Most of the free proxies are Universities or Federal Agencies. Like Interpol, FBI, GRC, etc.. Don't ever use them, it's a hole. Your local ISP, assign you a IP, they know exactly, where you surf, inbound and outbound. The only thing they don't know, is what you doing/downloading/uploading. They only thing they have, is the size of the files and assume, based on the website your in.
I think that's an assumption or interpretation, pretty sure you can use a "pseudonym". You could always create a fresh account not using your existing account. You can also (or used to be able to) use a combination of gold to buy monero, (Or whatever anonymous crypto), cash out with a Visa GC (if payment can't be done w/crypto) then buy a vps elsewhere. I don't think I'd use Amazon at all.
@@Yvngsick What do you mean? That scenario? Like, who cares which name you use, they'll still find you if its important enough? Is that a newer iteration of the book?
@@YerBrwnDogAteMyRabit Not if you’re doing it right! They or whoever they are aren’t God and they don’t know or see everything. Facts! So get that out of your mind… Please do! We need to stop giving these human devils to much credit because they deserve none. But I don’t trust AWS period.
Also connect via free wifi with no cams around, PC which you bought on craigslist, don't use any existing accounts on that pc, etc, etc and you would still miss some gap 🙂
everything can be traced not just outbound but also inbound … all a vpn does is taking a side road to whatever website or service you try to connect to but any corporation that wants to know what you are doing can just track the package and not the ip addresses, AWS and all other cloud service providers do track your activities and if any government wants to they can just ask for those log files… there is no such thing as 100% private networking unless you are your own isp that changes Mac/dns and IP every single connection you make, every minute.
@@kuromiLayfe Interesting. So all this is rubbish in a round about way. Regardless of having the doors locked, the robber can break the windows and gain entry either way. Sounds like a night out in Liverpool. What about Tails and Tor on a USB stick? Is there a better chance of avoiding detection? If it's a secure as some suggest it could be the only way. My head hurts...
Sudo is pronounced {sue-dew} lol. I thought this was weird at first as well, until you realize the "do" is the word do. I think "su" stands for super user, but I could be wrong. Either way, in that example, it would be "super user do." Do as in the action, pronounced {dew}. Otherwise you're saying pseudo.
Thanks for the video. I hear that Tor encrypts traffic, but Proxychains dpes not. But due to malicious Tor nodes - as you pointed out - good to have other hops after the Tor exit node.
Hi Nour, Thank you.. Well structured for those that need and want to learn... I have favour for you. Can you do a video where you can show us HOW to Connect my Linux Server to this VPN? Cheers. I hit the subscribe button.
Just a question, why would you connect a server to a vpn? If it's your own server, with sensitives informations on it. You want to keep it secure, don't do anything with your server. Always surf on internet with your client/other pc that are connected with vpn/proxies. Connect to your server from your client, that's it. Servers should always be offline/localhosted or from secure tunnels with passwords.
Thank you for this great video ! Would it be possible to have more information about setting up an ipv6 VPN please ? I don't even know if it is possible with the basic AMI that is recommended in this video 🙂
Great content! Thanks for the tut but I have a question, my openvpn is not masking my IP do you know why? how can I fix this? my ISP is located in a restricted country
please tell how the performance is (like for youtube videos since we jump thru number of hoops to get to the end servers. Does Mozilla offer those proxy services for free?
This seems great, but why do I have to give so many details (inc bank) to this company? Seems like there will be an automatic renewal charging you if you forget, which is plausible. I feel there may be some incentive to get so many to sign up. Would be nice to give an unintrusive option too. Shame, as I was really getting into it, but something smells fishy. Usually, free VPN's can track your data, which defeats the object. Update: Okay, it's Amazon. So all should be safe. Gonna give it a go.
