this post was submitted on 13 Nov 2025
133 points (98.5% liked)
Linux
59590 readers
779 users here now
From Wikipedia, the free encyclopedia
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.
Rules
- Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
- No misinformation
- No NSFW content
- No hate speech, bigotry, etc
Related Communities
Community icon by Alpár-Etele Méder, licensed under CC BY 3.0
founded 6 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
You could rent a VPS in a neutral country and use ssh to create a SOCKS proxy to it, then use foxyproxy to add the proxy to firefox/librewolf/whatever and either allowlist certain sites you don't want your country knowing about or denylist websites you don't care if your country knows about (especially higher bandwidth sites that aren't controversial like YouTube).
At that point you'd have plenty of "real" traffic from the unproxied websites and any traffic the rest of your OS is using, and when you access the proxied sites you want to hide it'll look like you're using ssh and/or scp.
You could also create a proxy server with a tor connection on the server and use ssh port forwarding to access it locally. The Mullvad browser + foxyproxy would probably be your best bet for using that since it's basically tor browser without tor.
EDIT: Additionally, if you wanted to proxy an application that doesn't support SOCKS internally, you can configure proxychains with the proxy and then launch
proxychains applicationname.This, but I'd use separate browsers to keep seperate digital fingerprints. Otherwise your ad trackers would know it's the exact same person going to site a directly and site b indirectly.
Also worth noting that Facebook has a back door on its mobile app, that keep listening on some port. When you use certain apps with meta code ( could be a newspaper that monetizes with Facebook ads ) or websites with meta code ( same "newspaper"), those apps/websites send your ad tracker id directly to Facebook app through that port. This de-anonimizes the shit out of your "anonymous" ad IDs. Other techniques rely on lots of data points and some degree of guessing, but this ways it's mercilessly effective and accurate.