Added missing explanation

This commit is contained in:
prism_breaker 2024-11-06 22:26:59 +00:00
parent 18702e2914
commit 5f861516eb
3 changed files with 15 additions and 6 deletions

Binary file not shown.

After

Width:  |  Height:  |  Size: 19 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 17 KiB

View File

@ -61,13 +61,22 @@
<div class="row"> <div class="row">
<div class="col-lg-8 col-lg-offset-2"> <div class="col-lg-8 col-lg-offset-2">
<a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>prism_breaker</ba></p> <a href="../index.html">Previous Page</a></br></br><p><img src="../../assets/img/user.png" width="50px" height="50px"> <ba>prism_breaker</ba></p>
<h1>Setup a anonymouse residential proxy with tor browser</h1> <h1>Setup a anonymous residential proxy with tor browser</h1>
<p>This tutorial shows how to use a residential proxy after tor connection, so you can access websites that ban tor exit nodes. <p>OPSEC Recommendations:
</p> Hardware : Personal Computer / Laptop
<p>Readers are assumed to have a working Qubes-Whonix setup, and have already acquired monero anonymously. <br>Host OS: Qubes (or Qubes OS like you mentionned)
</p> <br>Hypervisor: Xen
<br>Virtual Machine: Whonix VM DEDICATED to the (you -> tor -> residential proxy -> website) setup</p>
<p>Tor is strong protection of user privacy, but some services are not possible to access because tor exits nodes are blocked. These services are usually very privacy unfriendly, because the web service is intentionally deanonymising its users.</p>
<img src="AccessDenied.jpg" class="imgRz">
<p>A residential proxy will reroute your access through a low risk ip address, which makes your access looks like average Joe. Under this setup you can access those website that attempt to block anonymous users, while still under the protection of tor.</p>
<img src="AccessAllowed.jpg" class="imgRz">
<p>If not, read the below tutorials: to be done</p> <p style="color: red;">Warning: This setup is not officialy supported by tor project, it should be considered as experimental. It is still recommended to use the default setup of Whonix and Tor browser.</p>
<p>For further research you can refer to this tutorial <a href="https://blog.nowhere.moe/opsec/torthroughvpn/index.html">https://blog.nowhere.moe/opsec/torthroughvpn/index.html</a></p>
<p >Readers are assumed to have a working Qubes-Whonix setup, and have already acquired monero anonymously.
If not, read the below tutorials: to be done</p>
<p>Other useful reference: <a href="https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_before_a_proxy">https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_before_a_proxy</a> </p> <p>Other useful reference: <a href="https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_before_a_proxy">https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_before_a_proxy</a> </p>