How to Anonymize Traffic With Proxychains & Tor

In this tutorial, we will learn how to anonymize our internet traffic using two powerful tools: Proxychains and Tor. Before we delve into the process, let’s understand what these tools are.

Tor (The Onion Router) is an open-source software that enables anonymous communication by directing internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis.

Proxychains is a UNIX program, that hooks network-related libc functions in DYNAMICALLY LINKED programs via a preloaded DLL (dlsym(), LD_PRELOAD) and redirects the connections through SOCKS4a/5 or HTTP proxies. This can be beneficial for those seeking to anonymize their internet activity or bypass network filters.

SOCKS is an integral part of this process. It’s an Internet protocol that facilitates the exchange of network packets between a client and server via a proxy server.

To set up this system, you’ll require two components: Tor and Proxychains.

Now, let’s get started on how to use these tools to anonymize our internet traffic.

Installation and Configuration Guide

Here’s a step-by-step guide on how to install and configure these tools:

  1. Installation of Tor: The first step involves installing Tor, which can be done using the following command: sudo apt install tor
  2. Installation of Proxychains: Next, install Proxychains using this command: sudo apt install proxychains
  3. Enabling the Tor service: Once both are installed, enable the Tor service with the command sudo systemctl enable tor service
  4. Starting the Tor service: If there are issues with the Tor service, you can start it manually using sudo service tor start
  5. Checking the Tor service status: You can check the status of the Tor service at any time with sudo service tor status
  6. Fixing potential issues: If the Tor service is disabled, you can fix this issue using sudo systemctl enable tor.service followed by sudo systemctl enable tor
  7. Configuring the Proxychains.conf file: Open the Proxychains configuration file using sudo nano /etc/proxychains.conf. Then, make the following changes:
    • Change #Dynamic Chain to Dynamic Chain
    • Change Strict Chain to #Strict Chain
    • Change #Random Chain to Random Chain
    • Ensure Proxy DNS requests - no leak for DNS data is uncommented.
  8. Adding IP & PORT to the Proxychains.conf file: Add socks5 9050 at the end of the Proxychains.conf file.
  9. Rebooting the system: After making these changes, reboot your system with the command reboot
  10. Checking Tor and Proxychains: Finally, you can check if Tor and Proxychains are working correctly using the command proxychains firefox


Remember that while Proxychains and Tor can significantly increase your privacy online, they are not foolproof.

Some websites may block traffic from known Tor nodes, and your ISP may still be able to see that you’re using Tor.

Nevertheless, for most purposes, this setup will provide a significant boost to your online anonymity.

Remember to keep your software updated, as new versions of Tor and Proxychains may include important security fixes.