Tutorial: Installing Tor With Privoxy

When it comes to keeping your activities out of the prying eyes of Evil-Alphabet-Agency’s, one must not slack on beefing up security on both their computer’s and networks. The consequences for those who are involved are just too dangerous to take lightly.

If you are accessing the Dark Net at home at all, there are a few simple steps you can take to ensure you’re anonymity stays a secret. In this tutorial, I am going to go over installing and configuring tor, privoxy, and a free VPN.

First of all, do not use Windows thinking it’s safe. Use Windows at your own risk; I am not going to take the chance. Mainly when it is publicly known that since the release of Windows Seven Microsoft has been working the NSA, installing secret back doors to pretty much whatever they could scare people into doing.

The NSA can access everything that is accessible on the windows partition of your machine if it is not encrypted (Yes, you can remove the back doors within Windows.

But that is to say, you can remove the ones that we KNOW about, and I would not put it past the NSA to have a few tricks up their sleeves) I prefer using Linux anyway, I understand that some have difficulties making the transition from Windows to Linux, but that’s why they created man pages, my friend.

If you don’t know what a command does, just type man <COMMAND> in a terminal, read the manual page, and you’re good to go.

Honestly, once you use any flavor of Linux for a while, the scripting will come naturally, and Windows will become obsolete – well aside from a small, encrypted partition for whatever Windows applications you can not live without – but please do make sure you encrypt you hard-drives and make sure you disable WPS on your modems and routers.

It is a lot easier to crack a WPS key than to sniff out a handshake sequence, then bang that against a .pcap sniffing file.

In windows, use Veracrypt, and while installing Linux, wipe the disk completely and encrypt it all with VSLM. Of course, backups should be made first, but an encrypted hard-drive gives me peace of mind.

I do not do anything illegal even I just get sick when I think about Government Agents who are supposed to protect us, pilfering through my computers, and precipitating the demise of American’s Right to Privacy.

Since 9/11, they have primarily made The Right To Privacy a joke, and it was done in the name of Patriotism. My retort to their Ranging Rover Taps and Legalized Racism.

Anyway, so now to the technical stuff (Sorry if it is annoying, but our Right To Privacy as a Nation is at stake, not to mention our freedoms (which is an excellent reason to put up with the boring). If we don’t take a stand and take hold of this situation now, privacy as we know it will become another yet another causality of war.

I am defiantly not here to tell you what you should do, mind you, just here to urge you to do something. As for which flavor of Linux you should (if you’re not already using one), I would recommend Kali-Linux.

It is Debian-based (which even if you don’t know already, it’s still way worth it to get used to Debian-based distributions and Kali is a security-auditing distribution of Linux, meaning it can easily achieve the things we need it for.

You can install the same things on any distribution of Linux; it just may require a little more reading (but if you use Kali you can just follow these steps and then you’re good to go.

Now you should download whatever Kali*.iso is compatible with your machine (32 or 64 bit, AMD or Intel, etc.) from Offense Security, install it and I recommend entirely wiping your system (unless it is good already) and encrypting the entire hard-drive with VSLM.

It is an option when installing, do it, just remember the key you use because if you forget it will be a hassle. 

After the install, go to this website and follow these instructions (things like installing the proper audio-drivers, which is a trademark problem of Debian-based flavors, but the pros defiantly outweigh the cons here, defiantly.

This is the URL you need. After those things are done, we need to install Vidalia (the GUI-front-end-to-Tor), tor itself, privoxy, proxy-chains, and open DNS (to prevent people from being able to see the DNS address of the ISP you use).

Also when making PGP keys please don’t put your regular email address, I recommend trying to figure out how i2p email or FreeNet mail works (kind of easier said than done, but the reward will be piece of mind and a clean, anonymous email address, because they are more secure than using a Gmail account, for example.

Also, if you use your computer at home for accessing the DarkWeb, I highly recommend the use a VPN with these measures, then I would consider it pretty safe, or at least, way too much of a hassle for people to go through.

In prompt, type $’sudo -s’ for a root shell, enter your password, then enter these commands as Root:

#apt-get install network-manager-openvpn-gnome
#apt-get install network-manager-pptp
#apt-get install network-manager-pptp-gnome
#apt-get install network-manager-strongswan
#apt-get install network-manager-vpnc
#apt-get install network-manager-vpnc-gnome/etc/init.d/network-manager restart
#apt-get install network-manager-openvpn-gnome
#apt-get install network-manager-pptp
#apt-get install network-manager-pptp-gnome
#apt-get install network-manager-strongswan
#apt-get install network-manager-vpnc
#apt-get install network-manager-vpnc-gnome/etc/init.d/network-manager restart

The after that, use this server (for the US, for other country’s just Google it.)

Server: us.justfreevpn.com<br /><br />

PPTP Username: justfreevpn<br /><br />

PPTP Password: USA Free VPN Account

Server: us.justfreevpn.com
PPTP Username: justfreevpn
PPTP Password: USA Free VPN Account

That will configure your VPN properly, now to install tor and the other tools (and to make sure they are working properly).

#apt-get install tor
#apt-get update
#apt-get install privoxy
#apt-get update
#apt-get install vidalia
#apt-get update
#apt-get install tor
#apt-get update
#apt-get install privoxy
#apt-get update
#apt-get install vidalia
#apt-get update

Now, we have to edit a configuration file, simply type:

#leafpad /etc/privoxy/config

Now, we have to edit the configuration file, simply type:

 

#leafpad /etc/privoxy/config

 

And go down to line (it was 699 on my config file).

697 # Default Value:</p><br /> <p>698 #</p><br /> <p>699 # 127.0.0.1:8118</p><br /> <p>700 #

697 # Default Value:
 
698 #
 
699 # 127.0.0.1:8118
 
700 #

Now, take the # sign out of line 699 and make it read:

699: listen-address 127.0.0.1:8118

And then go to the very bottom of the file, and add these lines:

forward-socks4
127.0.0.1:9050
forwardsocks4a
127.0.0.1:9050

Make sure you put a period at the end of the address:port combination (Copying and pasting would probably be how I would do it). I forgot that once and it took a while to realize what I had done wrong. We are almost finished!

Now Type:

#leafpad /etc/tor/torrc
#service privoxy stop && service tor stop
#service privoxy start && service tor start-tor

Now, you need to set your browser to use the proxy (or just download the add-on FoxyProxyStandart and once installed Go > File > Tor Wizard, and just choose the options that come (all you have to is hit enter, then chose that proxy configuration you just made, and go to Google and search am I using Tor. Assuming you were successful, there is only one last step.

#leafpad /etc/tor/torric

Put this line at the end of the file: “DNSPort 53.”

Then, you save it, and #leafpad /etc/resolv.conf, delete everything in the file (it’s about three to five lines in length), and replace it “nameserver 127.0.0.1”, then save it.

If it were me I would just restart the computer (to see if Tor and Privoxy are both installed and starting during the other init.d daemons.) but you could just reset the services, but you’re through the process now.

To make sure you are safe, check out “http://www.ipchicken.com” or “https://www.whatismyip.com” and make sure both your current IP Address is masked as well as you’re ISP’s DNS is hidden as well. This is an example of a properly configured box:

All done.