@Robert C. Christian Thanks for the advice Robert. I think I finally set up a hyper V VM. Literally trying now. It's a bit finicky. I'll eventually learn parrot security, but it's a great solution in the meantime. This dude on Chuck Network (YB channel. He's amazing) guides how to set up a VM outside of the OS, which is another level of safety. Pretty cool. Tails/Tor also seems like a good option when I have the security aspect down. Won't be doing nothing nefarious, other than taking down whole countries. Allegedly n that :-)
1:11 You talk about the isp but don’t your lan peers get first dibs on your traffic before even gets past the router? That’s what I’m most concerned about
idk man, im pretty sure you have to give personal info to sign up for aws; like a phone to verify, CC and address for biling, etc. and from all the hackers getting caught stories ive seen its this slip up thatll get you caught lol. so idk how totally anonymous this is
I don't think using aws with our credentials make us browse the internet anonymously, I'm here just for the VPN cuz to run apps that are banned in China 😅
oh yes hackers always register and sign in. that is the first thing they do. specially at large half goverment american sites that have spent decades on specializing identifying people. all other comments seemd too positive .. =)
@@BigNoiseyBoi to be fair, many hackers use amazon. either hacking someone else's account or buying one with stolen credit card. but video maker said no such thing, and i do not like this trend of modern white hat hacking putting innocent kids in jail just because they did not learn. a vpn used to be a proxy,, not some daft stupid modern buzzword tricking people into thinking "ooh now my internet is secure because, i pay for vpn,, when i pay i expect to be secure.. and the word vpn just SOUNDS so cool." its dumb.. its like cloud instead of servers.. stupid modern world.
"Amazing content"...yeah, there's an awful lot of BS comments that clearly show that the commentor is probably dude's cousin or buddy and has no idea what they're talking about.
Why are you surfing the internet from a business platform , I want to know to how block my IP from businesses servers surfing the internet to hack or to make connections to other businesses apps to aggravate customers( Parable) LIKE INCOMING CALLS BLOCKED
So , all of this comes for free ? How does using AWS in any way ,become free ? Is this the set up I should use if I want to deploy Kali Linux Tools on those hacksploit sites ? Yeah--I'm a noob , how did you guess ?
forget all about video buddy, this is how young people THINK they can hide, all they are doing are creating more relay's for them by using vpn and tor. vpn you have to pay for in 99% of cases, with a credit card, so that is stupid. tor is a goverment program, this is even more stupid. its "simple" ,, to have a secure proxy , you need to have a box you hacked already, and set that up to relay your data. not by any of the tools this guy use. ssh tunnels with free ssh software in kali will serve all your needs.
Amazon WILL for sure monitor and report any activity you do that is illegal. buying vpn is a really stupid thing to do for hackers. and the "proxychains in title are nothing but TOR,, TOR is a us goverment made program if you did not know...
Most of the free proxies are Universities or Federal Agencies. Like Interpol, FBI, GRC, etc.. Don't ever use them, it's a hole.
Your local ISP, assign you a IP, they know exactly, where you surf, inbound and outbound. The only thing they don't know, is what you doing/downloading/uploading. They only thing they have, is the size of the files and assume, based on the website your in.
Thank you. Best to find paid proxies. I think the free VPN from Amazon is not a good idea.
would you advise finding a group of people who have somehow made sure the proxies on a list isnt leaked like that? theres always a way right]
Ah yes, let anonymise our traffic buy signing up to AWS with our actual name.
I think that's an assumption or interpretation, pretty sure you can use a "pseudonym". You could always create a fresh account not using your existing account. You can also (or used to be able to) use a combination of gold to buy monero, (Or whatever anonymous crypto), cash out with a Visa GC (if payment can't be done w/crypto) then buy a vps elsewhere. I don't think I'd use Amazon at all.
@@YerBrwnDogAteMyRabit still bullshit read hitchhikers guide
@@Yvngsick What do you mean? That scenario? Like, who cares which name you use, they'll still find you if its important enough? Is that a newer iteration of the book?
@@YerBrwnDogAteMyRabit Not if you’re doing it right! They or whoever they are aren’t God and they don’t know or see everything. Facts! So get that out of your mind… Please do! We need to stop giving these human devils to much credit because they deserve none. But I don’t trust AWS period.
No shortage of weird-ass comments in this comment section.. seems like commenting solely for the sake algorithm movement..
This is the best video I’ve seen on this subject . You got a new subscriber 😊
Also connect via free wifi with no cams around, PC which you bought on craigslist, don't use any existing accounts on that pc, etc, etc and you would still miss some gap 🙂
A very professional video, keep up the great work :)
Great explanation! thank you for the lesson!
this guy is a real pro.
Amazing content and very well explained
Dude, love your content. Keep it coming!
Great, but what about DNS trace? Everyone talks about vpn, socks, tor , but everyone gets traced over not spoofed DNS requests.
Great video and very well explained. Keep it up!
عااش، سيبك من الموضوع، انت شرحك حلو ❤️
👍👍👍Great! Best video about to hide your ip!
