Skip to content

Tor based Proxying Guide

Likhith Chitneni edited this page Nov 15, 2017 · 5 revisions

Instead of abusing Tor, here are some alternatives:

  • The Invisible Internet Project (I2P), yet another open-source anonymity network with similar advantages as Tor (e.g., cross-platform, active development, ongoing research) without the burdensome cultural baggage and anti-P2P rhetoric. While detailed instructions for doing so exceed the mandates of this guide, it may be pertinent to note that:
    • I2P encourages torrent traffic to be routed through the I2P network.
    • I2P comes bundled with a torrent-specific web client for doing so: I2PSnark.
    • A variety of I2P eepsites (i.e., the I2P equivalent of Tor Hidden Services) provide PirateBay-like centralized repositories for hosting I2P-only public torrents. Common examples include:
    • Vuze, the proprietary torrent client formerly known as Azureus and now functionally indistinguishable from malware-like adware, provides the I2P Helper plugin. This plugin is perhaps the only remaining reason to install Vuze. It bridges clearnet- and I2P-hosted torrents, permitting unanonymous clearnet-hosted torrents to be anonymized over I2P and anonymous I2P-hosted torrents to be deanonymized over the clearnet. No, we have no idea why anyone would want to deanonymize themselves either. Nonetheless, the former feature is awesome incarnate.
  • Subscribing to a non-free anonymization service supporting both HTTP and UDP proxying. Common examples include:
Clone this wiki locally