AFAIK you can hide from your ISP that you’re using TOR by using a bridge or a VPN, but what about hiding from websites? Is there a way to make the TOR end node connect to a VPN/proxy which then connects to the website?
The website will only know that you used the proxy service.
This is pretty easy with Whonix workstation/gateway. On the workstation, configure your browser to use one of those proxys as you would if you weren’t using Tor. The gateway will use tor to have your workstation connect to that proxy.
Due to Reddit deciding to sell access to the user generated content on their platform to monetized AI companies, killing of 3rd party apps by introducing API changes, and their track history of cooperating with the oppressive regime of the CCP, I have decided to withdraw all my submissions.
I am truly sorry if anyone needs an answer I provided, you can reach out to me at [email protected] and I will try my best to help you
TLDR: Only if you use a VPN over TOR, but that is not recommended (look at r/TorwithVPN)
The IPs of the TOR relays are public (you can check them at https://metrics.torproject.org/rs.html#search, there is also an API for this), so the websites can check if you’re connecting through TOR or not by checking the IP you’re connecting the website with. You can use a VPN over TOR to connect to the website, so that the website only sees the IP of the VPN, but that is not recommended, check out r/TorwithVPN for the reasons
Yes you can run a program that reroute your whole system through Tor and than configure your web browser to use a proxy or you can use Whonix OS if you want to be extra safe and configure a web browser in the Whonix workstation to use a proxy.
if someone wants to hide Tor exit node, It is recommended to host an SSH server on a different machine to redirect traffic, but this can be dangerous if the other machine (with SSH) got hacked because there could be SSH vulnerabilities
if you use HTTP(S), a lot of open proxies will send the IP in an additional HTTP header, hence the destination site will know it’s coming from a Tor exit node
Unfortunately the problem with most commonly listed open-proxies is that they suffice some of the same blacklisting or other ‘abuse’ mitigations that Tor exit nodes can have…
You don’t. Lists of Tor exit nodes are publicly available. If the web site operator wants to go through all that extra work, they can set up something on their end to check your exit node’s IP address to see if it’s listed.
However, this does not compromise your anonymity. Tor still protects your identity and your true IP address.