[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-talk] MITM attack on TLS
If your IT department allows outgoing SSH, then spin up a micro Linux EC2
instance on Amazon Web Services (which costs only 1.3 cents per hour), then
SSH into the EC2 instance and setup an SSH tunnel.
Assuming your local machine is running Windows, you can use Putty as the
SSH client. If you just want to use the EC2 instance as a proxy (without
Tor), then in the Putty configuration, look under Connection -> SSH ->
Tunnels, for Source port pick any high number like 9000, pick Dynamic,
click Add, then Open the session, finally, configure your browser to
connect to a SOCKS4 proxy on 127.0.0.1 at the port you chose (like 9000).
If you want to use Tor, too, then download and start torproxy on the EC2
instance. Assuming the torpoxy port on the EC2 instance is 9050, then in
the Putty configuration under Connection -> SSH -> Tunnels, for Souce port
pick any high number like 9000, pick Local and in the Destination field
enter 127.0.0.1:9050, click Add, then Open the session and again configure
your browser to connect to a SOCKS4 proxy on localhost at the port you
chose (like 9000).
If you've never used EC2 before, it will probably take you 1-2 hours to do
this the first time (maybe you can find a tutorial on the www or
something), but once you get it set up it works quite nicely, and the price
is right.
--
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk