How to Anonymous Browsing with Tor, Firefox Plugin and Privoxy

# Privoxy listens on TCP port 8118 bound only to localhost.
# Tor SOCKS proxy listens on TCP port 9050 (directory) bound only to localhost. This proxy anonymizes connections to servers in Internet by routing them over a randomized route trough to Tor network.
Debian packages have been uploaded to the set of official unstable (sid) and testing (etch) Debian packages.
If you are running Debian stable (sarge) or oldstable (woody), you must first add some lines to your /etc/apt/sources.list file.

If you run etch (testing) you may want to add a sources.list entry too. That way you always get the latest version of Tor, even when it has not propagated to testing yet.
Do not use the packages in ubuntu’s universe.
They are not maintained and most likely old and therefore miss out on stability and possibly security fixes.
For tor’s stable version (for amd64,i386 and sparc):

deb http://mirror.noreply.org/pub/tor main
deb-src http://mirror.noreply.org/pub/tor main

where should be replaced with either woody, sarge, etch, or sid, or – if you are using ubuntu – hoary, breezy, or dapper.

For instance if you are running etch you would add:
deb http://mirror.noreply.org/pub/tor etch main
deb-src http://mirror.noreply.org/pub/tor etch main

To install the packages, issue the following commands:
$ su
password
$ apt-get update
$ apt-get install tor

Verifying signatures with apt 0.6.x
If you are using apt version 0.6 or later you may want to add weasel’s key to your apt-keyring, so it can verify the sources:
$ gpg --keyserver subkeys.pgp.net --recv 94C09C7F
$ gpg --fingerprint 94C09C7F

should show you:
pub 1024D/94C09C7F 1999-11-10
Key fingerprint = 5B00 C96D 5D54 AEE1 206B AF84 DE7A AF6E 94C0 9C7F
uid [ultimate] Peter Palfrader
[...]

Then issue
$ gpg --export 94C09C7F | sudo apt-key add -
to add the key to apt’s keyring.
Now let’s get Privoxy
$ su
password
$ apt-get update
$ apt-get install privoxy

Once you’ve installed Privoxy (either from package or from source), you will need to configure Privoxy to use Tor. Open Privoxy’s “config” file (look in /etc/privoxy/ or /usr/local/etc/) and add the line
forward-socks4a / localhost:9050 .
to the top of the config file. Don’t forget to add the dot at the end.
Privoxy keeps a log file of everything passed through it. In order to stop this you will need to comment out three lines by inserting a # before the line. The three lines are:

logfile logfile
and the line
jarfile jarfile

and (on some systems) the line
debug 1 # show each GET/POST/CONNECT request
You’ll need to restart Privoxy for the changes to take effect. Firefox
For Firefox (recommended), simply install the Torbutton plugin, restart your Firefox, and you’re all set:

One thought on “How to Anonymous Browsing with Tor, Firefox Plugin and Privoxy

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s