In the Tor browser the desired city. Configuring Tor to use a specific country as an exit node

Home / Technologies

When I downloaded the browser, I was left with this folder on my desktop

You need to go into it and select the folder Browser =>TorBrowser =>Data =>Tor.





In this Tor folder, we are only interested in the torrc file; you need to open it using Notepad and enter a command in it so that the output always contains one or more countries that you need.


Since I don’t need the whole world to work, but just our homeland, I changed the settings of my browser by entering the command in this way. I only added the last line. ExitNodes (ru), for me it looks like this.


But this is the case if you need one country, and if you need several, then they need to be written separated by commas and always in such curly brackets. Next, start saving. In my case, ru is the designation for Russia. Designations and letter codes of countries around the world can be found on the Internet; I look at them on the website [link] in a column of 2 letters. Well, in order to select a specific city, you just need to click on the onion and then the cities will change only from the list of those countries that you need. In order to check the city you are in at the moment configured, you need to enter the command into the search bar of your browser [link] and configure the browser to the desired city manually.


After entering the command and saving, the browser works as it should.

And now not much about the disadvantages that I see in it for myself:

  • not all forums and sites allow entry from such a browser (for example, Flamp cannot be fooled in this way)
  • It works slowly, but this is due to the constant change of nodes in the chain
  • Sometimes the IP address changes too quickly and at the wrong time.
  • After updating the browser, you need to re-enter the logins and passwords of the pages you were currently on, log in mailbox For example

Still, I like this browser and use it. It opens up a lot of possibilities. And if I learn anything new about him, I’ll be sure to let you know.

Many Internet services provide access to their services only when you visit websites or applications from certain countries. IP addresses and sometimes more variables such as system time, are checked when the user wants to access country-restricted services. If the IP is located in a country where access is allowed, otherwise she is rejected.

There are many workarounds that will help users can access these services even if they currently reside in another country. One of the possibilities that I want to talk about in this article is how to configure Tor in such a way that the node exit is in the country where you want to access services. Tor offers many so-called nodes which are servers in a specific country with them and works software Tor.
For this I use the Vidalia package which contains everything necessary programs to explain how a specific country can be selected when using Tor. You can download Vidalia and install the software using the link at the bottom of the page. The main program interface will load after installing Vidalia.

The control panel displays the current state of Tor. Additional information displays exactly what we are going to use to find servers located in the country we need whose IP address we need. Click on the Browse Network link - a visual representation of all Tor servers is displayed, but only if Tor is running.
Servers can be sorted by country (there will be flag), there is also a performance indicator next to them. Write down some server names with the best performance and exit the menu. We need to add these servers as output nodes in the Tor configuration. Click the Options button and there on the front there is a menu tab in which you will find the Tor configuration menu entry.
Click the "Browse" button to open a file browsing dialog. Left-click on the "torrc" file and select "Edit" from the menu. Now add the following two lines in the configuration, just insert them at the beginning, for example:

Server1 ExitNodes, server2, server 3
StrictExitNodes 1
Replace server1, server2, and so on with the names of the servers that you recorded in the network display window. Stop and restart Tor for the changes to take effect.
Now we need to add an HTTP proxy for our browser Firefox. Click on Tools> Options> Advanced networks and there click on the “Settings” button. Select Manual proxy setup and enter local port 8118.

You can check the functionality with a scriptvisiting IP search, which should display the IP of the country you selected from the servers. Download and install the software Vidalia is available on the Internet.

Tor Browser via IP addresses of a specific country.

Recently, a friend knocked on my door asking me to help her with a delicate matter. She wanted to get votes in some girls' photo contest. I don’t understand who the hell needs this, people have nothing to do. If I were to receive some prizes (which is also not entirely fair), that’s what I understand, but doesn’t a naive RuNet user yet understand that participating in some kind of competitions or reposts on VKontakte with promising and flashy names like “Make a repost” “Press the like button”, “Spit over your right shoulder”, “And get a super-duper Video card” or “Gaming Razer mouse Will Mamba give him the opportunity to get something for free?

Okay, I got carried away. So, one of the conditions of the competition was that voting people must be located on Russian territory. Those. The IP addresses of users who vote must be from Russia. And she lives in Ukraine. I thought for now I would give her a list of those checked out, and then use the Proxy Switcher program to solve this issue.

But then, after thinking a little, I decided to take a simpler route, nooo... and not because she’s blonde, I really love women and blondes in particular:)! Just like, I’m a little lazy person, I’m looking for something easier. I decided, after finishing it a little, to send her our favorite, slightly modified Tor Browser.

