Virtual Private Network (VPN)
From BC Wiki
ssh -D 12345 bc chromium-browser --proxy-server="socks://localhost:12345" --host-resolver-rules="MAP * ~NOTFOUND , EXCLUDE localhost"
Verify that it's working:
GPG over SOCKS Proxy
- http://quack1.me/gpg_proxy_socks-en.html (didn't work for me)
- https://sourceforge.net/p/enigmail/forum/support/thread/5636959c/ (someone with the same issue)
o as a pointer to others with a recent gpg version and linked against curl (with Debian or Ubuntu package gnupg-curl) - this should be safe for use with Tor: gpg --keyserver-options http-proxy=socks5-hostname://127.0.0.1:9050 --search jacob at appelbaum.net I haven't yet found a machine where it worked but in theory it should work and not leak DNS. I'd still think a patch to set --socks-proxy=127.0.0.1:9050 would be useful as we could ensure SOCKS is actually in use or able to be used at all.
try tsocks, proxychains?
sudo -H gedit /etc/profile.d/proxy.sh export http_proxy=http://username:password@proxyhost:port/ export ftp_proxy=http://username:password@proxyhost:port/ export telnet_proxy=http://username:password@proxyhost:port/