Is you -> Tor -> proxy method like this?

In the first step the browser sends my internet data to Tor, at the exit node runner side establishes a proxy connection for me, then internet traffic from exit node send my browser internet data to proxy.

Is that you -> Tor -> proxy method that can be achieved in Whonix? Is that the proxy side doesn’t know what is my IP address? If I change the public free proxy frequently, can it be a better idea for Anonymity?

I like this method because some websites ban Tor.

Hallo donzu. Do you mean Cloudflare?

Best Regards!

townsend

It is very easy:

1- Find a http or https proxy
2- In Workstation, Tor Browser, click Torbutton -> Preferences
3- Choose custom proxy settings, clear the socks proxy
4- Enter your preferred proxy on HTTP and/or SSL proxy sections and click OK
5- You will now browse through your proxy IP and avoid those nasty Tor bans.

You could also use this method when you need an IP from a specific country.

To revert the proxy settings, choose the recommended settings or click “Restore Defaults” on the preferences screen.

See:

Make sure you know about http proxies sending http forwarded for header:

[quote=“townsend, post:2, topic:680”]Hallo donzu. Do you mean Cloudflare?

Best Regards!

townsend[/quote]Not just Cloudflare, it’s Blogspot, as an unregister user commenting on the blog, it’s almost imposable so I think I should let the Proxy or VPN send my data to the blog instead of Tor exit node and no proxy or vpn knows my real IP address.

[quote=“z, post:3, topic:680”]It is very easy:

1- Find a http or https proxy
2- In Workstation, Tor Browser, click Torbutton -> Preferences
3- Choose custom proxy settings, clear the socks proxy
4- Enter your preferred proxy on HTTP and/or SSL proxy sections and click OK
5- You will now browse through your proxy IP and avoid those nasty Tor bans.

You could also use this method when you need an IP from a specific country.

To revert the proxy settings, choose the recommended settings or click “Restore Defaults” on the preferences screen.[/quote]If that is you -> Tor -> proxy, can I do the same with Torsocks or ProxyChains?

[quote=“Patrick, post:4, topic:680”]See:

Make sure you know about http proxies sending http forwarded for header:

The main risk of this method is giving up the feature of changing last node, so I change the proxy within 10 minutes.

Is the IP part of ‘http forwarded for’ header is the IP of Tor exit node? If I use standalone TBB without Whonix? If it is, then It will be no risk for my anonymity, I just need to change another proxy.

Is the IP part of 'http forwarded for' header is the IP of Tor exit node?
Yes.
If I use standalone TBB without Whonix?
'http forwarded for' header is not a Whonix specific problem.

If you use TBB outside of Whonix, then there are two places to set proxy settings. In TorButton and in tor-launcher addon. Putting tor-laucher addon aside here (that would be user → proxy → Tor → destination), setting a custom proxy in TorButton settings would result in only using that proxy (user → proxy → destination) and if that proxy would send ‘http forwarded for’ header then there would be no anonymity at all.

Terminology:

If it is, then It will be no risk for my anonymity, I just need to change another proxy.
When using Whonix, you never have less protection than Tor. Choosing another proxy would do.

It depends. But it’s a lot less complicated than you might think.

The simplest way to put it: proxy with http forwarded for header = effectively no anonmyzing proxy. Really no magic involved. That’s why it’s unrelated to Whonix.

Documentation of proxy warning updated. Hopefully now a lot clearer.

When no Tor/Whonix involved:

Tunnel Tor through proxy (user → proxy → Tor):

Tunnel proxy/proxychains through Tor (user → Tor → proxy):

Does that answer your question?

After setting proxy address in both tor-launcher and torbutton, I open a webpage in TBB it is loading fast than used to be, but I couldn’t find any traffic rate is produced showing in Vidalia bandwith graph and connection in Tor network map, so I think it’s not browser->proxy->tor, its browser->proxy without Tor client rotating the data so the vidalia doesn’t detect any traffic.

I’v read this article.

"you → Tor → proxy

You can also route proxy connections through Tor. That does not hide and secure your Internet activity from Tor exit nodes because the connection between the exit node to the proxy is not encrypted, not one, but two parties may log and manipulate your clear traffic now. If you’re using proxies in this way, you’ll want to pay for them anonymously (cash in the mail [beware of your fingerprint and printer fingerprint], Liberty Reserve, well-laundered Bitcoin, etc) or use free proxies.

On way to do that is proxychains.

Another way would be to use a Transparent Proxy and then either proxify (set proxy settings) or socksify (use helper applications to force your application to use a proxy) the programs your want to chain inside your Transparent Proxy client machine, see for helper applications. "

Seems can not do (you ->tor ->proxy) outside of whonix and proxychains.

Sounds plausible.

“setting proxy address in both tor-launcher and torbutton” sounds like a really bad idea. Setting in tor-launcher should result in user → proxy → Tor → destination. Setting in torbutton will result in not using Tor at all.

Seems can not do (you ->tor ->proxy) outside of whonix and proxychains.
It's possible (using iptables / transparent proxy like [user accounts] and stuff) but difficult.

When see transparent proxy I think about torsocks and proxychains, can they achieve (you -> Tor -> proxy ) outside of whonix?