We wrote in detail about Tor in this article ““. If you are not yet familiar with this secure browser based on an anonymous network, I advise you to read it.

Tor works through IP addresses of a specific country

The Tor network works randomly, i.e. accesses the network through a constantly changing chain of nodes, and each time your computer is assigned a different IP address from different countries. But we only need Russian!

So, how to configure Tor so that it always receives the IP of a certain country. For this we will need if you don’t already have it. In the drop-down menu you can select the interface language. There is also Russian!

Turn on Thor. If you see a green onion and the words “Connected to the Tor network,” move on.

In the same window, click on the Settings button

In the window that appears, go to the Additional tab. Click on the button Edit current torrc. In the torrc editing window, at the very bottom, at the end, add the line ExitNodes (ru). Put a tick Apply selected and click OK

Now let's restart the browser. After launching Tor Browser from all possible IPs, it will select only Russian IP addresses, and change only to Russian ones when you press the button Change identity.

This way you can customize the browser to your taste. For example:

  • Work across any country
    ExitNodes (country code)
  • Work only through specified countries (several countries).
    ExitNodes (ua),(ug),(kp),(ru)
  • Block work through a specific country.
    ExcludeExitNodes (de)

Download for free

Well, now you know how to make Tor work through IP addresses of a specific country. If you liked the article, click the button social network! And don’t forget to subscribe to us on VKontakte, Odnoklassniki, Twitter and Facebook, so as not to miss the news and be always up to date.

We make sure that IP addresses in Tor are only for certain countries. It is no longer a secret for everyone who uses the Tor browser that IP addresses there are constantly changing. And let’s say, if you are identified as a user from the USA, then in a couple of minutes everything can change. And you will use some other address. For example: Germany, Greece, France, etc. It is impossible to change the permanent shift, but you can make sure that each subsequent address that will be assigned to you is from one specific country.

In order to do all this you need to edit the file torrc located in directory Tor Browser->Data->Tor->torrc. Open this file with notepad and add the line ExitNodes ( ). In parentheses { } you must indicate the letter code of a specific country whose IP address you will use. For example, for Russia there will be ExitNodes (RU), for the USA - ExitNodes (RU), Germany - ExitNodes (DE).

You can find a complete list of countries and their letter codes on Google. Save your changes in Notepad and launch Tor.

How to configure Tor correctly

Who Uses Tor?

Family & Friends

People like you and your family use Tor to protect themselves, their children, and their dignity while using the Internet.

Businesses

Businesses use Tor to research competition, keep business strategies confidential, and facilitate internal accountability.

Activists

Activists use Tor to anonymously report abuses from danger zones. Whistleblowers use Tor to safely report on corruption.

Media

Journalists and the media use Tor to protect their research and sources online.

Military & Law Enforcement

Militaries and law enforcement use Tor to protect their communications, investigations, and intelligence gathering online.

Here you can find answers to questions about the network: advantages, disadvantages and Tor problems networks. All this will help you easily achieve anonymity on the Internet and avoid cases of your identity being revealed.

Tor - what is it?

Tor is a global Internet network that ensures user anonymity. Many people know it as “onion routing”. You can connect to it using the Tor browser.

Why do we need Tor?

The main advantage of Tor is providing anonymity. No one will know what requests you make, what IP address you use, what files you download. In addition, you will be able to view sites that are usually blocked by your ISP.

Browser Tor, how to select an IP of a certain country, how to ban an IP of a certain country

Moreover, you will be able to view onion sites and submit to a site from a different geographic region. Just remember: using any browser other than Tor on the Tor network will not ensure your anonymity.

How to use Thor?

The Tor network itself is not capable of protecting all of your Internet traffic. It can only protect applications that are configured to transmit data through it. For your convenience, you can use the Tor browser. It is already optimally configured to protect the anonymity of your Internet experience. Using any other browser in conjunction with the Tor network is not safe.

Torrenting via the Tor network – is it real?

Unfortunately, you cannot download torrents when you are on the Tor network. Otherwise, your real IP address will be visible to others. This means that anonymity is eliminated. In addition, the work of Tor will be slow - and not only for you, but also for other users.

Is it possible to install additional plugins for the Tor browser?

Tor browser by default blocks any plugins such as Flash, RealPlayer, Quicktime and others. The fact is that they can reveal your real IP address. And that is why we do not recommend installing additional plugins for the Tor browser. Otherwise, the benefits from using the Tor browser will be minimal or even reduced to zero.

How to protect yourself when using the Tor network?

To connect to sites, use only a secure https connection. The Tor browser has an extension that always establishes just such a connection. Still, it’s better to make sure for yourself that the address is indicated as https:// in the address bar, and you see the name of the site you requested.

