VPN + Tor technology. Self-tuning and use.

25.04.18 в 15:26 Interesting 24718

VPN - Virtual Private Network

At a high level of implementation and compliance with all the intricacies of configuration, VPN technologies give full anonymity to the network. Special software guarantees confidentiality of transmitted data.

Usually VPN is applied no higher than network layers, the encryption of which allows you to use unmodified protocols (for example - TCP, UDP).
The VPN consists of two parts: an "internal" (controlled) network and an "external" network through which the connection is made (using the Internet).

VNP is classified by several parameters:

  • Degree of environmental protection. Protected (IPSec, OpenVPN and PPTP) and trusted (MPLS and L2TP, these protocols shift the security task to others, for example L2TP)
  • Method of implementation. Software solution, integrated solution, software and hardware.
  • Appointment. Client / Server VPN, Intranet VPN, Extranet VPN, Remote Access VPN.
  • Type of protocol. Realization of virtual private networks under the protocols TCP / IP, IPX and AppleTalk.
  • Network protocol layer. Mappings with the levels of the network model ISO / OSI.


Tor - The Onion Router

The Tor browser is used to protect and access information blocked by Internet censorship. On the device, a proxy server is started, which connects to Tor servers, and uses complex encryption. Each data packet passes through three different nodes, selected randomly. Before sending, the data is coded with three keys - for the third node, the second node, and the first one. When the packet arrives at the first node, the data of the second, then the third, is deciphered. Gradually, the layers of encryption are removed.


At the same time, the node software provides a SOCKS interface. Programs running on the SOCKS interface can be configured to work through the Tor browser, which routes traffic through a virtual chain, thereby providing anonymous web surfing on the network. Inside the Tor network, traffic is routed from one router to another and finally reaches the exit point from which a clean (unencrypted) data packet is already reaching the original address of the recipient (server). Traffic from the receiver is sent back to the Tor network outlet point.

Comparative data

And Tor and VPN have their pros and cons.

A plus of the Torah can be considered the complete hiding of the IP address and the distribution of the network (it is difficult to prohibit it in any state). At the same time, the connection speed on the Internet is very low, due to the redirection of data through a large number of nodes. It is very difficult to view video content. Another nuance - many Internet providers block Tor, thereby complicating the connection.

VPN connection is distinguished by high speed, because there is only one server between the device and the required site. VPN can provide more solid security and privacy than Tor. Many services include anti-virus software.

If the goal is anonymity, then just install the Tor browser. But high speed, protection from malicious virus programs, prevention of data leakage, complete security from the human factor can only provide a VPN service. Or a bunch of VPN + Tor.

Sharing Tor and VPN

Maximally secure access to the Internet and remain unnoticed in the network can be using a bunch - a VPN connection with a subsequent output via Tor.

This can be done in several ways:

  • Configure the VPN, install Tor and go online through a browser.
  • Use the OS with the built-in Tor, and run the VPN in parallel.
  • Use Tor without installing the browser. To do this, you need to connect to an adapted VPN or install a suitable application. A very convenient method, because it allows you to use the usual browsers with all the installed functions, while maintaining network anonymity.

It works like this: network traffic is encrypted on the output from the computer on the way to the VPN server and arrives at the Tor nodes. In this case, Tor does not see the real IP, but only the provider's address. Every ten minutes IP changes automatically. The VPN server of the provider verifies that the Thor nodes are working and only connects to the work points. This ensures an uninterrupted connection.

Self-connection

The vpn + tor chain provides increased anonymity in the network. You can independently create a connection using a proven "recipe"

It will take:

  • A computer or laptop with Windows installed,
  • VirtualBox,
  • Image of a whonix-gateway,
  • Windows image, preferably in English
  • VPN service, preferably paid.

