<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>How To Survive The Claire Perry Internet &#187; sky broadband shield</title>
	<atom:link href="/tag/sky-broadband-shield/feed/" rel="self" type="application/rss+xml" />
	<link>https://survivetheclaireperryinter.net</link>
	<description></description>
	<lastBuildDate>Fri, 16 Oct 2015 09:30:30 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.8</generator>
	<item>
		<title>Using Anonymous Visa Cards to Create Untraceable Surveillance / Censorship Avoidance Proxies or Webhosts</title>
		<link>https://survivetheclaireperryinter.net/2014/04/11/using-anonymous-visa-cards-to-create-untraceable-surveillance-censorship-avoidance-proxies-or-webhosts/</link>
		<comments>https://survivetheclaireperryinter.net/2014/04/11/using-anonymous-visa-cards-to-create-untraceable-surveillance-censorship-avoidance-proxies-or-webhosts/#comments</comments>
		<pubDate>Fri, 11 Apr 2014 21:44:25 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter bypass]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Surveillance Avoidance]]></category>
		<category><![CDATA[anonymity]]></category>
		<category><![CDATA[anonymous]]></category>
		<category><![CDATA[bypass bt filter]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[financial]]></category>
		<category><![CDATA[Mastercard]]></category>
		<category><![CDATA[money laundering]]></category>
		<category><![CDATA[Proxy]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[sky broadband shield]]></category>
		<category><![CDATA[talktalk dns server]]></category>
		<category><![CDATA[talktalk homesafe]]></category>
		<category><![CDATA[VISA]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=231</guid>
		<description><![CDATA[It is still possible to anonymously purchase on-line resources which will be useful for those wishing to frustrate Internet surveillance, evade Internet censorship or blow the whistle on something without risking the exposure of their identity. Finding a pre-paid card that can be purchased in cash with no questions asked is trivially easy, any card<br /><a class="moretag" href="/2014/04/11/using-anonymous-visa-cards-to-create-untraceable-surveillance-censorship-avoidance-proxies-or-webhosts/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<p>It is still possible to anonymously purchase on-line resources which will be useful for those wishing to frustrate Internet surveillance, evade Internet censorship or blow the whistle on something without risking the exposure of their identity.</p>
<p>Finding a pre-paid card that can be purchased in cash with no questions asked is trivially easy, any card or gift shop is likely to have them interspersed with Starbucks gift cards etc.<br />
<a class="lightbox" href="/wp-content/uploads/2014/05/prepaid.jpg"><img class="aligncenter size-medium wp-image-249" alt="Prepaid Visa and Mastercards" src="/wp-content/uploads/2014/05/prepaid-300x225.jpg" width="300" height="225" /></a></p>
<p>For this example we&#8217;ll choose a £50 VISA card which once you get to the till will actually cost £53.95. Hand over your cash and walk out of the door.</p>
<p>As you leave swing by a Three, EE, O2 or Vodafone store and buy a pre-pay data SIM. Three have a 1Gb SIM for £7.50, buy it with cash and walk out of the store.</p>
<p>By now the VISA card will have activated and should be good to go.</p>
<p>For extra anonymity you may wish to visit a local pawn broker like Cash Converters or CEX and acquire a phone, tablet or laptop so that the IMEI you use with the newly purchased SIM is not one that has previously been tied to your identity.</p>
<p>Open up your VISA card and you&#8217;ll notice it has an expiry date, the CVV code on the signature strip and the usual 16 digit credit card number.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/04/card.jpg"><img class="aligncenter size-medium wp-image-264" alt="card" src="/wp-content/uploads/2014/04/card-300x225.jpg" width="300" height="225" /></a></p>
<p>Setup your 3G connection, optionally <a href="https://www.torproject.org/">install TOR</a> to bypass any ISP restrictions that may be present then navigate to your VPS provider of choice. I&#8217;d suggest <a href="https://digitalocean.com/">DigitalOcean.com</a> but there are many others.</p>
<p>Signing up for an account is easy, put in an email address and a password <em>(the email address will have to be a real one as it needs to be verified and it&#8217;s where your root passwords are sent but try signing up to something like HushMail.com)</em>.<br />