How to avoid detection on the Tor network?

While you are online, do not open documents downloaded via Tor. If your browser warns you of danger when opening a document (DOC and PDF), do not ignore it. After all, a document may contain links to certain Internet resources; by opening it, you will reveal your IP address to others. So it is better to disconnect from the network or the Internet before opening such documents.

How to hide the use of the Tor network?

Tor hides the sites you connect to from hackers. But, by default, it does not hide the use of the Tor network. Therefore, if hiding the usage itself is important to you, then you can reduce the risk of detection by using the Tor forwarding bridge. But the most best way protection – social: the more Tor users there are near you and the more diverse their interests, the more difficult it is to find you among them. Encourage other people to use Thor too!

Should Tor be used for illegal purposes or should such use be encouraged?

No, Thor was created for freedom of expression, preservation of privacy and protection of human rights. Tor is not an application to break the law, neither by Tor users nor by forwarder owners.

Can you promise I won't get in trouble for running a Tor forwarder?

No, any new technology creates some legal uncertainty and Tor is no exception. And we cannot guarantee that you will never face liability in any way for your Tor forwarder. However, we truly believe that the people who provide forwarders should not and cannot be responsible for the traffic that passes through them. As confirmation, we ourselves provide a server for forwarding traffic for the needs of the network.

Selected especially for you

The Tor network consists of a huge number of intermediate (middle relay) and final servers (exit relays), through which user data passes through thousands of threads. To appreciate the scale of the Tor network, take a look at the world map of Tor servers. It’s through one of them that your data will flow the next time you launch the Tor browser. The dynamic map can be viewed at the link.

As in any computer network Among the servers there are faulty, infected, and sometimes servers belonging to attackers. Most often, such servers hunt for passwords from social networks. networks, email or credit card information.

In order to promptly exclude such nodes from the network, the Tor Project team is developing and supporting two free programs. They allow you to identify and block “bad” nodes and make Internet surfing as safe as possible.

Exitmap checks exit servers - the place where traffic leaves the encrypted Tor network and is transmitted to the clear Internet. For this purpose, an algorithm is used to compare operations on all end servers.

For example, a user can log in (by entering a login and password) to Facebook directly, without using Tor. Then write down a digital signature that the site uses to confirm that this is indeed real Facebook. You can then compare the signature with signatures obtained via Exitmap. The program uses thousands of output relays to connect to Zuckerberg's website, recording each digital signature. Relays whose signature differs in any way from the original can be considered potentially dangerous.

Another program, Sybilhunter, can identify entire sets of relays that are likely under the control of one person. There are high chances that such a person will use the servers for hacker attacks. Among other things, Sybilhunter can create graphic images, illustrating a graph of server availability in Tor. This, in turn, makes it possible to define relays that are controlled by one "center".

The figure shows a visualization of the uptime of some servers inTor, as of part of January 2014. Output areas that are very likely managed by the same person are shown in red.

Tor Project research has identified a wide range of potentially dangerous servers.

9. Tweaking Tor

Some of them try to steal registration information from popular sites and services. Others block certain websites within certain countries, forming a censorship system. There are also nodes that attack Bitcoin wallets in order to seize the victim’s virtual currency!

It is fair to say that dangerous or likely dangerous output relays constitute an absolute minority in the overall TOR network. The chances of hitting them by accident are minimal. In addition, the “HTTPS-Everywhere” utility is built into the Tor browser, which will not allow the attacker to achieve their goals, or will reduce the harm to a minimum.

What is Tor Browser

Full name: Tor Browser Bundle. Built on a platform Mozilla Firefox and is one of the most anonymous browsers in the world. When using the Internet, changes your IP address to a random IP address.

Tor Browser: specify which region to use

Uses IP from different countries: Romania, Luxembourg, Switzerland, Germany. Does not store cookies or a log of visited sites, does not remember logins and passwords. Uses a special secure network of anonymous proxy servers.

Installing Tor

Download this browser you can from the official website: https://www.torproject.org/download/download-easy.html.en

Select your language and click Download Tor Browser Bundle:

Run the downloaded file:

Click OK:

Install:

Ready:

Using Tor Browser

Launch the program. If you haven't unchecked Launch Tor Browser Bundle After the installation is completed, it will start automatically.

