Document "How to setup an anonymous proxy" is done. #162

Closed
prism_breaker wants to merge 3 commits from prism_breaker/blog-contributions:main into main
First-time contributor
No description provided.
prism_breaker added 1 commit 2024-11-06 01:50:06 +01:00
Owner

Hi, i'd say this is 90% completed. (related issue #29 )

We're missing the Why and the opsec recommendations part

Why:

  • add a graph to show the setup we're targeting (you -> tor -> residential proxy -> website)
  • explain when exactly you need such a setup: when the destination website blocks tor, and when the destination website also blocks VPNs, only then you should consider doing a (you -> tor -> residential proxy -> website) setup
  • this is to make it look like you are connecting from home to a website, as if not trying to be anonymous, but in reality tor is still protecting your anonymity. >> link back to this tutorial https://blog.nowhere.moe/opsec/torthroughvpn/index.html for more context
  • the rest of your anonymous activities are to remain in a separate Whonix VM by default (you -> tor -> website) setup. only use this in the serverside context above.
  • note that in this case a website is clearly against your anonymity and they may be flagging proxy IPs

OPSEC Recommendations:
Hardware : (Personal Computer / Laptop)
Host OS: Linux (or Qubes OS like you mentionned)
Hypervisor: libvirtd QEMU/KVM (or Xen in the case of qubes OS)
Virtual Machine: Whonix VM DEDICATED to the (you -> tor -> residential proxy -> website) setup

typos:
"anonymouse" >> "anonymous"

Hi, i'd say this is 90% completed. (related issue https://git.nowhere.moe/nihilist/blog-contributions/issues/29 ) We're missing the Why and the opsec recommendations part Why: - add a graph to show the setup we're targeting (you -> tor -> residential proxy -> website) - explain when exactly you need such a setup: when the destination website blocks tor, and when the destination website also blocks VPNs, only then you should consider doing a (you -> tor -> residential proxy -> website) setup - this is to make it look like you are connecting from home to a website, as if not trying to be anonymous, but in reality tor is still protecting your anonymity. >> link back to this tutorial https://blog.nowhere.moe/opsec/torthroughvpn/index.html for more context - the rest of your anonymous activities are to remain in a separate Whonix VM by default (you -> tor -> website) setup. only use this in the serverside context above. - note that in this case a website is clearly against your anonymity and they may be flagging proxy IPs OPSEC Recommendations: Hardware : (Personal Computer / Laptop) Host OS: Linux (or Qubes OS like you mentionned) Hypervisor: libvirtd QEMU/KVM (or Xen in the case of qubes OS) Virtual Machine: Whonix VM DEDICATED to the (you -> tor -> residential proxy -> website) setup typos: "anonymouse" >> "anonymous"
prism_breaker added 1 commit 2024-11-06 23:28:18 +01:00
Owner

ok i'll finish polishing it, please add your details in the footer section so that i can send the monero payment

ok i'll finish polishing it, please add your details in the footer section so that i can send the monero payment
prism_breaker added 1 commit 2024-11-07 20:09:42 +01:00
Owner

payment sent, thanks, will finish it

payment sent, thanks, will finish it
nihilist closed this pull request 2024-11-07 21:09:28 +01:00

Pull request closed

Sign in to join this conversation.
No reviewers
No Milestone
No project
No Assignees
2 Participants
Notifications
Due Date
The due date is invalid or out of range. Please use the format 'yyyy-mm-dd'.

No due date set.

Dependencies

No dependencies set.

Reference: nihilist/blog-contributions#162
No description provided.