<a class="lightbox" href="/wp-content/uploads/2014/01/signup.jpg"><img class="aligncenter size-medium wp-image-128" alt="signup" src="/wp-content/uploads/2014/01/signup-300x241.jpg" width="300" height="241" /></a></p>
<p>Once logged in you&#8217;ll be asked to verify your billing details;<br />
<a class="lightbox" href="/wp-content/uploads/2014/01/logged_in.png"><img class="aligncenter size-medium wp-image-129" alt="logged_in" src="/wp-content/uploads/2014/01/logged_in-300x166.png" width="300" height="166" /></a></p>
<p>Now it&#8217;s likely that your use of TOR and a prepaid VISA card will trigger anti-fraud protections; the account will be locked and a support ticket will be raised asking you to identify yourself<br />
<a class="lightbox" href="/wp-content/uploads/2014/05/verify.jpg"><img class="aligncenter size-medium wp-image-251" alt="verify" src="/wp-content/uploads/2014/05/verify-300x163.jpg" width="300" height="163" /></a></p>
<p>The people at DigitalOcean are very good and if you adequately explain your motivations <em>(be it running a website you&#8217;d rather not have your name attached too, as a proxy for privacy etc)</em> they are likely to accommodate you without requiring copies of ID or a credit card number tied to your identity. <strong>DO NOT ABUSE THEIR TRUST</strong>.</p>
<p>Within a few minutes the account will be unlocked and you can launch your virtual machine.</p>
<p>If you login to the VISA pre-pay system you&#8217;ll be able to see if the pre-authorisation passed and that you&#8217;ll be able to continue paying for your server resources.<br />
<a class="lightbox" href="/wp-content/uploads/2014/04/balance.jpg"><img class="aligncenter size-medium wp-image-267" alt="balance" src="/wp-content/uploads/2014/04/balance-300x121.jpg" width="300" height="121" /></a></p>
<p>You can now host your whistle-blowing blog, a critique of public policy or just <a href="/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/">use it as a proxy</a> safe in the knowledge that there is virtually no trace back to your true identity.</p>
<div class="alert bluth red"><button type="button" class="close" data-dismiss="alert">&times;</button>Do not abuse this ability to do hateful or illegal things, the VPS provider may not be able to identify you but they will shut you down and may even choose to shutdown all other accounts that appear to be of a similar profile to yours. Your actions could prevent someone who genuinely needs this anonymity.</div>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/04/11/using-anonymous-visa-cards-to-create-untraceable-surveillance-censorship-avoidance-proxies-or-webhosts/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Installing TOR on Windows Securely</title>
		<link>https://survivetheclaireperryinter.net/2014/03/11/installing-tor-on-windows-securely/</link>
		<comments>https://survivetheclaireperryinter.net/2014/03/11/installing-tor-on-windows-securely/#comments</comments>
		<pubDate>Tue, 11 Mar 2014 21:46:57 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter bypass]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Surveillance Avoidance]]></category>
		<category><![CDATA[Technical Implementation]]></category>
		<category><![CDATA[bypass bt filter]]></category>
		<category><![CDATA[Crypto]]></category>
		<category><![CDATA[GPG]]></category>
		<category><![CDATA[guarantee]]></category>
		<category><![CDATA[MD5]]></category>
		<category><![CDATA[PGP]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[sky broadband shield]]></category>
		<category><![CDATA[talktalk dns server]]></category>
		<category><![CDATA[talktalk homesafe]]></category>
		<category><![CDATA[TOR]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=235</guid>
		<description><![CDATA[As mentioned on our Top Ways to Avoid Filters page the Onion Router Project (better known as TOR) excels at bypassing censorship technologies such as the Sky Broadband Shield, the TalkTalk filters, BT Parental Controls and even the Great Firewall of Cameron China whilst at the same time offering almost perfect anonymity. TOR is an excellent choice<br /><a class="moretag" href="/2014/03/11/installing-tor-on-windows-securely/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<p>As mentioned on our <a href="/top-ways-to-evade-filters/">Top Ways to Avoid Filters</a> page the Onion Router Project <em>(better known as TOR) </em>excels at bypassing censorship technologies such as the Sky Broadband Shield, the TalkTalk filters, BT Parental Controls and even the Great Firewall of <del>Cameron</del> China whilst at the same time offering <em>almost</em> perfect anonymity.</p>
