wide IP address to the Internet. The server funnels all user requests to the Internet and returns responses to the appropriate users. In addition to restricting access from outside, this mechanism can prevent inside users from reaching specific Internet resources (e.g., certain websites). A proxy server can also be one of the components of a firewall.
Proxies may also cache web pages. Each time an internal user requests a URL from outside, a temporary copy is stored locally. The next time an internal user requests the same URL, the proxy can serve the local copy instead ofretrievingthe original across the network, improving performance.
Note: Do not confuse a proxy server with a NAT (Network Address Translation) device. A proxy server connects to, responds to, and receives traffic from the Internet, acting on behalf of the client computer, while a NAT device transparently changes the origination address of traffic coming through it before passing it to the Internet.
For those who understand the OSI (Open System Interconnection) model of networking, the technical difference between a proxy and a NAT is that the proxy server works on the transport layer (layer 4) or higher of the OSI model, whereas a NAT works on the network layer (layer 3).
How Does A Proxy Work?
[spoiler]A proxy server is a computer on the web that redirects your web browsing activity. Here's what that means.
- Normally, when you type in a website name (Amazon.com or any other), your Internet Service Provider (ISP) makes the request for you and connects you with the destination; and reveals your real IP address, as mentioned before.
- When you use a proxy your online requests get rerouted.
- While using a proxy, your Internet request goes from your computer to your ISP as usual, but then gets sent to the proxy server, and then to the website/destination. Along the way, the proxy uses the IP address you chose in your setup, masking your real IP address.
Why Should I use A Proxy?
Here why some people turn to using a proxy; and why you might be interested as well.
- A school or local library blocks access to certain websites and a student wants to get around that.
- You want to look at something online that interests you...but you would prefer it couldn't be traced back to your IP address and your location.
- You're traveling abroad and the technology set up in the country you're in prevents you from connecting to a website back home.
- You want to post comments on websites but you do not want your IP address to be identified or your identity tracked down.
- Your employer blocks access to social media or other sites and you'd like to bypass those restrictions.
- A school or local library blocks access to certain websites and a student wants to get around that.
- You want to look at something online that interests you...but you would prefer it couldn't be traced back to your IP address and your location.
- You're traveling abroad and the technology set up in the country you're in prevents you from connecting to a website back home.
- You want to post comments on websites but you do not want your IP address to be identified or your identity tracked down.
- Your employer blocks access to social media or other sites and you'd like to bypass those restrictions.
Different Types Of Proxies (Important)
Even though all proxies help you access websites you might not otherwise get to, not all proxies behave the same way. A proxy can fall into one of four categories:
- Transparent proxy. It tells websites that it is a proxy server and it will pass along your IP address anyway.
- Anonymous proxy. It will identify itself as a proxy, but it won't pass your IP address to the website.
- Distorting proxy. It passes along an incorrect IP address foryou,while identifying itself as a proxy.
- High Anonymityproxy. The proxy and your IP address stay a secret. The website just sees a random IP address connecting to it...that isn't yours.
- Transparent proxy. It tells websites that it is a proxy server and it will pass along your IP address anyway.
- Anonymous proxy. It will identify itself as a proxy, but it won't pass your IP address to the website.
- Distorting proxy. It passes along an incorrect IP address foryou,while identifying itself as a proxy.
- High Anonymityproxy. The proxy and your IP address stay a secret. The website just sees a random IP address connecting to it...that isn't yours.
Where To Buy Proxies?
Currently, I like to buy my proxies from either CoolProxies or MPPGroup.
Although, I will stickrecomnendother services.
MPPGroup -Most Popular Proxy Service
CoolProxies - Affordable Proxies
HighProxies -Great Customer Service
SquidProxies -Offer Good Proxies for SEO
BuyProxies -No Strict Terms of use
YourPrivateProxy -Fast Proxies forfootsites
Proxy Fish -Proxies for Streaming sites
Although, I will stickrecomnendother services.
MPPGroup -Most Popular Proxy Service
CoolProxies - Affordable Proxies
HighProxies -Great Customer Service
SquidProxies -Offer Good Proxies for SEO
BuyProxies -No Strict Terms of use
YourPrivateProxy -Fast Proxies forfootsites
Proxy Fish -Proxies for Streaming sites
Where To Get Free Proxies?
Usually the easiest way is simply to goongoogle and search "Proxy List" or "Free Proxies".
A lot of results will come up.
I will not recommend any since I have never tried a free proxy list.
[/spoiler]A lot of results will come up.
I will not recommend any since I have never tried a free proxy list.
Setting Up Tor
Step 1:
[spoiler]Start upTor and head over to options/settings.
You should see a "Contents" tab. Click on that.
Enable "Block pop-up windows" as so:
[spoiler]
[spoiler]Start upTor and head over to options/settings.
You should see a "Contents" tab. Click on that.
Enable "Block pop-up windows" as so:
[spoiler]
[/spoiler]
Step 2:
Head over to the "Privacy" tab and enable your settings as shown:
[spoiler]
[spoiler]
[/spoiler]
Step 3:
Head over to the "Security" tab and enable your settings as shown:
[spoiler]
[spoiler]
[/spoiler]
Step 4:
That's about it for Tor! Remember, don't install addon's, plugins, nor services.
[/spoiler]
Thats about it! Thank you for reading my tutorial and if helped; please like the thread! Sorry if I miss things as I have been working on this while doing homework at the same time and I'm also really tired. Please, let me know if I missed anything and I will add it to the thread.
NOTE: If anything is out of stock; Please message me. I don't update frequently.
RE: How to stay ANONYMOUS on Tor.
12-04-2018, 05:02 AM
#2 I wonder if this is a copy and paste, oh wait yes it is.
RE: How to stay ANONYMOUS on Tor.
12-04-2018, 05:02 AM
#3 I wonder if this is a copy and paste, oh wait yes it is.
RE: How to stay ANONYMOUS on Tor.
12-04-2018, 05:02 AM
#4 I wonder if this is a copy and paste, oh wait yes it is.
RE: How to stay ANONYMOUS on Tor.
12-04-2018, 05:02 AMMuffin Wrote: I wonder if this is a copy and paste, oh wait yes it is.
I am not very good at explaining since my English isn't the best when it comes to explaining things. Although, this was compiled by me. This gets the overview idea of things. Plus not everything was copy and paste.
NOTE: If anything is out of stock; Please message me. I don't update frequently.
RE: How to stay ANONYMOUS on Tor.
24-04-2018, 03:37 PM
#6 anonimus e nord vpm. Thanks a lot of much and youmust continued ok. lol lolo
RE: How to stay ANONYMOUS on Tor.
To be anonymous, I recommend VirtualBox + whonix gateway + windows 7 thin. Or a ready package:
https://dimensionx.club/
Open links in tor browser.
https://dimensionx.club/
Open links in tor browser.
RE: How to stay ANONYMOUS on Tor.
25-04-2018, 05:01 AM
#8 TO BE ANONYMOUS? VIRTUALBOX? NONONO ._. SINTAX ERROR BRO, USER IN LINUX, DEBIAN, AND CONFIG VPN.
RE: How to stay ANONYMOUS on Tor.
25-04-2018, 05:01 AMcarlosnavarrese Wrote: TO BE ANONYMOUS? VIRTUALBOX? NONONO ._. SINTAX ERROR BRO, USER IN LINUX, DEBIAN, AND CONFIG VPN.
Have you tried this solution? You do not believe in the virtualbox, and what do you say about the Tail of usb, and a laptop with libreboot? he is never 100% sure
RE: How to stay ANONYMOUS on Tor.
27-04-2018, 02:59 PM
#10 anonymous and vpn. Thank you so much so I really appreciate what you do
Users browsing this thread: 3 Guest(s)