Home » Articles » Tutorial: Installing Tor With Privoxy
Click Here To Hide Tor

Tutorial: Installing Tor With Privoxy

When it comes to keeping your activities out of the prying-eyes of Evil-Alphabet-Agency’s, one must not slack on beefing up security on both their computer’s and networks. The consequences for those who are involved are just too serious to take lightly. If you are accessing the Dark Net at home at all, there’s a few simple steps you can take to ensure you’re anonymity stays a secret. In this tutorial I am going to go over installing and configuring tor, privoxy, and a free VPN.

>>Hide Your Tor Usage: Click Here For VPN’s Who Respect Your Privacy<<

First of all, absolutely do not use Windows thinking it’s safe. Use Windows at your own risk, I am not going to chance it. Especially when it is publicly known that since the release of Windows Seven Microsoft has been working the NSA, installing secret back doors to pretty much what ever they could scare people in to doing. The NSA can access everything that is accessible on the windows partition of your machine if its not encrypted (Yes, you can remove the back doors within Windows, but that is to say, you can remove the ones that we KNOW about, and I would not put it past the NSA to have a few tricks up their sleeves) I prefer using Linux anyway, I understand that some have difficulties making the transition from Windows to Linux, but that’s why they created man pages, my friend.

(If you don’t know what a command does, just type man <COMMAND> in a terminal, read the manual page, and you’re good to go. Honestly, once you use any flavor of Linux for a while, the scripting will come naturally and Windows will become obsolete (well aside from a small, encrypted partition for what ever Windows applications you can not live with out, but please do make sure you encrypt you hard-drives and make sure you disable WPS on your modems and routers and such (because it is a lot easier to crack a WPS key than to sniff out a handshake sequence, then crack that against a .pcap sniffing file). In windows, use Veracrypt, and while installing Linux, wipe the disk completely and encrypt it all with VSLM. Of course back ups should be made first, but an encrypted hard-drive really give me piece of mind. I do not do anything illegal even I just get sick when I think about Government Agents who are supposed to protect us, pilfering through my computers, and precipitating the demise of American’s Right to Privacy. Since 9/11. they have basically made The Right To Privacy a joke, and it was done in the name of Patriotism. My retort to their Ranging Rover Taps and Legalized Racism.

Anyway, so now to the technical stuff (Sorry it’s kind of boring, but our Right To Privacy as a Nation is at stake, not to mention our personal freedoms (which is a really good reason to put up with the boring) If we don’t take a stand and take hold of this situation now, privacy as we know it will become another yet another causality of war.

I am defiantly not here to tell you what you should do, mind you, just here to urge you to do something. As for which flavor of Linux you should (if you’re not already using one), I would recommend Kali-Linux. It is Debian-based (which even if you don’t know already, it’s still way worth it to get use to Debian-based distributions (because Ubuntu is cool or what not, but, all the sudooing is tiresome) and plus Kali is a security-auditing distribution of Linux, meaning it can easily achieve the things we need it for. You can install the same things on any distribution of Linux, it just may require a little more reading (but if you use Kali you can just follow these steps and then you’re good to go.

Now you should download what ever Kali*.iso is compatible with your machine (32 or 64 bit, AMD or Intel, etc) from Offense Security, install it and I recommend completely wiping your system (unless it is good already :) and encrypting the entire hard-drive with VSLM. It is an option when installing, do it, just remember the key you use because if you forget it it’ll will be a hassle.

After the install, go to this website and follow these instructions (things like installing the proper audio-drivers, which is a trademark problem of Debian-based flavors, but the pros defiantly outweigh the cons here, defiantly. This is the url you need. After those things are done, we need to install Viadalia (the gui-front-end-to-Tor), tor itself, privoxy, proxy-chains, and open dns (to prevent people from being able to see the dns address of the ISP you use). Also when making pgp keys please don’t put your normal email address, I recommend trying to figure out how i2p email or FreeNet mail works (kind of easier said than done, but the reward will be piece of mind and a clean, anonymous email address, because they are more secure than using a Gmail account, for example. Also, if you use your computer at home for accessing the DarkWeb, I highly recommend the use a VPN with these measures, then I would consider it pretty safe, or at least, way too much of a hassle for people to go through.