<p>TOR is an excellent choice for any would-be whistle blower, political journalist, privacy advocate, vulnerable adult or any other person who wants/needs unrestricted Internet access.</p>
<p>TOR is no more a tool for criminals than a kitchen knife or a car, much like encryption the more it is used by normal people for normal day-to-day tasks the better the protection for everyone by making it more expensive for nation states to perform blanket surveillance and Internet filtering.</p>
<p>This post will show you how to download and install the TOR client <em>(which is easy)</em> whilst also ensuring it&#8217;s the real deal and hasn&#8217;t been interfered with by your ISP or other malicious actors.</p>
<h2>Downloading</h2>
<p>The best place to download TOR is from the projects own website here: <a href="https://www.torproject.org/download/download-easy.html.en">https://www.torproject.org/download/download-easy.html.en</a> <em>(note the http<strong>s</strong>)</em>. You should also do whatever is necessary to acquire the signature file which can be found by following the link labelled <strong>sig</strong> <em>(underlined in red below) </em>on the download page.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/05/sig.jpg"><img class="aligncenter size-full wp-image-281" alt="sig" src="/wp-content/uploads/2014/05/sig.jpg" width="549" height="277" /></a></p>
<p>&nbsp;</p>
<p>The download is also available on this website by clicking <a href="/wp-content/uploads/torbrowser-install-3.6.1_en-US.exe">here</a> and the signature for this download is reproduced below.</p>
<pre>-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAABCAAGBQJTaXIZAAoJEEFvBhBj/uZZEJsIAKD2Ny/oXZheHd3xkgk9t906
a3Xayel0Mxp7Yj6dEvoDKTvvkyvmN1PC4K7oFjovaFP29SekDSRvMYnRlLnDaEHD
QZoPs7bFpf1qoRukZgMr9Q9B4rsy4Q9hr8iNcV1OeVawiGf8aQ/9XIp3TDErb80w
0tKnK4JI0a8FDKumc5GFTNQNZo9G2r46puSu4hLkckbz8zZa4FqVIjOpiyG65ri4
VdujXmpObLYEL/lAfg6xoCIF8VzM9eb1jBj+ISCxt0r2bpD8/iBizEvNRjzWIQUe
krqEuPpzYNiGLzXvczMTULs4lo7s6jGDR44ztijnwm87JdJCtFIrrh/+8QKe82Q=
=h2XC
-----END PGP SIGNATURE-----</pre>
<p>At this point you could just install TOR and trust that everything is OK but in this day and age you should really make sure.</p>
<h2>Verifying the Download</h2>
<p>At this point you should go off and read about GnuPG on <a href="https://en.wikipedia.org/wiki/GNU_Privacy_Guard">Wikipedia</a> and consider reading the <a href="https://www.gnupg.org/documentation/manuals/gnupg/">GnuPG manual</a> so you fully understand why we&#8217;re about to do what we are going to do.</p>
<p>As we&#8217;re on Windows <em>(you should consider trying Linux even if it&#8217;s only on a live boot CD/USB)</em> we need to install GPG4WIN which can be downloaded here: <a href="http://gpg4win.org/download.html">http://gpg4win.org/download.html</a>. Pay close attention to the SHA1 checksum you will need that shortly.</p>
<p>Secondarily download and install the Microsoft File Checksum Integrity Verifier from, here: <a href="https://www.microsoft.com/en-gb/download/details.aspx?id=11533">https://www.microsoft.com/en-gb/download/details.aspx?id=11533</a></p>
<p>Luckily the Microsoft download will be signed and certified by a certificate already embedded in the OS so go ahead and install it, you should see that the publisher is &#8220;Microsoft Corporation&#8221; and if you click the blue text you should see a confirmation that the Digital Signature is OK;</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/03/file_integrity_certificate.jpg"><img class="aligncenter size-medium wp-image-284" alt="file_integrity_certificate" src="/wp-content/uploads/2014/03/file_integrity_certificate-300x177.jpg" width="300" height="177" /></a></p>
<p>&nbsp;</p>
<p>Once extracted to a useful location <em>(preferably the same place you downloaded the GPG4WIN installer to)</em> execute the following command;</p>
<pre class="shell">fciv.exe -sha1 gpg4win-2.2.1.exe</pre>
<p>This will generate the SHA1 hash you noted earlier in a manner similar to that below, if the two hashes do not match <strong>exactly</strong> then something is wrong.</p>
<pre>//
// File Checksum Integrity Verifier version 2.05.
