OP 30 July, 2022 - 08:38 PM
This post is by a banned member (D_M_T) - Unhide
30 July, 2022 - 08:43 PM
For complete anonymity, you would want to route your traffic through tor. So run torchains on a linux distribution. So your connection should look something like:
Host OS (Linux) --> Tor --> RDP/VM with a proxy
This post is by a banned member (Creaccyou) - Unhide
30 July, 2022 - 08:45 PM
My suggestion would be:
VPN1 on encrypted MainSystem (VeraCrypt) -> Virtual Machine with VPN2 -> VPS with Sock5|Whatever you need As for VPN suggestions I would go with PerfectPrivacy and MullVlad VPN but ofcourse that is up to you. Just inform you about the VPNs you want to use (have they own or rented server? Are they using HDD or RAM Server (dont know how that is called exactly in english)? Where are they located? Also if you dont mind about connection speed you could use Whonix as VM and or implement TOR.
This post is by a banned member (Hydra32) - Unhide
OP 30 July, 2022 - 08:57 PM
(30 July, 2022 - 08:43 PM)yossarian1 Wrote: Show More Thank you that helps me! +rep for you
This post is by a banned member (D_M_T) - Unhide
30 July, 2022 - 09:03 PM
(30 July, 2022 - 08:57 PM)Hydra32 Wrote: Show More Np, here's a full guide on setting it up.
This post is by a banned member (Creaccyou) - Unhide
30 July, 2022 - 09:08 PM
(30 July, 2022 - 08:57 PM)Hydra32 Wrote: Show More ofc this is up to discussion, but I would not simply rely on TOR: "Several court cases have shown that illegal activities on the dark web can sometimes be traced back to specific individuals using Tor browser. Hence, it seems possible to discover and collect a user’s data — including their IP address — even when they are being protected by Tor. In the past, Tor users have been found out because the National Security Agency (NSA) in the U.S. owned a huge part of the Tor nodes. The NSA could clearly see who used those nodes. This was problematic for users who concern themselves with illegal practices. The moment those users are identifiable, the police can track them down and arrest them. Tor is no longer as safe as it once was. Hackers constantly attempt to breach Tor’s security. Many groups, organizations, and individuals want access to the information Tor browser is hiding and try to get that time and again. In 2014, one group of researchers succeeded. Financed by the government, they took a closer look at Tor browser and were able to collect information from the browser for months on end. Weaknesses in the Tor software can surface in less compromising ways, as well: in 2017, users found a leak that could easily make IP addresses of Linux and macOS users visible. Of course, Tor didn’t sit around to watch all this happen: whenever a possible leak in the system was discovered, those leaks were patched as soon as possible. However, in February 2021, researchers reported that about 27% of Tor’s exit nodes (shown in the infographic above) were controlled by a malicious actor tracking users’ dark web activity. So it’s important to note that Tor is not completely safe and anonymous, and does have some inherent risks." Complete article: https://vpnoverview.com/privacy/anonymou...-tor-safe/
This post is by a banned member (Hydra32) - Unhide
OP 30 July, 2022 - 09:18 PM
(30 July, 2022 - 08:43 PM)yossarian1 Wrote: Show More Will it also make the entire Linux system anonymous via Tor, i.e. also connect to an RDP?
This post is by a banned member (D_M_T) - Unhide
30 July, 2022 - 09:41 PM
(30 July, 2022 - 09:18 PM)Hydra32 Wrote: Show More No it wont make the entire system go through tor, only the app you launch with proxychains through terminal, like you have to type "proxychains remmina" to run the RDP client via tor, likewise "proxychains firefox" if u want to run firefox through tor etc |
Create an account or sign in to comment | ||
You need to be a member in order to leave a comment | ||
Create an account
Sign up for a new account in our community. It's easy!
|
or |
Sign in
Already have an account? Sign in here.
|
Users browsing this thread: 1 Guest(s)