LinuxQuestions.org
Visit Jeremy's Blog.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie
User Name
Password
Linux - Newbie This Linux forum is for members that are new to Linux.
Just starting out and have a question? If it is not in the man pages or the how-to's this is the place!

Notices

Reply
 
Search this Thread
Old 03-24-2009, 05:33 PM   #1
JavaTheCat
LQ Newbie
 
Registered: Sep 2008
Posts: 4

Rep: Reputation: 0
Proxy Chaining Help


Hi all,

I am currently looking at implementing proxy-chaining for my web-browsing for the simple reason of being able to keep my anonymity.

I have been trying to explore the problem for a while now and have considered options such as Tor. Funnily enough 'Tork' let me do absolutely nothing, also there were some other hazards regarding this that sort of put me off from using it for the time being.

If I wish to simply proxy-chain to hide my IP, what is a sensible way of going about this?

Cheers
 
Old 03-24-2009, 06:34 PM   #2
unSpawn
Moderator
 
Registered: May 2001
Posts: 27,457
Blog Entries: 54

Rep: Reputation: 2897Reputation: 2897Reputation: 2897Reputation: 2897Reputation: 2897Reputation: 2897Reputation: 2897Reputation: 2897Reputation: 2897Reputation: 2897Reputation: 2897
Quote:
Originally Posted by JavaTheCat View Post
for the simple reason of being able to keep my anonymity.
Here's some random notes about the anonymity part.


Quote:
Originally Posted by JavaTheCat View Post
Funnily enough 'Tork' let me do absolutely nothing
And why is that? What errors occured? Did you try setting up the Privoxy (or Polipo) + TOR chain w/o the use of tools?


Quote:
Originally Posted by JavaTheCat View Post
also there were some other hazards regarding this that sort of put me off from using it for the time being.
Please explain which (or point to URI's containing) hazards?


Quote:
Originally Posted by JavaTheCat View Post
If I wish to simply proxy-chain (..), what is a sensible way of going about this?
"Simple" proxy chaining could be done with something like proxychains.

Last edited by unSpawn; 03-24-2009 at 06:35 PM.
 
Old 03-25-2009, 12:15 AM   #3
JavaTheCat
LQ Newbie
 
Registered: Sep 2008
Posts: 4

Original Poster
Rep: Reputation: 0
Just give me a little time before this thread goes too far, I will explain the difficulties I experienced with TorK shortly, and answer your reply properly.

Maybe 'hazards' was perhaps not the right word for the moment?
 
Old 03-25-2009, 05:36 AM   #4
JavaTheCat
LQ Newbie
 
Registered: Sep 2008
Posts: 4

Original Poster
Rep: Reputation: 0
<quote>
And why is that? What errors occured? Did you try setting up the Privoxy (or Polipo) + TOR chain w/o the use of tools?
</quote>

Okay, to add to that. What happened was a little odd. Firstly getting tor and tork were not difficult, nor was installing the programs. I currently use Kubuntu 8.04, so most of the hard work is done for you simply by typing 'sudo apt-get tork' etc.

It has been a couple of months ago now, and I should have kept a copy of this, but I believe I could get Tork to connect
to the Tor Network, and see the servers, but I couldn't get an Opera session to work.

The docs did not seem to be complete but said something like: "TorK is a graphical Tor client that lets you do absolutely nothing". I am not kidding about this.

I did spend some time tinkering around with it and poking around for answers. It wasn't long into my search for anonymity that I encountered using TOR as an option.

Also to answer your question I didn't try to use TOR without the TorK interface.

What I will do however is maybe have another go at it and see what happens, I may have luck. At first though using TOR seemed like the smart thing to do.

I am familiar with the use of Privoxy BTW, which I currently use. For every ad and piece of junk that Privoxy blocks I feel I have won a small victory.

Now when I said 'hazards' perhaps I could have used a better word. I was at a point with this where I was reading articles such as 'Peeling the Onion: Unmasking TOR Users' and there was another article which explained how TOR nodes 'may' 'funnel' traffic by lying about their bandwidth. However, I am by no means an expert on the subject so please don't quote me on that otherwise I wouldn't be asking.

At this stage my interests lie with simply being able to surf without people playing 'silly-buggers' with your IP number, and being able to do basic things like blog and exercise your right to free speech (there are good and bad examples of this) with 'some' degree on anonymity.

I considered proxy-chaining to at least make it slightly more operationally difficult to know your public IP. In a sense a chain of greasy proxies is slightly better than a single hop.

What I have certainly found is that truly understanding the anonymity problem takes quite a bit of knowledge and opinions certainly differ as to what is regarded as an appropriate solution for various uses. This is why feedback and recommendations from people with experience is important in an issue such as this.

I have downloaded proxychains now BTW and take a look at it.
Sorry about the lengthy reply, but I felt as though what I said justified some explanation

Cheers
 
Old 03-25-2009, 03:27 PM   #5
unSpawn
Moderator
 
Registered: May 2001
Posts: 27,457
Blog Entries: 54

Rep: Reputation: 2897Reputation: 2897Reputation: 2897Reputation: 2897Reputation: 2897Reputation: 2897Reputation: 2897Reputation: 2897Reputation: 2897Reputation: 2897Reputation: 2897
NP, I appreciate a lengthy reply as long as it's on topic and makes sense. If you do decide to give TOR another go (and that would make sense) I'd suggest creating a new thread.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
Chaining method with hash results in C++ ckoniecny Programming 1 12-08-2006 11:46 AM
Seperate Chaining in C++ ckoniecny Programming 1 12-03-2006 02:54 PM
chaining multiple commands?? puzz_1 Linux - General 9 05-27-2003 11:32 AM
Mozilla (1.3): Proxy chaining epitome Linux - Software 0 04-23-2003 01:19 PM
Chaining through anon proxy servers in Linux??? amp2000 Linux - General 1 09-17-2002 12:01 PM


All times are GMT -5. The time now is 08:13 AM.

Main Menu
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
identi.ca: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration