A small amount of data that does not belong to any file
Tunnel your browser connection through Tor and a proxy for extra security and privacy. An obscure option is to use Mozilla or Hola proxy in conjunction with Tor. This allows users to take advantage of the anonymity provided by Tor, while also benefiting from the additional security and privacy features offered by the proxy service. This is particularly useful when accessing the Internet from untrusted or open networks, such as public Wi-Fi hotspots, as it can help protect against hackers and other malicious actors. In addition, using a tunneling proxy can be useful for bypassing corporate filtering and large government firewalls, allowing users to access blocked content and websites.
By combining a proxy with the Tor network, you can increase your privacy and hide your location. This setup anonymises your origin, making it invisible to the proxy service, and the Tor exit node is unaware of the requests made. This construction ensures that no single party has access to the full picture of your online activities.
The excellent and outstanding software of the Tor Project. Please feel free to make a generous and worthy donation to these esteemed and admirable people.
A proxy from Snawoot:
Please feel free to make a generous donation to His Majesty.
Install Brew.sh:
# /bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"
Install Tor
# brew install tor
Depending on your OS X version you might need to install PHP:
# brew install php
Follow the instructions here to install the most up-to-date version:
Why and how I can enable Tor Package Repository in Debian?
Install PHP if you didn't already:
# apt install php
Download a useful browser: getfirefox.com
Get a proxy switch browser extention for your browser and set it for:
Host: localhost
Port: 8080
Now you can easily enable/disable the proxy in your browser.
Run Tor and one of the proxies:
# tor &
# ./opera-proxy.darwin-arm64 -proxy socks5://localhost:9050 -bind-address localhost:8080 -country EU
Or...
Use this script to run and manage the proxies:
<?php
echo <<<BANNER
______ __ __ __ __ _______ __
| __ \---.-| |--| |--|__| |_| | |-----| |-----*
| < _ | _ | _ | | _| | _ | | -__|
|___|__|___._|_____|_____|__|____|___|___|_____|__|_____| v1.0
BANNER;
/*
Usage: php proxy.php [select proxy = opera_eu]
This script sets up a proxy connection using the Tor network and one of several possible proxy
services (Opera or Hola). The script first displays a banner with information about the version of
the script. The script then sets the location of the Tor binary, and sets up different proxy
options, depending on the user input. The script then installs a Control-C (Break) interrupt and
creates a new process for both Tor and the chosen proxy service. The script runs an infinite loop
that reads output from both processes and displays it to the user. It also includes a few comments
describing the usage of the script and where the sources can be found.
The script includes a class called "process" which is used to create and manage the processes for
the Tor and proxy services. The class includes several methods.
The constructor method, "__construct", takes in one parameter, the command to run the process, and
creates a new process resource using the proc_open() function. It also sets up pipes for standard
input, output, and error streams.
The "read()" method retrieves data from the output and error pipes and returns it as a string.
The "__destruct()" method is used to close the pipes and end the process, it prints a
message "Killing process {$pid}" and it uses the proc_close() and posix_kill() functions to close
the process and kill it.
The class allows to handle the process of Tor and the chosen proxy service as objects, it can read
the output and error of the processes, and it can close them and kill them properly.
Sources:
https://github.com/Snawoot/
https://github.com/Snawoot/hola-proxy
https://github.com/Snawoot/opera-proxy
*** Don't forget to change your default preferences and the locations of the binaries! ***
*/
$tor_bin = "/opt/homebrew/bin/tor";
$proxy_bin = match($argv[1] ?? null) {
default => "./opera-proxy.darwin-arm64 -proxy socks5://localhost:9050 -bind-address localhost:8080 -country EU",
"opera_us" => "./opera-proxy.darwin-arm64 -proxy socks5://localhost:9050 -bind-address localhost:8080 -country AM",
"opera_asia" => "./opera-proxy.darwin-arm64 -proxy socks5://localhost:9050 -bind-address localhost:8080 -country AS",
"hola_us" => "./hola-proxy.darwin-arm64 -proxy-type lum -proxy socks5://localhost:9050 -bind-address localhost:8080 -country us",
"hola_de" => "./hola-proxy.darwin-arm64 -proxy-type lum -proxy socks5://localhost:9050 -bind-address localhost:8080 -country de",
"hola_uk" => "./hola-proxy.darwin-arm64 -proxy-type lum -proxy socks5://localhost:9050 -bind-address localhost:8080 -country uk",
};
//install Control-C (Break) interrupt
declare(ticks = 1);
pcntl_signal(SIGINT, function() { die("\nCaught SIGINT\n"); });
class process {
private $resource = null;
private $pipes = null;
function __construct($cmd) {
$this->resource = proc_open($cmd, [["pipe", "r"], ["pipe", "w"], ["pipe", "w"]], $this->pipes);
foreach([1,2] as $i) stream_set_blocking($this->pipes[$i], false);
}
function read() {
return(stream_get_contents($this->pipes[1]).stream_get_contents($this->pipes[2]));
}
function __destruct() {
$pid = proc_get_status($this->resource)["pid"];
echo "Killing process {$pid}\n";
foreach([0,1,2] as $i) fclose($this->pipes[$i]);
proc_close($this->resource);
posix_kill($pid, SIGTERM);
}
}
// Setup the Tor tunnel first
$tor = new process($tor_bin);
while(true) {
if(!empty($buf = $tor->read())) {
echo $buf;
if(substr($buf, -31) == "Bootstrapped 100% (done): Done\n")
break;
}
usleep(250000); //0.25 sec
}
// Start the proxy through the Tor tunnel
$proxy = new process($proxy_bin);
// Wait for the output forever, cancel by pressing ctrl-c
while(true) {
echo $tor->read();
echo $proxy->read();
usleep(250000); //0.25 sec
}
?>
Last login: Mon Nov 05 11:42:43 on ttys002
root@matrix ~ % php proxy.php
______ __ __ __ __ _______ __
| __ \---.-| |--| |--|__| |_| | |-----| |-----*
| < _ | _ | _ | | _| | _ | | -__|
|___|__|___._|_____|_____|__|____|___|___|_____|__|_____| v1.0
Nov 05 15:18:00.358 [notice] Tor 0.4.7.10 running on Darwin with Libevent 2.1.12-stable, OpenSSL 1.1.1q, Zlib 1.2.11, Liblzma N/A, Libzstd N/A and Unknown N/A as libc.
