How to hide your IP ? Tor is one of the best freely available network to protect your identity. Its considered safe because of its highly cryptographic data transfer methods. We are not going to explain working of TOR in detail, if you are interested we highly suggest you to read the following article on how to change Tor Exit Node manually.
TORPHANTOM MAIN FEATURES
1. Routes all traffic
TorPhantom can route all the network traffic through TOR network and hide your IP. Every single application that tries to connect Internet will go through TOR network. No single ping will be leaked out, thus protecting your identity. Normally most of us use Proxychain or similar application to route the traffic for a specific application.
The problem is some application tends ignore proxy for much faster connection which can leak out sensitive information thus revealing your original identity or location. TorPhantom can prevent you from this worst scenario. TorPhantom set up a certain rules in iptables to route all outgoing connection though a certain proxy port. It also reject some sensitive incoming and outgoing request which may leak your original ip address.
2. DNS leak protection
Furthermore, DNS leak one of the serious issue in network security that most of us don’t know. Government organizations hunt down most of the hackers using this vulnerability. No matter how safe you encrypt DNS leak is a serious issue.
Torphantom have a solution for that too. It can use a remote and anonymous DNS server to resolve hostname unlike other unsafe applications that uses DNS provided by your ISP.
DOWNLOAD AND INSTALL TORPHANTOM
Open the terminal and follow the commands.
git clone https://github.com/3ndG4me/torphantom cd torphantom
Current Mac OS version does not route ALL traffic through TOR. The current configuration only routes MOST traffic through TOR via socks5 proxy. Any applications not configured to use this proxy such as a curl call with no proxy flags, will not go through TOR.
There is currently no way to fix this, as an equivalent to iptables no longer exists on Mac OS. Be sure any applications you are using while running TorPhantom are configured to use your proxy settings by default.
cd Linux chmod +x install.sh ./install.sh
cd Linux chmod +x install-pac.sh ./install-pac.sh
cd Linux chmod +x install-rpm.sh ./install-rpm.sh
Install Mac Ports
cd macOS chmod +x install.sh ./install.sh
INITIALIZE TOR SESSION
First of all you will need to find out what is the label of your network adapter. In order to do so, simply invoke the below command in your terminal.
In our case and for the purpose of this demo, the label used by our network adapter is refered "wlp2s0".
sudo torphantom start -i
STOP TOR SESSION
sudo torphantom stop
If you have any questions about this article or if you want to share your thoughts with us, please feel free to do it using the below comment form.