//
6fe64e06950561f2183caace409f42be0a45abdf gpg4win-2.2.1.exe</pre>
<p>Now <em>(assuming that the hashes match)</em> we need to install GPG4Win, for added security you can ensure that the certificate is also genuine for the installer by clicking <strong>More Details</strong> then <strong>Show information about this publishers certificate</strong>. The default GPG4Win installs options should suffice;</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/03/gpg4win.jpg"><img class="aligncenter size-full wp-image-285" alt="gpg4win" src="/wp-content/uploads/2014/03/gpg4win.jpg" width="513" height="399" /></a></p>
<p>&nbsp;</p>
<p>Once installed load up the GNU Privacy Assistant or GPA from the All Programs &gt; Gpg4Win section of the start menu. GPA allows you to import the public keys of the TOR developers who signed the TOR installer to guarantee that it is genuine and hasn&#8217;t been tampered with.</p>
<p>All the signing keys can be found on this page; <a href="https://www.torproject.org/docs/signing-keys.html.en">https://www.torproject.org/docs/signing-keys.html.en</a> if you are unable to reach that page then the key we want is from a developer named Erinn Clark whose key can be identified as 0x63FEE659.</p>
<p>To install her key select <strong>Server</strong> then <strong>Retrieve Keys</strong> from the GPA menu</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/03/key_import.jpg"><img class="aligncenter size-full wp-image-287" alt="key_import" src="/wp-content/uploads/2014/03/key_import.jpg" width="696" height="638" /></a></p>
<p>In the popup box that appears type or paste 0x63FEE659 then click <strong>OK</strong>.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/03/retreive_key.jpg"><img class="aligncenter size-full wp-image-288" alt="retreive_key" src="/wp-content/uploads/2014/03/retreive_key.jpg" width="229" height="152" /></a>You should then be told that one 1 public key has been read and imported!</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/03/imported.jpg"><img class="aligncenter size-full wp-image-289" alt="imported" src="/wp-content/uploads/2014/03/imported.jpg" width="231" height="203" /></a></p>
<p>Select Erinn&#8217;s key from the list and look at the details, ensure that the fingerprint matches the one on <a href="https://www.torproject.org/docs/signing-keys.html.en">https://www.torproject.org/docs/signing-keys.html.en</a> or if you can&#8217;t reach that page this;</p>
<pre>8738 A680 B84B 3031 A630  F2DB 416F 0610 63FE E659</pre>
<p>If it does right click on her key and select <strong>Sign Key</strong>, this indicates that you trust this key for encryption and importantly for our purposes any signatures made.</p>
<p>You&#8217;re now ready to confirm if the TOR download is safe to install. Navigate to the location where you saved the TOR executable and the signature file, right click on the installer and navigate to <strong>More GpgEx Options</strong> then click <strong>Verify</strong>.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/03/verify.jpg"><img class="aligncenter size-full wp-image-290" alt="verify" src="/wp-content/uploads/2014/03/verify.jpg" width="649" height="588" /></a></p>
<p>&nbsp;</p>
<p>In the window that pops up click <strong>Decrypt / Verify</strong>, if all has been succesful you will see a green notice confirming that the signature passes.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/03/signature_success.jpg"><img class="aligncenter size-full wp-image-291" alt="signature_success" src="/wp-content/uploads/2014/03/signature_success.jpg" width="656" height="518" /></a></p>
<p>You can now install TOR safe in the knowledge that the download has not been tampered with by malicious criminals or the surveillance state. Once installed you will now be able to evade any form of Government or ISP filtering.</p>
<p>Remember if you are using TOR to protect yourself as part of a whistle blowing exercise there are <a href="https://www.torproject.org/download/download-easy.html.en#warning">several warnings to take heed of </a>to ensure that you do not jeopardise the work you&#8217;ve put in so far.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/03/11/installing-tor-on-windows-securely/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Building a SOCKS5 Proxy with a Digital Ocean Server to Bypass UK Internet Filters</title>
		<link>https://survivetheclaireperryinter.net/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/</link>
		<comments>https://survivetheclaireperryinter.net/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/#comments</comments>
		<pubDate>Fri, 10 Jan 2014 07:05:14 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter bypass]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Surveillance Avoidance]]></category>
		<category><![CDATA[Block]]></category>
		<category><![CDATA[BT]]></category>
		<category><![CDATA[Bypass]]></category>
		<category><![CDATA[bypass bt filter]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[not free]]></category>
		<category><![CDATA[Proxy DNS Query]]></category>
		<category><![CDATA[proxy resolve dns]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Sky]]></category>
		<category><![CDATA[sky broadband shield]]></category>
		<category><![CDATA[socks list proxy]]></category>
		<category><![CDATA[TalkTalk]]></category>
		<category><![CDATA[talktalk dns server]]></category>
		<category><![CDATA[talktalk homesafe]]></category>
		<category><![CDATA[Virgin]]></category>
		<category><![CDATA[webproxy]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=125</guid>
		<description><![CDATA[If you don&#8217;t currently run Linux on your desktop I would strongly suggest it. Try Fedora or Ubuntu. If you don&#8217;t want to run Linux permanently but do want to try this method then a Live Boot CD of Fedora or Ubuntu (or any other Linux OS of your choice)  would be an ideal method.<br /><a class="moretag" href="/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<div class="alert bluth red"><button type="button" class="close" data-dismiss="alert">&times;</button>This article is for use on a Linux/Mac computer <em>(desktop / laptop etc)</em>. A Windows guide will be available at a later date.</div>
<p>If you don&#8217;t currently run Linux on your desktop I would strongly suggest it. Try <a href="https://fedoraproject.org/en_GB/get-fedora">Fedora</a> or <a href="http://www.ubuntu.com/">Ubuntu</a>. If you don&#8217;t want to run Linux permanently but do want to try this method then a <a href="https://en.wikipedia.org/wiki/Live_CD">Live Boot CD</a> of Fedora or Ubuntu <em>(or any other Linux OS of your choice)</em>  would be an ideal method.</p>
<p>Servers in datacenters are extremely unlikely to experience filtering so by tunnelling your connection through to a server you can browse the Internet without worrying if your connection is being restricted or surveilled.</p>
<p>IMAGE</p>
<h2>Signing up with Digital Ocean</h2>
<p>Navigate to <a href="https://www.digitalocean.com/">www.DigitalOcean.com</a> and click the Signup button at the top of the page. Enter an email address and a password. You may want to use an anonymous email provider such as Hushmail.com to protect your privacy and a strong password you&#8217;ve not used anywhere else. <strong>Important:</strong> The email address must be real as your server password will be emailed to you.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/signup.jpg"><img class="aligncenter size-medium wp-image-128" alt="signup" src="/wp-content/uploads/2014/01/signup-300x241.jpg" width="300" height="241" /></a>Once logged in you&#8217;ll have access to the initial control panel;<a class="lightbox" href="/wp-content/uploads/2014/01/logged_in.png"><img class="aligncenter size-medium wp-image-129" alt="logged_in" src="/wp-content/uploads/2014/01/logged_in-300x166.png" width="300" height="166" /></a></p>
<p>Click get started which will take you to the billing page, you can either use a credit card<em> (you may want to use an anonymous Visa / Mastercard, search online for keywords such as prepaid, anonymous etc)</em> or PayPal.</p>
<p>Once your payment is processed and cleared <em>(check <a href="https://cloud.digitalocean.com/billing">billing</a> for tracking your pre-paid balance if using PayPal) </em> or refresh the <a href="https://cloud.digitalocean.com/droplets">droplets</a> page to see the below;<a class="lightbox" href="/wp-content/uploads/2014/01/paid.jpg"><img class="aligncenter size-medium wp-image-130" alt="paid" src="/wp-content/uploads/2014/01/paid-300x175.jpg" width="300" height="175" /></a></p>
<p>Click <strong>Create Droplet</strong>!</p>
