Chains of anonymization


D2W_OS developers have developed 4 types of anonymity chains. To hide your real IP address from websites and ISP.

Your internet connection will match the selected circuit

chain.png

Client → TOR → VPN → Internet

The Client → Tor → VPN → Internet chain is used when it is important to hide the TOR exit node from the site. For example, some sites either do not allow users with Tor's output IP or torment the user with an endless captcha.

Pros:

Minuses:

*Recommendations: use a VPN up to the chain additionally. For example, built into the router.

Client → VPN → TOR → Internet

The Client-VPN-Tor circuit is used when the fact of entering an encrypted connection needs to be hidden from the ISP. The network is easily controlled by the user at the entrance, which allows you to connect KillSwitch and not allow traffic to leave the user's device

Pros:

Minuses:

*Recommendations: in order for the target site to give access and not see the fact of using TOR on the exit, we recommend connecting a proxy

Client → TOR → Internet

Tor (literally "onion router") Tor has layers of privacy similar to the layers of an onion, hence its name. The more Tor users that use these servers, the more hidden your traffic becomes. These levels of protection are created by a labyrinth of intermediate relays (middle relay), end relays (end relay) and bridges (bridge).

Pros:

Minuses:

Client → VPN → Internet

VPN technology (virtual private network, from the English. Virtual Private Network) will not only allow you to access blocked content, but also protect you and your Internet connection.

Pros:

Minuses:

When you start the OS, the connection to the Internet will be carried out with the chain you have already installed, which significantly reduces the leakage of your real IP address.