I liked your videos. You can teach anyone very easy.
Please upload more content !!!!
Can you please make a video on how to capture that entry and exit nodes if someone is using tor
Thank you for tutorial !!! amazing!!!😮
Amazing Content!
What about your local ISP and the IP it assigns to your pc? If someone is monitoring that, your outbound connections can be traced right?
everything can be traced not just outbound but also inbound … all a vpn does is taking a side road to whatever website or service you try to connect to but any corporation that wants to know what you are doing can just track the package and not the ip addresses, AWS and all other cloud service providers do track your activities and if any government wants to they can just ask for those log files… there is no such thing as 100% private networking unless you are your own isp that changes Mac/dns and IP every single connection you make, every minute.
@@kuromiLayfe i checked so many clips and no one even mentioned DNS spoofing
@@kuromiLayfe Interesting. So all this is rubbish in a round about way. Regardless of having the doors locked, the robber can break the windows and gain entry either way. Sounds like a night out in Liverpool. What about Tails and Tor on a USB stick? Is there a better chance of avoiding detection? If it's a secure as some suggest it could be the only way. My head hurts...
Excellent video loved the content keep up the great work can you please do a update for 2023 in Australia
Thank you bro !
How can i prevent dns leak in ubuntu, i tried may solution seems not to work buffering @Nour's tech talk
i am Glad i found your channel its really helping me out with school also nice work
Sudo is pronounced {sue-dew} lol. I thought this was weird at first as well, until you realize the "do" is the word do. I think "su" stands for super user, but I could be wrong. Either way, in that example, it would be "super user do." Do as in the action, pronounced {dew}. Otherwise you're saying pseudo.
subscribed!
Nice. Once you hit the proxy chains you have something. 👍
yes great brother thanks for your tutorial this is veryl important
Thanks for this.
been looking for something like this, awesome
Thanks for the video. I hear that Tor encrypts traffic, but Proxychains dpes not. But due to malicious Tor nodes - as you pointed out - good to have other hops after the Tor exit node.
Really good! Thanks I learned a lot today
Plz vd for more advanced techniques for hide ip in real word and good work
How much does cloud service cost? I am disabled with little money. Thanks! Love your video!
pretty cool stuff!
3:13 what is terminal in folder what u mean? Please give me more detail what is here
Hi Nour, Thank you.. Well structured for those that need and want to learn... I have favour for you. Can you do a video where you can show us HOW to Connect my Linux Server to this VPN?
Cheers.
I hit the subscribe button.
Just a question, why would you connect a server to a vpn? If it's your own server, with sensitives informations on it. You want to keep it secure, don't do anything with your server. Always surf on internet with your client/other pc that are connected with vpn/proxies. Connect to your server from your client, that's it. Servers should always be offline/localhosted or from secure tunnels with passwords.
@nourtechtalk bro how can I configure openvpn in kali linux what can I do after 7:00 please reply
What softrware are you using to make your video?
Thank you for this great video ! Would it be possible to have more information about setting up an ipv6 VPN please ? I don't even know if it is possible with the basic AMI that is recommended in this video 🙂
Great content! Thanks for the tut but I have a question, my openvpn is not masking my IP do you know why? how can I fix this? my ISP is located in a restricted country
This is so helpful! thank you very much.
please tell how the performance is (like for youtube videos since we jump thru number of hoops to get to the end servers.
Does Mozilla offer those proxy services for free?
What about double vpn or multi hop ?
What OS are you using? Will this work on any OS?
No one ever mentions the fact that you take a massive hit on your bandwidth for said vpn services...
I'm confused when you start working in the terminal. How do I open a terminal in Windows?
Its a virtual machine running kali linux. I have a video on how to set it up 😁
You're my god today :)
This seems great, but why do I have to give so many details (inc bank) to this company? Seems like there will be an automatic renewal charging you if you forget, which is plausible. I feel there may be some incentive to get so many to sign up. Would be nice to give an unintrusive option too. Shame, as I was really getting into it, but something smells fishy. Usually, free VPN's can track your data, which defeats the object.
Update: Okay, it's Amazon. So all should be safe. Gonna give it a go.
