K7

K7Blog

须知少年凌云志 曾许人间第一流.
proton
telegram

Highly Anonymous Internet Access Solution

Why do we need anonymous internet access? In today's highly developed internet, user privacy is just talk.
No matter what industry we are in, we should protect our IP address to prevent malicious activities.

https://img.k7blog.com/i/2023/01/03/immsjv.webp

The application scenario here is that I am an internet worker, and while protecting myself on the internet, I also separate my normal life from the internet.
We can prepare some tools to work together to achieve the highest level of anonymity, such as VPN, jump server, Tor browser, residential IP, etc.

VPN#

This is the simplest and fastest anonymous method, whether it's a foreign VPN, an airport, or a self-built one.
The threshold is low, but there is only one layer of proxy. The traceable path is VPN-local network.

vpn

If you just want to speed up your return to China or watch videos, do academic research, etc., it's still very good.

Tor Browser#

Tor browser is very well-known in anonymity: https://www.torproject.org/zh-CN/

tb-11-browser

But currently, it is unable to be used normally in the domestic network environment. The speed of proxying Tor traffic with a VPN is average.
It's not that it can't be used, it's just a little slower.

So the current traceable path for us is Tor bridge-VPN-local network.
Of course, this is just one way to use it. We can also use a jump server to set up a network relay and control server to use Tor browser.

Jump Server#

For information on setting up a jump server, you can refer to my article Next Terminal Lightweight and Easy-to-use Jump Server System, Really Elegant!

local

Of course, after setting up the jump server, you can't just use it with peace of mind. It is just a transit solution.
Currently, the commonly used solution is to use VPN to control the jump server and browse the internet through a remote Windows server.
Of course, the jump server can also be a Windows server directly.

The traceable path when using a jump server is: Windows server-jump server-VPN-local network.
Of course, we can also create a gateway in the jump server's system and use another server for link relay.
In this case, it would be: Windows server-intermediate server-jump server-VPN-local network.

Residential IP#

Currently, residential IPs are all overseas IPs and cannot be used within the Great Firewall. To achieve anonymity, residential IPs must be exposed at the outermost layer.
And the IP country and province are all in the same city, making it more like you are abroad.

The limitations are relatively small, and it can only be used in conjunction with a jump server.
Local VPN controls the jump server, the jump server connects to a remote server, and the remote server uses the residential IP for internet traffic.
Compared to using VPN to control the jump server and browsing the internet through a remote Windows server as I mentioned above, the advantage of exposing the residential IP to the outside world is much greater, making it more like a real person.

Summary#

Among the four anonymous methods mentioned above, except for residential IP, the others can be used in combination.
I will list a few scenarios directly (ranked by anonymity level):

  1. VPN-Internet
  2. VPN-Win Jump Server-Internet
  3. VPN-Tor Browser-Internet
  4. VPN-Jump Server-Windows Server-Internet
  5. VPN-Jump Server-Residential IP-Internet
  6. VPN-Jump Server-Gateway Relay-Windows Server-Internet
  7. VPN-Jump Server-Windows Server-Residential IP-Internet
  8. VPN-Jump Server-Gateway Relay-Windows Server-VPN-Internet
  9. VPN-Jump Server-Gateway Relay-Windows Server-Tor Browser-Internet
  10. VPN-Jump Server-Gateway Relay-Windows Server-Residential IP-Internet
Loading...
Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.