(02-21-2018, 03:11 PM)Searchernow link Wrote: What does "chain some proxies open firefox through them in your terminal" mean?
I have firefox.
Info about proxychains -
https://www.howtoinstall.co/en/ubuntu/xe...roxychains
Code:
sudo apt-get install proxychains
Edit conf file -
where it says add proxy, below this line add in your proxies, by Type - Host - Port
Uncomment - defaults set to TOR, to not use TOR.
comment in (remove #) - dynamic_chain, so it rotates through your proxy list and skips any unresponsive ones.
comment in - random_chain , so each restart is begins different order.
comment in - chain_len= , and set to the number of proxies you want in your chain, for it to use.
How to set up Firefox to use proxies -
https://support.mozilla.org/en-US/kb/con...gs-firefox
Open terminal type
or whatever else software you want to use the proxychain with instead of firefox, such as for pen testing the system you do own
Hope it helps members to improve/increase their privacy.
Safety -
The same as with TOR, do not enter credentials online (l:p - logins /passwords) whilst using the proxies, don't do any shopping or use any accounts such as forums. Be sure of this, and always check your connection is as you expect after using to be certain you didn't make an error if distracted.
For the good privacy you must have at least one of Level 1 proxy.
Level 2 proxy it can be detected as a proxy and blocked by end sites if they block proxy.
Level 1 sometimes, but rare if it is true Level 1 AKA Elite Proxy.
Always test your proxies well, make your preferred method.
For best privacy you must have at least 1 of Level 1 proxy in Russian Federation or China territory as they will not cooperate with your LEO's. (like those in their jurisdiction must, as must VPN's).
There will be other ways to make proxy chains, I am unsure on Linux only this way I have seen so far.
You can add an extra level of anonymity to this such as if you only want proxies that will cooperate with your LEO's rofl, then you need to go in the back of a friends car, or drive and park, then "use some free wifi you find", (AKA wardriving) as the first connection to the proxies, for more serious level privacy events/leaks.