this post was submitted on 05 Dec 2023
8 points (90.0% liked)

Privacy

31871 readers
248 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

I am looking for a solution. I'm thinking of a locally hosted socks5 proxy like TOR has, but instead of TOR, this self hosted proxy can be configured to rotate through other remote proxies that I have access to

is there anything like this?

top 4 comments
sorted by: hot top controversial new old
[–] [email protected] 3 points 11 months ago (1 children)

Obligatory disclaimer here; I strongly recommend you do not do what you are planning to do with only rotating proxies. Tor is much safer and more private about this sort of thing; you will be de-anonymized easily if you do not use Tor.

Now that the obligatory "privacy community" disclaimers are out of the way; I can say that I do understand what you're trying to do. Frequently many websites ban the ever loving crap out of Tor Exit nodes and simply will refuse you any service if they even sniff a hint of The Onion Router on your packets. This is, unfortunately, an intentional design decision of Tor Project. You see; they understand the massive potential for abuse of Tor.

Unfortunately...this probably leaves you, the reader, in a situation. You end up being required to choose to either trust or do without. In today's world; that's just absolutely freaking impractical even in the best of cases.

Unfortunately the same websites who block Tor are also the same kind of websites with the kind of kinks in their panties that also motivate them to block Proxies as well! Seriously; if your packets come in smelling like they came fresh off a SOCKS5 tunnel; the remote website can often tell. Sometimes the website will be nice and wave this on through; but only if you include headers like X-Forwarded-For: in your request...which defeats the entire purpose of the damn proxy; as that header is for putting your original IP address in.

So in the end your traffic will still 'stink'; either of Onions or of SOCKS. Sure, you could buy a VPN; but now you're coming from an obvious VPN proxy and websites that already hate Onions or Socks also hate VPNs; because they can't see who might be abusing their service.

Now you can try all three ideas and see which one the site will accept. Your mileage may vary and some websites indeed will block all three; Cloudflare, which is a CDN that also services many other websites and protects their edges from DDoS attacks is notorious for doing this.

Best of luck. All I can recommend is a paid VPN plan, pay more than $0 and ideally less than you would spend on a week of coffee; and make sure that the provider not only does not log; but make sure that the provider also is verified by third parties who aren't shady...to actually be a no-log VPN service. This will take lots of research but it's worth knowing who in the VPN space are shysters and who arent.

No, I won't recommend a particular service; I'd rather you did your own homework and risk analysis anyways

If a Paid VPN is out of the question; using Tor may be your only option. If you have multiple proxies you're probably paying for them anyways and could afford a VPN.

[–] [email protected] 2 points 11 months ago (1 children)

useless info for me and my aims sorry

[–] [email protected] 1 points 11 months ago

Yeah; without more information about your threat landscape, aims and needs; you probably won't get more specific information.

[–] [email protected] 1 points 11 months ago

I think glider can do this, with -strategy rr (Round Robin mode). I have not used it in this way myself, so you might need to experiment a little. Proxychains can also do this, but it doesn't present a socks5 interface itself (it uses LD_PRELOAD, so it won't work everywhere).