Nov 05 15:18:00.358 [notice] Tor can't help you if you use it wrong! Learn how to be safe at https://support.torproject.org/faq/staying-anonymous/
Nov 05 15:18:00.358 [notice] Configuration file "/opt/homebrew/etc/tor/torrc" not present, using reasonable defaults.
Nov 05 15:18:00.362 [notice] Opening Socks listener on 127.0.0.1:9050
Nov 05 15:18:00.362 [notice] Opened Socks listener connection (ready) on 127.0.0.1:9050
Nov 05 15:18:00.000 [notice] Parsing GEOIP IPv4 file /opt/homebrew/Cellar/tor/0.4.7.10/share/tor/geoip.
Nov 05 15:18:00.000 [notice] Parsing GEOIP IPv6 file /opt/homebrew/Cellar/tor/0.4.7.10/share/tor/geoip6.
Nov 05 15:18:00.000 [notice] Bootstrapped 0% (starting): Starting
Nov 05 15:18:00.000 [notice] Starting with guard context "default"
Nov 05 15:18:01.000 [notice] Bootstrapped 5% (conn): Connecting to a relay
Nov 05 15:18:01.000 [notice] Bootstrapped 10% (conn_done): Connected to a relay
Nov 05 15:18:01.000 [notice] Bootstrapped 14% (handshake): Handshaking with a relay
Nov 05 15:18:02.000 [notice] Bootstrapped 15% (handshake_done): Handshake with a relay done
Nov 05 15:18:02.000 [notice] Bootstrapped 20% (onehop_create): Establishing an encrypted directory connection
Nov 05 15:18:02.000 [notice] Bootstrapped 25% (requesting_status): Asking for networkstatus consensus
Nov 05 15:18:02.000 [notice] Bootstrapped 30% (loading_status): Loading networkstatus consensus
Nov 05 15:18:02.000 [notice] Bootstrapped 45% (requesting_descriptors): Asking for relay descriptors
Nov 05 15:18:02.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 3040/6049, and can only build 10% of likely paths. (We have 53% of guards bw, 49% of midpoint bw, and 39% of exit bw = 10% of path bw.)
Nov 05 15:18:02.000 [notice] I learned some more directory information, but not enough to build a circuit: We need more microdescriptors: we have 3040/6049, and can only build 10% of likely paths. (We have 53% of guards bw, 49% of midpoint bw, and 39% of exit bw = 10% of path bw.)
Nov 05 15:18:02.000 [notice] Bootstrapped 54% (loading_descriptors): Loading relay descriptors
Nov 05 15:18:03.000 [notice] Bootstrapped 61% (loading_descriptors): Loading relay descriptors
Nov 05 15:18:03.000 [notice] Bootstrapped 66% (loading_descriptors): Loading relay descriptors
Nov 05 15:18:03.000 [notice] Bootstrapped 73% (loading_descriptors): Loading relay descriptors
Nov 05 15:18:04.000 [notice] Bootstrapped 75% (enough_dirinfo): Loaded enough directory info to build circuits
Nov 05 15:18:04.000 [notice] Bootstrapped 90% (ap_handshake_done): Handshake finished with a relay to build circuits
Nov 05 15:18:04.000 [notice] Bootstrapped 95% (circuit_create): Establishing a Tor circuit
Nov 05 15:18:04.000 [notice] Bootstrapped 100% (done): Done
MAIN : 2022/10/31 15:18:05 main.go:147: INFO hola-proxy client version v1.5.0 is starting...
MAIN : 2022/10/31 15:18:05 main.go:148: INFO Constructing fallback DNS upstream...
MAIN : 2022/10/31 15:18:05 main.go:155: INFO Initializing configuration provider...
MAIN : 2022/10/31 15:18:06 main.go:167: INFO Endpoint: https://zagent1612.hola.org:22225
MAIN : 2022/10/31 15:18:06 main.go:168: INFO Starting proxy server...
MAIN : 2022/10/31 15:18:06 main.go:170: INFO Init complete.