Hi, I’m having trouble with proxychains. I have never used proxychains before, but would like to get them working.
For proxychains when I up terminal and type proxychains Firefox www.google.com
I get Proxychains-3.1 (http://proxychains.sf.net) firefox: run_symlink.c:104: run_symlink: Assertion ‘getenv(“LD_PRELOAD”) == NULL’ failed. Aborted
I’ve been looking through the new and old forums, watching videos and I’m just not sure how to get them working correctly.
I put the proxychains issue but not the anonsurf issue. I’m not sure if it’s exactly but when I turn anonsurf on I don’t get the your under the tunnel encrypt it like everyone’s watching message which I thought was strange when I go to ipleak.net I see a different IP address from my tor IP address. It isn’t showing and dns servers but the IP address is kind of concerning, when I look further at anonsurf status in the terminal I see that tor is active but I see date time owner Tor [19412] Application request to port 80: this port is commonly used for unencrypted protocols. Please make sure you don’t send anything you would- it then cuts off theirs about 8 of the same messages.
Thank you for the response I appreciate it,
When I go cd shadowsocks --> python setup.py I get
usage: setup.py [global_opts] cmd1 [cmd1_opts] [cmd2 [cmd2_opts] …]
or: setup.py --help [cmd1 cmd2 …]
or: setup.py --help-commands
or: setup.py cmd --help
Error: no commands supplied
When I get shadsocks setup working
And go to sudo nano /etc/proxychains.conf
When it says
defaults set to “tor”
socks4 127.0.0.1 9050
socks5 127.0.0.1 1080
Or replace socks 4 so their is only socks5? I had both socks 4 and socks 5
Ok I got you, I was under the impression that you could run shadowsocks on the client side to protect from Tor bad exit nodes without a VPS. I’m gonna purchase a VPS. Can you configure a more anon configure for more than just surfing w/ anon-surf more like AirVPN/VPN - TOR - Shadowsocks - Target?