When you first launch you will see a window Network settings Tor. Here you need to select the connection type. Nowadays, in most cases the first option is suitable - a button Connect:

After this, the browser connects to the Tor network, which will hide your real IP address, ensuring your anonymity. Wait for connection to the network:

For greater privacy, you can request versions of pages on English. But this is not a key indicator of anonymity. You can click No:

Tor browser is not installed on the system in the traditional way, because... is a portable application. You can carry the program with you on a flash drive. By default, when unpacking it is placed in the folder Tor browser on the desktop:

You can move the browser folder to any location. When you want to launch TOP to anonymously visit a site, go to the program folder and run the file Start Tor Browser.exe:

After pressing the button New identity and before using a new IP address, go to 2ip.ru and see what has changed.


To imitate another identity, it is advisable to change not only the IP, but also the country. If necessary, press the button Tor, select item New identity (New Identity), until the country changes:

Attention! Due to the fact that when working through the Tor browser, traffic goes through many proxy servers, the page loading speed is much lower than through a regular browser.

Also read our article on how to use the Tor secure network on Android devices.

You might be interested:

Setting up Tor browser

If you don’t know what the Tor browser is, then read the article on what the Tor network is.

Download Tor Browser only from the official website torproject.org.

Be careful! There are sites that imitate the Tor project site. For example, the website torprojectS.org (with an S added at the end) is trying to install a Trojan on your computer. DO NOT download Tor Browser from third party sites.

By the way, Tor Browser is based on Mozilla browser Firefox, since this is the only browser that can independently work with a Socks connection without participation operating system.

Download Tor Browser from torproject.org

After installation, Tor Browser is completely ready to use.

Below is a screenshot from the official website.

  • do not install additional plugins, as there is a possibility of installing a plugin that will give out your real location. All necessary plugins for anonymity are already installed.
  • Do not open documents (such as PDF and DOC) downloaded in the Tor Browser while you are online. Such files may have macros embedded that will request Internet access directly through the program, bypassing the Tor network. This will compromise your real IP address.
  • Do not download torrents on the Tor network, as this will increase the load on the network. Torrent programs are designed in such a way that they always access the Internet directly and do not take into account proxy settings. This may compromise your real IP address.
  • always use https connection. This connection will ensure the security of data transfer.

Tor Browser main window.

For security settings, click Security Settings.

Set the security level:

  • Low (default) – standard security level.
  • Suitable for most users. Websites open correctly and nothing is blocked.

  • Medium – Javascript is blocked on sites that do not support https. HTML5 video and audio is launched by clicking through NoScript plugin
  • High – Javascript is blocked on all websites. HTML5 video and audio are launched with a click through the NoScript plugin. Some types of pictures, fonts and icons are prohibited from downloading
  • Since most of the websites use Javascript, therefore browsing websites in High mode is problematic as some of the content is hidden. We recommend this mode when you need to read an article on a website, but you do not need to log in to the site.

Tor Browser is ready to use and you can immediately start surfing anonymously.

Remember that with this setup, only the Tor Browser uses the Tor network. All other programs use a direct connection to the Internet and transmit your real IP address.

What to do with programs that cannot work directly with the Socks protocol? For example, email clients, other browsers, instant messaging programs, etc. We recommend using Proxifier to redirect traffic from such programs to the Tor network.

Setting up Proxifier via the Tor network

The Proxifier program can:

  • redirect traffic from all operating system programs through a proxy (including email clients, all browsers, instant messaging programs)
  • create proxy chains
  • use DNS server from a proxy, hiding the real DNS of the ISP
  • supports http and socks proxy

Download Proxifier for Windows Download Proxifier for macOS

Home page of the official Proxifier website.

Install the Proxifier program.

This program can collect all operating system traffic and pass it through a specific proxy server.

To configure Proxifier, you need to know the Tor network port being used. Go to the Preferences section of the Tor Browser.

Select the Network Settings section.

Look at the used local IP address and connection port of the Tor network. This data must be inserted into the Proxifier program so that all operating system traffic passes through the Tor network. In our example, 127.0.0.1 and port 9150.

Launch the Proxifier program.

ATTENTION!

Browser Tor how to select a country

It is important to first launch Tor Browser and wait until the main window appears. And only after that launch the Proxifier program.

Click on the Proxies button.

Click the Add button.

Enter the IP address and port. In our example: 127.0.0.1 and port 9150.

Select Yes - you agree to use this proxy by default.

Open any browser or mail program. In Proxifier you will see a list of connections via the Tor network. In any browser, you can check your IP address and make sure that the IP address from the Tor network will be displayed, and not your real IP address.

If something does not work, then close Tor Browser and Proxifier. And then launch Tor Browser and wait for the main window to appear. Only then run Proxifier. None additional settings no need to do it. All traffic will automatically go through the Tor network. Close Proxifier to get your real IP address back.

© 2024 ermake.ru -- About PC repair - Information portal