<p>Choose a friendly name for the server <em>(aka Droplet)</em>, this name is not important feel free to use how-to.survivetheclaireperryinter.net if you want to. Leave the Size option alone <em>(or if a larger size is selected change to to 512Mb/20Gb/1Tb as this is only $5 / £3 a month).</em> For lower latency and a reduced chance of NSA eavesdropping choose an Amsterdam datacenter <em>(not necessary but recommended)</em>.<a class="lightbox" href="/wp-content/uploads/2014/01/details1.jpg"><img class="aligncenter size-medium wp-image-131" alt="details1" src="/wp-content/uploads/2014/01/details1-286x300.jpg" width="286" height="300" /></a></p>
<p>Scroll down for more settings. For the purposes of this tutorial choose CentOS and then the latest CentOS version <em>(currently 6.4)</em> then click <strong>Create Droplet</strong>. <a class="lightbox" href="/wp-content/uploads/2014/01/details2.jpg"><img class="aligncenter size-medium wp-image-133" alt="details2" src="/wp-content/uploads/2014/01/details2-300x265.jpg" width="300" height="265" /></a></p>
<p>After a few seconds of watching the following screen your server will be created and you should have received an email with your root password.<a class="lightbox" href="/wp-content/uploads/2014/01/building.jpg"><img class="aligncenter size-medium wp-image-134" alt="building" src="/wp-content/uploads/2014/01/building-300x54.jpg" width="300" height="54" /></a></p>
<p>Behold your new server, make note of the IP address at the top near the word active. In this case the IP address is <strong>95.85.54.190</strong><a class="lightbox" href="/wp-content/uploads/2014/01/complete.jpg"><img class="aligncenter size-medium wp-image-135" alt="complete" src="/wp-content/uploads/2014/01/complete-300x102.jpg" width="300" height="102" /></a>Check your inbox and you should have an email with the IP address, the user name <em>(root)</em> and your password. It&#8217;s very important you don&#8217;t write a blog post and publish your username and password because bad things will happen to your server<a class="lightbox" href="/wp-content/uploads/2014/01/email.jpg"><img class="aligncenter size-medium wp-image-136" alt="email" src="/wp-content/uploads/2014/01/email-300x197.jpg" width="300" height="197" /></a></p>
<p>&nbsp;</p>
<p>Now we&#8217;re ready to create a proxy.</p>
<h2>Testing the Proxy / Tunnel</h2>
<p>Assuming you are logged into your Linux computer load up a terminal.<a class="lightbox" href="/wp-content/uploads/2014/01/terminal_1.png"><img class="aligncenter size-medium wp-image-137" alt="terminal_1" src="/wp-content/uploads/2014/01/terminal_1-300x215.png" width="300" height="215" /></a>Type the following;</p>
<pre class="bash">ssh -D 8080 root@95.85.54.190</pre>
<p> Replace the IP address with your own. You&#8217;ll be informed that the authenticity of the host can&#8217;t be established which is true because you don&#8217;t know what the RSA key fingerprint is. You can choose to accept it and continue or be paranoid and bail. If you chose to continue you will be prompted for you password that was sent by email.<a class="lightbox" href="/wp-content/uploads/2014/01/terminal_2.png"><img class="aligncenter size-medium wp-image-142" alt="terminal_2" src="/wp-content/uploads/2014/01/terminal_2-300x215.png" width="300" height="215" /></a></p>
<p>Load up another terminal <em>(or a tab)</em> and type the following;</p>
<pre class="bash">curl --socks5-hostname 127.0.0.1:8080 http://wtfismyip.com/json</pre>
<p>You should see the following output indicating that your ISP is <strong>Digital Ocean</strong>.<a class="lightbox" href="/wp-content/uploads/2014/01/terminal_3.png"><img class="aligncenter size-medium wp-image-140" alt="terminal_3" src="/wp-content/uploads/2014/01/terminal_3-300x215.png" width="300" height="215" /></a></p>
<p>&nbsp;</p>
<p>You could immediately configure your browser etc to use these settings but you should try and be a bit more thorough.</p>
<h2>Configuring the Proxy / Tunnel for long term use</h2>
<p>Exit all of the terminals opened in the previous step which will close all tunnels and SSH sessions and we&#8217;ll get started on making this a little more secure.</p>
<p>First things first is to change the root password from the one that was emailed to you. Load up a terminal and ssh in;</p>
<pre class="bash">ssh <a href="mailto:root@95.85.54.190">root@95.85.54.190</a></pre>