Installation procedure:

  1. Download and install Virtual Box
  2. The Whonix image is downloaded. Typically, Whonix consists of 2 virtual machines: Gateway - "tosify" the network, and Workstation - connects to this network and works exclusively through Tor.
  3. Whonix Gateway is installed in the virtual box.
  4. Image win7 download, create a new machine in VirtualBox and install Windows. This will be the working OS. When both machines are installed, you can proceed with the configuration:
  5. After the Whonix-gateway is fully loaded in the console, enter: sudo apt-get update && sudo apt-get dist-upgrade. You will need a password. (The default is changeme) The system downloads updates and installs them.
  6. Virtual Windows starts, additions to the guest OS are installed. Then proceed according to the scheme - the control panel> Network and sharing center> Properties> the TCP / IPv4> Properties line. To be completed as follows: IP address 10.152.152.50; Subnet netmask 255.255.192.0; Default gateway 10.152.152.10; Preferred DNS server 10.152.152.10Visit the virtual machine, find it in VirtualBox and click "configure". Under "Network" uncheck "Adapter 1", put on "Adapter 2" Connection type: Internal network, select Whonix from the menu.
  7. Now the virtual version catches the network with Whonix Gateway, that is, the traffic of all programs is already going through Tor.

Install on the main OS (not on the virtual) VPN client. Enable VPN on the host. Run the Whonix Gateway, wait for the download and roll to the tray. Running Win virtual, including the second VPN on it. The VPN TOR VPN chain is ready.

Purchase

Good VPN services cost about $ 200 per year. This is a bit, given the time savings and good Internet speed. As noted above, there are also free services. But the quality of services is much lower, a lot of advertising, speed leaves much to be desired.

Security is a very important part of connecting to the network. Therefore, it is better to choose a paid version. This will ensure a high connection speed, no logging and stable operation with VPN + Tor, OpenVPN, PPTP, HTTP Proxy, IPsec protocols.

Russian services, recently, are on the rise and constitute worthy competition to foreign ones. For example, rsocks.net offers its VPN service, with attractive terms and at quite affordable prices.

评论

登录来发表评论
热门

伴随着会联网的广泛使用,随之带来一系列的危险。首先涉及到匿名和安全性。如果信息不设防范手段,您的数据很可能被入侵 — 这里举个例子,关于在公用网络中的私人的信件。

Do you need to use a proxy server to increase your anonymity on the Internet? Not sure how to set up a proxy properly before you start? In this article, we will try to answer all the questions that arise when you first try to connect to the network through a single proxy server on Windows 10.

最初的互联网预想让空间没有国界化,无论在在那里都可以绝对匿名地获取任何信息。现在很多国家都出现了禁止访问某些资源的情况 。

25日
12月 2017

当今世界保证私人和企业的秘密数据变得越来越困难,所以信息安全的问题变得的越演越烈。每个人都拥有生存、自由和人身安全的权力。保护自己的数据免受入侵,和第三方的调查是没有任何原因的。如果您想在网络上安全地保存自己的信息,就不得不去遵守那些规则。本文就来介绍下基本的方法、手段和常用的程序,当然最主要的是互联网的安全使用。

In the recent past by the standards of the development of information technologies, in 2015 Google created artificial intelligence based on neural networks, which was able to analyze the condition around itself and draw conclusions about its further education. The name of the new offspring from Google was given in abbreviated from the term "deep Q-network" - DQN. The DQN started training in common arcade games (Pakman, Tennis, Space Invaiders, Boksing and other classics).

最新

Receiving big volumes of data from websites for its following analysis plays a key role for plenty of projects. Target resource structure analysis and scraping of the relevant information are often connected to blocks or access restriction issues from website administration.

If you’re looking for a package of residential or mobile proxies with the ability to work with a particular country or ISP, the best option is definitely Exclusive Mix. With it you will be able to download the list which consists of proxies from preliminarily chosen countries and carriers, flexibly filtering it for your needs.

9日
7月 2021

How to web scrape with python? It's a question that many beginners have. At the entry level, the process is quite simple, and anyone can quickly get their project off the ground. However, to successfully work on such a task, you should not forget about many aspects, which are not easy to understand at once.

大家知道吗?大部分电子商务和网络营销的专家使用专业浏览器。该浏览器提高匿名率所以很流行。

Proxy server: what is it? Main advantages of working via a virtual “mediator” – anonymity on the web, avoiding all bans, protection against attacks, intellectual property protection

有问题吗?

在这儿点击,我们就回答

Trustpilot 4.5