Add to bookmarks
Search using Searx
http://eb6w5ctgodhchf3p.onion
http://searchb5a7tmimez.onion
http://ulrn6sryqaifefld.onion

---

##### TOR SETTINGS #############
$ cd /etc/tor
$ su echo " " >> torrc-defaults
$ su nano torrc-defaults
#### /etc/tor/torrc-defaults
FetchDirInfoEarly 1
sandbox 1
KeepalivePeriod 150
CircuitPriorityHalflife 0
ExcludeSingleHopRelays 1
CircuitIdleTimeout 1000
CircuitBuildTimeout 30
ClientOnly 1
GeoIPExcludeUnknown 1
NewCircuitPeriod 10
MaxCircuitDirtiness 300
EnforceDistinctSubnets 1
StrictNodes 1
UseEntryGuards 1
UseEntryGuardsAsDirGuards 1
FastFirstHopPK 0
AllowSingleHopCircuits 0
Tor2webMode 0

ExcludeNodes {??},{CN},{TW}
EntryNodes {GB}
ExitNodes {RU}

^X and save file

Exclude countries that you feel are sophisticated, and change the country codes for EntryNodes and ExitNodes to match your needs

su systemctl restart tor
su systemctl status tor

---

ExcludeNodes {US},{UK},{GB},{NZ},{CA},{AU},{CN},{TW}
EntryNodes {DE}
ExitNodes {RU}

---

proxylist.hidemyass.com

http://maxiproxies.com/proxy-list

---

##### Add proxies to Proxychains ###

$ su torify pacman -S proxychains

$ su nano /etc/proxychains.conf
page down to the end of file
[ProxyList]
socks4 127.0.0.1 9050
socks5 IPv4_address port#

^X and save

add 2 or 3 more socks5 proxies in the chain.

---

##### Download videos from Youtube ##

$ proxychains youtube-dl --batch-file list.srt
[proxychains] Strict chain ... 127.0.0.1:9050 ... 58.45.200.15:1080 ... www.youtube.com:443 ...OK

---

I use a VPN: mullvad

Its nice but now I want to do proxy chains like these anons.

I use youtube-dl, deactivated Javascript and Flash, use the IceCat browser. I use ixquick for searches.

---

I just chained behind a tor->socks5 proxy->https proxy -> youtube
$ proxychains youtube-dl https://youtube.com/watch?v=video
I'm getting transfer rates of around 100Kb/s , not great but acceptable. Good if it increases anonymity.

---

Regular download speeds behind tor vary from 300-600Kb/s. So a slow down to 100 Kb/s isn't that bad. This may or may not increase anonimity, it may actually decrease it. Most trafic will come from an exit node, so coming off of a lone proxy may help to pin down that kind of traffic. Switching front end proxies every couple of downloads might be a good idea.

---

Theory: Entry and Exit nodes are monitored. Traffic is encrypted. Not all proxies are monitored. M represents monitoring. M is used for correlation.

You->M1->TorEntry->relay->Exit->M2->Socks5->Socks5->M3-Youtube.com
Hope: correlation between M1 and M3 is obscured by indirect connection and differential lag between servers. Status: Unknown

---

You->M1->TorEntry->Tor_Relay->Tor_Exit->M2->M3->youtube.
Status: Deanonamization certain.

youtube is prism it is M3
all tor entry and exit nodes are logged by NSA.

---

Packet content is encrypted until it hits M3. Even if you use https://www.youtube.com the server will still relay the information about which video you watched. The sequence of video downloads, and the ip of the requesting server.

---

Content clusters (what types of videos, which channels, sequence of downloads between channels) can be used to statistically deanonymize the user.

What are some non-prism video services to replace youtube with? Any suggestions?