In prompt, type $’sudo -s’ for a root shell, enter your password, then enter these commands as Root:

The after that, use this server (for US, for other country’s just google it.)

That will configure your VPN properally, now to install tor and the other tools (and to make sure they are working properly).

Now, we have to edit a configureation file, simply type

And go down to line (it was 699 on my config file)

Now, take the # sign out of line 699 and make it read

And then go to the very bottom of the file, and add these lines:

*Make sure you put a period at the end of the address:port combination. (Copying and pasting would probably be how I would do it) I forgot that once and it took a while to realize what I had done wrong. We are almsost finished! Now Type,

Now, you need to set you browser to use the proxy (or just download the add-on FoxyProxyStandart and once installed Go > File > Tor Wizard, and just choose the options that come (all you have to is hit enter, then chose that proxy configuration you just made, and go to Google and search am I using Tor. Assuming you were successful, there is just one last step.

Then, you save it, and #leafpad /etc/resolv.conf, delete everything in the file (it’s about three to five lines in length), and replace it “nameserver 127.0.0.1”, then save it.

If it were me I would just restart the computer (to see if Tor and Privoxy are both installed and starting during the other init.d daemons.) but you could just restart the services, but you’re through the process now. To make sure you are safe, check out “http://www.ipchicken.com” or “https://www.whatismyip.com” and make sure both your current IP Address is masked as well as you’re ISP’s DNS is hidden as well. This is an example of a properly configured box:

privtor

10 comments

  1. Don’t use these instructions to browse the web. Using privoxy as a layer between Tor and your TCP application is fine, but with web browsers, there is another layer of complexity served best by the Tor Browser. (Example: Are you secure from ICE requests deanonymizing you? If you’re going through Tor proxy, using a regular browser, you’re not. If you’re using TBB, they’ve already fixed that.) Also, by not using the Tor Browser and going it on your own, you’re losing your “herd immunity” which is the main thing keeping Tor users safe these days … especially in the advent of advanced traffic analysis attacks to which Tor doesn’t defend well. YOU’VE BEEN WARNED.

  2. do i need that if i use tails ?

  3. Tor recommends not to use a VPN. I’m beginning to think that deepdotweb is full of shit. Lately there have been articles being posted having to do with vpn+tor. People don’t do it!
    https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN

    • Wow, did you even read the link you posted? Before anyone gives your opinion any value at all, if you took two seconds and clicked the link and look in the General section you will clearly see:

      RE: using a vpn
      “Against colluding Tor nodes you are safer, against blackhat hackers who target Tor client code you are safer (especially if Tor and VPN run on two different systems). If the VPN/SSH server is adversary controlled you weaken the protection provided by Tor. If the server is trustworthy you can increase the anonymity and/or privacy (depending on set up) provided by Tor.

      Emphasis added, most people that I know would trust a VPN in a non-US legal district over their ISP when it comes to protecting their privacy. Even if the VPN provider gives up the goods (revealing your home IP), you would still have the ISP as a last line of defense (whatever that is worth) as long as you paid the VPN provider in bitcoin/cash and gave them fake info.

      Enough FUD, deepdotweb serves a very good purpose and is a great resource to get started. It shouldn’t be your only resource, but it is a great place to start.

  4. mullvad cash in mail vpn no $$ trail.

  5. Everybody fights for himself.
    The best I know,is a whonix as 2x VM in a VBox.
    On the top of it your own Time Server and your own DNS server and not the built in wifi chip, but an USB one.
    The best advice is to install & play around with Kali Linux (a DEBIAN derivative ) to understand (1% of) the dangers of using a computer.
    Secure email equals https://bitmessage.ch/

  6. ohhm…

    apt-get update
    apt-get install xyz
    apt-get update
    apt-get install zyx
    apt-get update

    wtf, please flush this article… op should learn the basics from his linux tools before he writes a half baken tutorial… there enough lame tuts out there…

    bzzbzz

  7. scramble suit bridges for tor browser
    is safe and better than vpn and other bridges.

  8. Vidalia now does not exist, Ubuntu now doesn’t use the service command but systemctl, and why are you suggesting us to use Google ?

Leave a Reply

Your email address will not be published. Required fields are marked *

*

Captcha: *