-
-
Notifications
You must be signed in to change notification settings - Fork 423
Tor based Proxying Guide
Likhith Chitneni edited this page Nov 15, 2017
·
5 revisions
Instead of abusing Tor, here are some alternatives:
- The Invisible Internet Project (I2P), yet another
open-source anonymity network with similar advantages as Tor (e.g.,
cross-platform, active development, ongoing research) without the burdensome cultural
baggage and anti-P2P rhetoric. While detailed instructions for doing so exceed
the mandates of this guide, it may be pertinent to note that:
- I2P encourages torrent traffic to be routed through the I2P network.
- I2P comes bundled with a torrent-specific web client for doing so: I2PSnark.
- A variety of I2P eepsites (i.e., the I2P equivalent of Tor Hidden Services) provide PirateBay-like centralized repositories for hosting I2P-only public torrents. Common examples include:
- Vuze, the proprietary torrent client formerly known as Azureus and now functionally indistinguishable from malware-like adware, provides the I2P Helper plugin. This plugin is perhaps the only remaining reason to install Vuze. It bridges clearnet- and I2P-hosted torrents, permitting unanonymous clearnet-hosted torrents to be anonymized over I2P and anonymous I2P-hosted torrents to be deanonymized over the clearnet. No, we have no idea why anyone would want to deanonymize themselves either. Nonetheless, the former feature is awesome incarnate.
- Subscribing to a non-free anonymization service supporting both HTTP and UDP
proxying. Common examples include:
- Virtual private network (VPN) providers.
- Seedbox providers.