How to set up a TOR proxy?
There are several ways to connect to the TOR network to surf the darkweb. The quickest and simplest thing I’ve ever told you about is installing Tor Browser.
It’s done in seconds, and it works direct.
But there is another possibility, which is that of setting up a bridge, or rather a proxy via which you can pass all the network traffic of your devices, on Tor.
It’s handy not to forget to activate Tor and be sure that our surf is anonymized. I voluntarily omit desanonymization techniques, because this is not the subject of this article.
So what do you need to mount this Tor proxy ?
And a machine, type Raspberry Pi that you leave at home or elsewhere or a server that you take from a host of your choice and a Linux distrib on it.
Now I suggest the method to put this in place. Remember to put “sudo” in front of the controls if necessary.
First think of updating your Linux well. As I am on Ubuntu so I use:
To do this, enter the following command:
apt install tor
Then check that Tor is functional with this command:
systemctl status firstname.lastname@example.org
You should then see that the connection is correctly 100% “botstrapped”. Well done, Tor is functional on your server.
To configure Tor to behave like a proxy server and be able to connect your computers, tablets and smartphone to it, there are a few changes to be made to Tor’s config file.
To edit this file, do:
nano / etc / tor / torrc
Decomment the SocksPort parameter and configure it like this:
SocksPort ADDRESSE_IP_DU_SERVEUR: 9050
With me, it gives that:
You can then play with the SocksPolicy parameter to accept or reject certain IPs or ranges of IPs. For my part, I left this commented parameter, because I do not use it.
Then decompose the RunAsDaemon parameter so that the process turns into a background.
Then remember to activate the DataDirectory parameter if you want the Tor config (the encryption keys…etc) to be stored elsewhere than in your / home / .tor
Then, you have to restart the Tor service with the command:
systemctl restart email@example.com
There you go, you’re done with the Tor server.
Configure the proxy under macOS
Now we’re going to go to the client. If you are on macOS, go to the network, connection, “Advanced” parameters …
Then go to the “Proxy” tab and configure the proxy Socks like this:
And that’s it for macOS .
MacOS and Windows browsers use this default setting … except Firefox. So for Firefox, see the method a little lower.
Configure a proxy under Windows 10
For Windows 10, you have to go to the proxy settings. To do this, type “proxy” in the search menu.
Then activate the “Manual configuration of the proxy” and specify the IP address of your Tor machine as well as the port (default 9050).
It may happen that it does not work directly because the Windows proxy is in default https. To force it into socks, just enter the “Address” field, your proxy Tor IP prefixed with “socks =” :
socks = YOUR_IP
Configure the proxy under Firefox
Under Firefox, you can configure it by going into the options (about: preferences), then by clicking on “Parameters” in the “Network parameter” section.
Select “Use system proxy settings” and ESPECIALLY check the “Use remote DNS when Socks v5 is active” box . This last parameter will allow you to solve the domains in .onion.
Configure the proxy under Chrome and Edge
There, it’s simple, there is nothing to do, because these browsers take the system setting. So refer to the “Configure a proxy under Windows 10” section of this article.
How to test your Tor connection ?
First, just see what new IP is assigned to you and which part of the world you come out in when you get here.
And for the onions, it’s a bit difficult to find, but to test, I invite you to go to that of DuckDuckGo:
There you go, it’s over for the tuto. I hope you liked it and see you next time !