I have read alot of bad guys putting up http proxies so i would not recommend useing a public one, here is some cool research https://www.youtube.com/shared?ci=RlSbpVz3RsM
Laura Sharpe <laurasha...@mailbox.org> skrev: (14 oktober 2016 14:20:00 CEST) >Is it secure to use Tor with HTTP proxies? Like this: > > >Use proxychains and in /etc/proxychains.conf use: > > >[ProxyList] > ># defaults set to "tor" > >socks5 127.0.0.1 9050 > > >In "standard" Firefox (not the TBB) set Manual Proxy Configuration to a >HTTP proxy and use the same proxy for all protocols. Make sure Remote >DNS is ticked. > > >Assume that the HTTP proxy is legitimate. > > >From the command line run: > > >proxychains firefoxhttp://www.example_site.com/ > > >Traffic will be routed by proxychains through Tor then is transferred >through the HTTP proxy. > > >You may say that this is a bad idea since HTTP works at the application >layer and hence traffic can be intercepted by the provider of the HTTP >proxy (unlike SOCKS proxies which work at the transport layer (I >think)). But if the traffic from the user is always to a HTTPS site, >then why should there be a problem even if the content was intercepted? > > >I know that you can also use proxychains with SOCKS proxies but my >questions is specifically about using proxychains with HTTP proxies. >-- >tor-talk mailing list - tor-talk@lists.torproject.org >To unsubscribe or change other settings go to >https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk -- Sincerly Flipchan -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk