In this tutorial, we will learn how to anonymize our internet traffic using two powerful tools: Proxychains and Tor. Before we delve into the process, let’s understand what these tools are.
Tor (The Onion Router) is an open-source software that enables anonymous communication by directing internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis.
Proxychains is a UNIX program, that hooks network-related libc functions in DYNAMICALLY LINKED programs via a preloaded DLL (dlsym(), LD_PRELOAD) and redirects the connections through SOCKS4a/5 or HTTP proxies. This can be beneficial for those seeking to anonymize their internet activity or bypass network filters.
SOCKS is an integral part of this process. It’s an Internet protocol that facilitates the exchange of network packets between a client and server via a proxy server.
To set up this system, you’ll require two components: Tor and Proxychains.
Now, let’s get started on how to use these tools to anonymize our internet traffic.
Installation and Configuration Guide
Here’s a step-by-step guide on how to install and configure these tools:
- Installation of Tor: The first step involves installing Tor, which can be done using the following command:
sudo apt install tor
- Installation of Proxychains: Next, install Proxychains using this command:
sudo apt install proxychains
- Enabling the Tor service: Once both are installed, enable the Tor service with the command
sudo systemctl enable tor service
- Starting the Tor service: If there are issues with the Tor service, you can start it manually using
sudo service tor start
- Checking the Tor service status: You can check the status of the Tor service at any time with
sudo service tor status
- Fixing potential issues: If the Tor service is disabled, you can fix this issue using
sudo systemctl enable tor.servicefollowed by
sudo systemctl enable tor
- Configuring the Proxychains.conf file: Open the Proxychains configuration file using
sudo nano /etc/proxychains.conf. Then, make the following changes:
Proxy DNS requests - no leak for DNS datais uncommented.
- Adding IP & PORT to the Proxychains.conf file: Add
socks5 127.0.0.1 9050at the end of the Proxychains.conf file.
- Rebooting the system: After making these changes, reboot your system with the command
- Checking Tor and Proxychains: Finally, you can check if Tor and Proxychains are working correctly using the command
proxychains firefox whatismyipaddress.com
Remember that while Proxychains and Tor can significantly increase your privacy online, they are not foolproof.
Some websites may block traffic from known Tor nodes, and your ISP may still be able to see that you’re using Tor.
Nevertheless, for most purposes, this setup will provide a significant boost to your online anonymity.
Remember to keep your software updated, as new versions of Tor and Proxychains may include important security fixes.