Всем привет, с вами — Destroyer Knight, и сегодня я вам помогу скрыть свой трафик интернета. 1. Установка dnscrypt. 'Нажми' urpmi dnscrypt 2. dnscrypt-proxy -R cisco 'Нажми' [INFO] - [cisco] does not support DNS Security Extensions [WARNING] - [cisco] **** your activity - a different provider might be better a choice if privacy is a concern [NOTICE] Starting dnscrypt-proxy 1.6.1 [INFO] Generating a new session key pair [INFO] Done [INFO] Server certificate #1463092899 received [INFO] This certificate is valid [INFO] Chosen certificate #1463092899 is valid from [2016-05-13] to [2017-05-13] [INFO] Server key fingerprint is ABA1:F000:D394:8045:672D:73E0:EAE6:F181:19D0:2A62:3791:EFAD:B04E:40B7:B6F9:C40B [NOTICE] Proxying from 127.0.0.1:53 to 208.67.220.220:443 3. В /etc/resolv.conf добавим 'Нажми' nameserver 208.67.220.220 4. dnscrypt —ephemeral-keys —resolver-name=cisco —daemonize 'Нажми' dnscrypt-proxy —ephemeral-keys —resolver-name=cisco —daemonize [INFO] - [cisco] does not support DNS Security Extensions [WARNING] - [cisco] **** your activity - a different provider might be better a choice if privacy is a concern 5. В настройках ****** указываем 127.0.0.1 : 53 . 6. Проверяю https://www.opendns.com/welcome/ 7. Попытка 2. Пустить весь трафик через TOR. 8. Установим. 'Нажми' urpmi tor 9. Добавим в конфигурационный файл. 'Нажми' /etc/privoxy/config forward-socks5 / localhost:9050 . forward-socks4 / localhost:9050 . forward-socks4a / localhost:9050 . 10. В настройках Параметры сети — ******-сервер указываем 'Нажми' HTTP proxy: localhost:8118 SSL proxy: localhost:8118 SOCKS host: localhost:9050 2.4 $ curl -x socks5://localhost:8118 http://ident.me/ $ curl -x http://localhost:8118 http://ident.me/ 11. Tor должен работать всегда. Всем удачи