@Robert C. Christian Thanks for the advice Robert. I think I finally set up a hyper V VM. Literally trying now. It's a bit finicky. I'll eventually learn parrot security, but it's a great solution in the meantime. This dude on Chuck Network (YB channel. He's amazing) guides how to set up a VM outside of the OS, which is another level of safety. Pretty cool. Tails/Tor also seems like a good option when I have the security aspect down. Won't be doing nothing nefarious, other than taking down whole countries. Allegedly n that :-)
Can this work with a payed vpn? This is really cool video.
great video however i am running linux and it is confusing af on linux to get it up and running past 6:45
help anyone?
It’s not letting me edit the text in terminal at socks5 bit. How do I get it to edit?
please how can I get Kali Linux installed on my MacBook Pro
Vmware
How much speed degradation per proxy?
1:11 You talk about the isp but don’t your lan peers get first dibs on your traffic before even gets past the router? That’s what I’m most concerned about
so when they notice all your trafic goes trough servers owned by the same person ...? what then ? amazon will rat you out in a seccond
The traffic is encrypted and AWS is just one step in this loop :)
idk man, im pretty sure you have to give personal info to sign up for aws; like a phone to verify, CC and address for biling, etc. and from all the hackers getting caught stories ive seen its this slip up thatll get you caught lol. so idk how totally anonymous this is
Aws is one of the steps in the pipeline that includes tor and other proxies :)
I don't think using aws with our credentials make us browse the internet anonymously, I'm here just for the VPN cuz to run apps that are banned in China 😅
Lotta hoops to jump through...😂
AWS offers free VPN for a year? Can that be renewed?
You can make a new account :)
oh yes hackers always register and sign in. that is the first thing they do. specially at large half goverment american sites that have spent decades on specializing identifying people.
all other comments seemd too positive .. =)
I was literally about to comment this.
@@BigNoiseyBoi to be fair, many hackers use amazon. either hacking someone else's account or buying one with stolen credit card.
but video maker said no such thing, and i do not like this trend of modern white hat hacking putting innocent kids in jail just because they did not learn. a vpn used to be a proxy,, not some daft stupid modern buzzword tricking people into thinking "ooh now my internet is secure because, i pay for vpn,, when i pay i expect to be secure.. and the word vpn just SOUNDS so cool." its dumb.. its like cloud instead of servers.. stupid modern world.
"Amazing content"...yeah, there's an awful lot of BS comments that clearly show that the commentor is probably dude's cousin or buddy and has no idea what they're talking about.
Why are you surfing the internet from a business platform , I want to know to how block my IP from businesses servers surfing the internet to hack or to make connections to other businesses apps to aggravate customers( Parable) LIKE INCOMING CALLS BLOCKED
some online gaming services will ban you if your ip and country dont match.
Make sure your logged in to Facebook before you begin
Bro where you learned these all things
How can i do this on windows?
Run Linux… lol
So , all of this comes for free ? How does using AWS in any way ,become free ? Is this the set up I should use if I want to deploy Kali Linux Tools on those hacksploit sites ? Yeah--I'm a noob , how did you guess ?
forget all about video buddy, this is how young people THINK they can hide, all they are doing are creating more relay's for them by using vpn and tor.
vpn you have to pay for in 99% of cases, with a credit card, so that is stupid.
tor is a goverment program, this is even more stupid.
its "simple" ,, to have a secure proxy , you need to have a box you hacked already, and set that up to relay your data. not by any of the tools this guy use.
ssh tunnels with free ssh software in kali will serve all your needs.
Great but very very complexe
Is there any risk that amazon is still going to monitor my connections?
Yeah but moving it away from your home and ISP might lower the chances
Amazon WILL for sure monitor and report any activity you do that is illegal.
buying vpn is a really stupid thing to do for hackers. and the "proxychains in title are nothing but TOR,, TOR is a us goverment made program if you did not know...
how to open the terminal
I know how to Ip grab for some reason
❤
You can do this with a vpn
👍
VPN is a tool access sites
TLDR method pls. Control panel/wizard? 🤗
Window proxy setup
On AWS ? 😂😂🤣🤣🤣🤣🤣
Amazon VPN server
that's EXACTLY what I was thinking as soon as he said "amazon". LMAO
Great, if you didn't copy Networkchuck's video word for word (in the first part in the video, with a few exceptions)
Really? That's disappointing.
There's a Colombian guy who copycats network chuck big-time, except for the coffee thing
you know that #aws will give your info to anyone that wants it you know that right?
put fake info?
In the words of the great urban poet chief keef...Nah!