<h1>How to get and use residential proxies anonymously</h1>
<p>While Tor is a requirement to protect your anonymity online, some services refuse to be accessed anonymously, and are intentionally blocking connections coming from Tor exits nodes. These services are against your anonymity, but there are still ways to access them anonymously:<p>
<imgsrc="AccessDenied.jpg"class="imgRz">
<p>A residential proxy will reroute your access through a residential ip address, which makes your connection look like it is coming from your ISP or your mobile carrier.</p>
<p><u>Serverside Context:</u> This setup is to be considered only in the case where the destination website also blocks your attempts at connecting there via a <ahref="../whenTorisblocked/index.html">(you -> Tor -> VPN -> destination)</a> setup.</p>
<imgsrc="../torthroughvpn/12.png"class="imgRz">
<p> Under this setup you can access those websites that are blocking both Tor and VPN traffic, while still keeping your anonymity intact.</p>
<imgsrc="AccessAllowed.jpg"class="imgRz">
<pstyle="color: red;">Warning: This setup is not officialy supported by Tor project, it should be considered as experimental. It is still recommended to use the default setup of Whonix and Tor browser for the rest of your anonymous activities online.</p>
<p>For further details on how you can combine Tor and VPNs to protect your anonymity, refer to <ahref="../torthroughvpn/index.html">this tutorial</a></p>
<li><p>Virtual Machine:<ahref="../whonixqemuvms/index.html">Whonix</a> (that must be dedicated to the (you -> Tor -> residential proxy -> website) setup </p></li></ol>
</ol>
</div>
</div><!-- /row -->
</div><!-- /container -->
</div><!-- /grey -->
<!-- +++++ Second Post +++++ -->
<divid="anon3">
<divclass="container">
<divclass="row">
<divclass="col-lg-8 col-lg-offset-2">
<h2><b>Proxy Purchase</b></h2>
<p><pstyle="color: red;"><u>Warning:</u> Everything below needs to be done inside the dedicated new whonix workstation VM!</p></p>
<p><ahref="https://smspool.net/">smspool.net</a> is chosen to be the proxy provider for this demo, the author is not affiliated with this service. It is used because it is monero friendly, other service providers should work similarly.</p>
<p>Choose "switch to hCaptcha" otherwise you might get stuck at the cloudflare verification.</p>
<p>The next step is to deposit monero into the website and purchase the proxy.</p>
<imgsrc="Deposit.png"class="imgRz">
<p>When your deposit get credited, purchase the proxy.</p>
<imgsrc="Proxy.png"class="imgRz">
<p>Now your proxy is ready, check for the details inside "My Proxy" section.</p>
<imgsrc="ProxyData.png"class="imgRz">
<p>Copy your proxy ip, port, username, password. It will be used later.</p>
</div>
</div><!-- /row -->
</div><!-- /container -->
</div><!-- /white -->
<divid="anon2">
<divclass="container">
<divclass="row">
<divclass="col-lg-8 col-lg-offset-2">
<h2><b>Browser setup</b></h2></br></br>
<p>Due to an upstream change, the proxy setup method mentioned in whonix tutorial is not working <ahref="https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_before_a_proxy/Proxy_Settings_Method">https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_before_a_proxy/Proxy_Settings_Method</a></p>
<p>One of the other methods is to use the foxyproxy addon. <b>However please note that installing a plugin will change the Tor browser fingerprint, so it is highly recommended you keep the rest of your anonymous activities in a separate default Whonix Workstation VM.</b> Use this setup only when you are in this specific serverside context.</p>
<p>Add the proxy information in the "proxy" tab.</p>
<imgsrc="FoxyProxyAdd.png"class="imgRz">
<p>In this demo, the proxy is HTTP, if you use a different provider and it doesn't work, try to check the protocol. Fill all the info and save it.</p>
<p>Now check the website you want to accessed, it is blocked because you are still using the Tor exit node.</p>
<imgsrc="WebsiteDenied.png"class="imgRz">
<p>Choose the proxy you just added in FoxyProxy button, and reset your Tor browser identity.</p>
<p>Now access <ahref="https://check.Torproject.org">https://check.Torproject.org</a>, and you should see a warning says you are not using Tor, due to having the connection originating from the residential Proxy IP, <b>this means that you have successfully completed the (you -> Tor -> residential proxy -> website) Setup, effectively hiding that you're using Tor from the destination website.</b></p>
<imgsrc="CheckIP.png"class="imgRz">
<p>Now try the website that blocks Tor, it should work now if you did everything correctly!</p>
Shatter the big brother.</p></br></br><p>Creative Commons Zero: <ahref="../../../../opsec/runtheblog/index.html">No Rights Reserved</a></br><imgsrc="\CC0.png">