Anonymity Guide
Set up Tor & Proxychains
Tor: An open-source software that enables anonymous communication by directing internet traffic through a worldwide, volunteer-operated network of servers, concealing a user's location and usage from surveillance and traffic analysis.
Proxychains: A UNIX program that forces any TCP connection made by any given application to follow through proxy servers like TOR or any other SOCKS4, SOCKS5, or HTTP(S) proxy, thereby hiding the user's real IP address.
Proxychains offers three chain types:
Dynamic Chain: Routes traffic through available proxies in the list, skipping any that are down.
Strict Chain: Routes traffic through proxies in the exact order listed; if one proxy fails, the connection is terminated.
Random Chain: Selects proxies randomly from the list for each connection.
For optimal flexibility and reliability, it's recommended to use the Dynamic Chain. Uncomment the dynamic_chain
line and comment out the others
To prevent DNS leaks, ensure that DNS requests are also routed through the proxy chain. Uncomment the proxy_dns
line:
At the end of the configuration file, specify the proxies to be used. To route traffic through Tor's SOCKS5 proxy, add or ensure the following line is present:
Email Provides
Anonymous Phone Number
Permanent solution
Buy prepaid SIM card in cash without ID.
Consider VoIP services accepting cryptocurrency.
Fake Identity
Secure Encrypted Messaging
Anonymous Package Delivery
USPS General Delivery Pick up packages anonymously at post offices.
Anonymous Payments
Last updated