David Bombal cover image

#425: How to be Invisible Online (and the hard truth about it)...

David Bombal

00:00

How to Use Tor as a Proxy Chain

Using Tor as our proxy chains, we can get around the NSA's ability to hack computers. We'll see how this works by setting a number of variables such as port numbers and username and password. Once you set those major settings, go ahead and save and then close it. And now what you need to do is to go ahead and start Tor.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app