#Discuss Tor's pre- and post-proxies

Hymnsin
·
·
IPFS
·

Tor is a common method used to obfuscate Internet trails. However, on the one hand, Tor is difficult to connect directly in mainland China, so you need to use some kind of front-end proxy to get out of the wall first, and by the way, it can prevent the ISP from detecting the Tor traffic sent from your home, so as not to cause unnecessary police uncles to you. Doubt; on the other hand, there are many websites that do not accept Tor traffic, or respond to access from Tor with a large number of verification code steps, which seriously affects the user experience, so it may be necessary to use some kind of post-proxy behind Tor to avoid the characteristics of Tor access .

So, on Windows/macOS/Linux, how to configure Tor's pre- and post-proxies respectively? How do different proxy methods differ in terms of convenience and security? It seems that this topic still lacks Chinese and targeted discussions for the special network conditions in mainland China. I hope everyone can brainstorm and come up with excellent solutions.

CC BY-NC-ND 2.0

Like my work? Don't forget to support and clap, let me know that you are with me on the road of creation. Keep this enthusiasm together!