[TUTORIAL] Tor, i2p and Privoxy by Invisibolt

ATTENTION: This is a tutorial made by a Ubuntu user (or BackTrack 5 with GNOME interface, as you wish). The Ubuntu version is 10.04, but you can try it with any other version.

I've been searching about how to really be anounymous around the deepnet and I found some great information. So here's my simple tutorial. It's better to remind you that it's a good idea to make some Google searching while you read this tutorial. I suppose the best way of anonymity is to use Tor and i2P at the same time. AND a script blocker for your browser (e.g. NoScript). But then you ask yourself: "Tor and i2P at the same time?? HOW?" -Yes! Use Privoxy to forward you to the right port when accessing a .i2p or .onion website.

---------Tutorial for Ubuntu--------1. Install Tor, Vidalia, Torbutton, i2P and Privoxy. 2. Stop Tor and remove it from the startup:
sudo /etc/init.d/tor stop sudo update-rc.d -f tor remove

3. Configure Torbutton to use Polipo (just check the box on Preferences>Proxy Settings)
-In this case Privoxy is used instead of Polipo, but “Polipo” is the one written on the preferences.

 If you are Googling, you may have read about changing some lines on the config file of Privoxy (/etc/privoxy/config). So take these notes:

 Add this at the very the beginning of the config file: forward-socks5 / . forward .i2p

-The first line forwards the SOCKS v5 service to the 9050 port. -The second line forwards .i2p websites to the 4444 port.

IMPORTANT: For me the 503 error was shown by Privoxy when trying to access .i2p websites if the above lines weren't in that order.  Change this line: listen-address localhost:8118 To this: listen-address

-This is the official default as using "localhost" causes all sorts of problems on systems that pretend to support IPv6, but actually have no IPv6 connectivity.

 Add "#" in front of these lines (if they exist) on the config file: logfile logfile jarfile jarfile -Making them look like this: #logfile logfile #jarfile jarfile

-This means that those lines are comments now. So there will be no log file when privoxy is enabled.

4. Restart Tor from Vidalia 5. Restart Privoxy from the command line:
sudo /etc/init.d/privoxy restart

Now everything should be running well.

 I recommend to add Privoxy to the startup apps: System-->Startup Applications--Add On the "Command" box, paste this: /etc/init.d/privoxy start

---When you turn your system on, Tor and i2P must be started manually.---

 To start Tor, just run Vidalia.

 To start i2P run the following on the command line: sudo /usr/bin/i2prouter start

Or just add i2P to the startup apps: System-->Startup Applications-->Add On the "Command" box, paste this: sudo /usr/bin/i2prouter start

 I do not recommend adding either Tor or i2P to the startup apps. But if you don't feel bad about some unused open ports, feel free to do it.  When i2P starts, it opens a terminal screen. You can read those stuff if you want, or just close it.  i2P takes some time to connect. So if everything was running well on the first time and when you reboot you get a 503 error from Privoxy, just wait a minute longer.

-To check if Tor is running: http://check.torproject.org/ -To check if i2P is running and Privoxy is well configured: http://www.i2p2.i2p/

Sign up to vote on this title
UsefulNot useful