Tor + Proxychains. Hide Your Public Ip.

VizOne

✨ Cvv Seller ✨
Verified Vendor
Joined
May 27, 2016
Messages
2,713
Likes
898
Points
723
if you want to remain 100% anonymous you are in the right place. I'll show you how to connect to a proxy after passing the tor circuits.

Using distributions like tails the outgoing traffic will be exclusive to tor (you can do it via firewall with any other linux distribution)

-- Go to the official website of Tails OS and download the latest version.
-- Make bootable USB with the ISO file (as an alternative you could use virtual machine).
-- Boot the computer with USB stick.
-- When you are in the welcome screen press "+" button for additional settings, set an administrator password and start tails.

tails.png

-- Open the terminal, type sudo -i and enter the password you chose first.
-- Type apt update && apt install proxychains && apt install firefox-esr. this will update the packages and install the software you need.
-- Get out of the root environment by typing exit and open the proxychains config file with sudo nano /etc/proxychains.conf.
-- Get a fresh ip address, go to the end of the file and add a line like this: socks5 IP PORT

chains.jpeg


Do not remove the line that refers to the localhost 127.0.0.1 that entry allows proxychains to connect to tor first (removing it you will not be able to connect to the internet because you will not go through tor and i repeat, the system does not allow this).
DO NOT CHANGE OTHER ENTRIES IF YOU DON'T KNOW EXACTLY WHAT YOU ARE DOING

-- Close the file, now you can run firefox via proxychains. Type proxychains firefox-esr.
Before arriving at the desired website you will go through the various tor nodes and finally you will connect to the server proxy you just added.
I want to remember that if you start Tails without encrypted persistence, at the next reboot you will have to repeat these steps.

That's all
1f642.png
, i hope it can help someone.
 
Top Bottom