filmov
tv
Howto: Be Anonymous On Tor (+ Proxychains)

Показать описание
What proxies are and how to use them to make internet connections more anonymous/private: using Proxychains and Tor. Tor Browser does a great job on its own protecting our Human Right to privacy, but some may appreciate the advice/options.
We will learn how to use Proxychains (w/or without Tor). Proxychains allows you to string together as many proxies together as you like using a simple configuration file format.
We go into Tor Browser Preferences to help Windows users learn to configure a proxy without access to proxychains. This configuration applies to other browsers as well.
We cover this and more in the video.
Proxychains is another tool used by ethical pentesters, and OSINT/LE investigators.
One of the requirements for Democracy to survive is a Free, Independent Press. Journalists and others putting their lives on the line requires confidence in their ability to protect their identities in the field. Otherwise we won't be reading the story.
Human Rights Activists around the world have need for similar protections to continue standing up for rights, online and offline.
"Privacy is the canary in the coalmine of Human Rights. When privacy goes under attack, all other rights are endangered. Privacy is the one Human Right with the ability to protect all others. Without it, no right is truly safe."
-RTP
Thank you for Sharing.
What do you want to see next? Have a fun idea for a future video? I look forward to hearing what you think!
If you like what I'm up to, there are now options to support this content below:
*SHARE THIS (TELEGRAM/SOCIAL MEDIA ETC).*
_____________________________
(organized by category, free Tutorials, anonymous privacy, howto's, Linux, Human Rights)
🎁 Extras: Get Consulting/private help/lessons, your own selfhosted Nextcloud
end to end encrypted server + Tor onion router, and more, in return for your support here.
___________________________________________
___________________________________________
❤️ SUPPORT (If you like):
❤️ MONERO: 48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
___________________________________________
___________________________________________
FOLLOW:
___________________________________________
___________________________________________
___________________________________________
___________________________________________
___________________________________________
Privacy has never been more important. Our Human Rights are under attack and I am trying to help.
___________________________________________
_____________________________________________
TIMESTAMPS
00:00 Introduction
00:07 What is a Proxy?
02:02 The Tor Network And Proxies
03:45 Adding Proxy To Tor Browser
05:43 Proxychains
08:01 Disclaimer, See You Next Time!
LINKS:
Sharing content, posts, and/or video is *much appreciated*.
FOLLOW:
VIDEO CHANNELS/MIRRORS:
BLOG/SUPPORT:
CASHAPP: $HumanRightsTechBMAC:
BTC: 3QDdTcLwLTPXKMBp5dLUhKJG6KbDxWsYWS
XMR:481wHzXEsW9E519uu3SiynMuGe1yUT43iiJ8M49fgxfngHr9MUPVNAmPgyjS4XYtvzD1TbK7P5ywUWhGo11ibT2RQhEcRSX
#Privacy #Tor #private #HumanRights #netflow #proxies #Proxy #Socks5
We will learn how to use Proxychains (w/or without Tor). Proxychains allows you to string together as many proxies together as you like using a simple configuration file format.
We go into Tor Browser Preferences to help Windows users learn to configure a proxy without access to proxychains. This configuration applies to other browsers as well.
We cover this and more in the video.
Proxychains is another tool used by ethical pentesters, and OSINT/LE investigators.
One of the requirements for Democracy to survive is a Free, Independent Press. Journalists and others putting their lives on the line requires confidence in their ability to protect their identities in the field. Otherwise we won't be reading the story.
Human Rights Activists around the world have need for similar protections to continue standing up for rights, online and offline.
"Privacy is the canary in the coalmine of Human Rights. When privacy goes under attack, all other rights are endangered. Privacy is the one Human Right with the ability to protect all others. Without it, no right is truly safe."
-RTP
Thank you for Sharing.
What do you want to see next? Have a fun idea for a future video? I look forward to hearing what you think!
If you like what I'm up to, there are now options to support this content below:
*SHARE THIS (TELEGRAM/SOCIAL MEDIA ETC).*
_____________________________
(organized by category, free Tutorials, anonymous privacy, howto's, Linux, Human Rights)
🎁 Extras: Get Consulting/private help/lessons, your own selfhosted Nextcloud
end to end encrypted server + Tor onion router, and more, in return for your support here.
___________________________________________
___________________________________________
❤️ SUPPORT (If you like):
❤️ MONERO: 48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
___________________________________________
___________________________________________
FOLLOW:
___________________________________________
___________________________________________
___________________________________________
___________________________________________
___________________________________________
Privacy has never been more important. Our Human Rights are under attack and I am trying to help.
___________________________________________
_____________________________________________
TIMESTAMPS
00:00 Introduction
00:07 What is a Proxy?
02:02 The Tor Network And Proxies
03:45 Adding Proxy To Tor Browser
05:43 Proxychains
08:01 Disclaimer, See You Next Time!
LINKS:
Sharing content, posts, and/or video is *much appreciated*.
FOLLOW:
VIDEO CHANNELS/MIRRORS:
BLOG/SUPPORT:
CASHAPP: $HumanRightsTechBMAC:
BTC: 3QDdTcLwLTPXKMBp5dLUhKJG6KbDxWsYWS
XMR:481wHzXEsW9E519uu3SiynMuGe1yUT43iiJ8M49fgxfngHr9MUPVNAmPgyjS4XYtvzD1TbK7P5ywUWhGo11ibT2RQhEcRSX
#Privacy #Tor #private #HumanRights #netflow #proxies #Proxy #Socks5
Комментарии