Am I being silly?

DO NOT DO THIS i ENDED UP DOING SOME READING AND IT POSES A SECURITY RISK SEE BELOW THIS POST.

Played with some settings in my tor browser last night and this is what i came up with.

I think this is how it is working
Use a socks 5 proxy which also uses Tor
use a bridge
then to the browser through Tor again

And I thought about first going through porxychains before the Tor proxy lol but thought that was ridiculous.
LOL

It sounds funny if you think about at least I thought it was.
Slowed me down a little.

Who else besides me thinks this is overkill and hilarious since I am not using tor browser for anything shady but only to hide from website tracking.

Trying to think of way to get it all to show me the hops to see if it is really working the way I want it to.

1 Like

The problem with doing this is that it could break your anonymity.
Poses the chance of getting the same hops from each one also.

I suppose it may be able to be done if you planned out your route and set it but still it is a ridiculous idea and there is no reason to do so.

Better thing to do would be use proxy chains through a tor client(not the browser)running as your proxy with Firefox and then setup a dynamic chain that runs after you are connected to the tor network.

I have found though that some socks5 proxies won’t accept connections from tor exit nodes.