<p>Once logged in change the password with the passwd command. Ensure you use a different password to anything else you have.<a class="lightbox" href="/wp-content/uploads/2014/01/terminal_4.png"><img class="aligncenter size-medium wp-image-147" alt="terminal_4" src="/wp-content/uploads/2014/01/terminal_4-300x215.png" width="300" height="215" /></a>The root user is the most powerful user on a Linux server and can delete anything and everything so you really don&#8217;t want to be using it for everyday tasks. For creating the tunnel we want to use a non-privileged user. To do this simply type the following <em>(feel free to replace the name tunnel with your name or anything, it&#8217;s just a username and isn&#8217;t important)</em>;</p>
<pre class="bash">useradd tunnel</pre>
<p>Now change the password for this user by passing the username to the passwd command used earlier, make sure you use a strong password and one that isn&#8217;t that same as any of your others;</p>
<pre class="bash">passwd tunnel</pre>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/terminal_5.png"><img class="aligncenter size-medium wp-image-148" alt="terminal_5" src="/wp-content/uploads/2014/01/terminal_5-300x215.png" width="300" height="215" /></a></p>
<p>Load up a new tab on your local machine and try logging in as your new user;</p>
<pre class="bash">ssh tunnel@<a href="mailto:root@95.85.54.190">95.85.54.190</a></pre>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/terminal_6.png"><img class="aligncenter size-medium wp-image-149" alt="terminal_6" src="/wp-content/uploads/2014/01/terminal_6-300x215.png" width="300" height="215" /></a></p>
<p>&nbsp;</p>
<p>You&#8217;re now ready to setup a tunnel/SOCKS proxy you can use with your browser.</p>
<p>Exit all your terminals again and this time issue the command;</p>
<pre class="bash">ssh -D 8080 tunnel@<a href="mailto:root@95.85.54.190">95.85.54.190</a></pre>
<p>In a new terminal check that the proxy is working by issuing the CURL command again;</p>
<pre class="bash">curl --socks5-hostname 127.0.0.1:8080 http://wtfismyip.com/json</pre>
<p>For this example I&#8217;m going to use Firefox but feel free to try it out with others. In the address bar type <strong>about:config</strong>, you&#8217;ll be presented with the following screen;</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/firefox_dragons.jpg"><img class="aligncenter size-medium wp-image-150" alt="firefox_dragons" src="/wp-content/uploads/2014/01/firefox_dragons-300x92.jpg" width="300" height="92" /></a></p>
<p>&nbsp;</p>
<p>Assuming you are going to be careful click the button.</p>
<p>In the Search bar at the top type <strong>proxy</strong>, then look for the strings <strong>network.proxy.socks</strong> and <strong>network.proxy.socks_port</strong>, type in the values from the command above (127.0.0.1 and 8080). If your ISP filters DNS then you may want to toggle <strong>network.proxy.socks_remote_dns</strong> too <em>(don&#8217;t forget to change your name servers!)</em>.</p>
<p>Finally change <strong>network.proxy.type</strong> to <strong>1</strong>.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/firefox_about_config.png"><img class="aligncenter size-medium wp-image-151" alt="firefox_about_config" src="/wp-content/uploads/2014/01/firefox_about_config-300x216.png" width="300" height="216" /></a>To test, simply load up a new Firefox tab and attempt to access a blocked page.</p>
<p>So there you have it, an easy way to get past any Web filtering and as an added bonus since your traffic is encrypted between your computer and your server in Amsterdam neither your ISP nor the UK Government can monitor it.</p>
<div class="alert bluth yellow"><button type="button" class="close" data-dismiss="alert">&times;</button>Traffic egressing the server can still be tracked and recorded. With the right combination of warrants and traffic capture at the Digital Ocean datacenter coupled with your home ISP logs illegal activity can still be traced back to you! Only use this to method to bypass filters,</div>
<p>Upcoming articles include creating a dedicated Raspberry PI proxy for use with multiple devices <em>(phones, tablets, Windows PCs etc)</em> and setup guides for other server providers. Make sure you follow <a href="https://twitter.com/stcpi">@STCPI</a> on Twitter for updates!</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
	</channel>
</rss>
