MTProTOR

Tor Anonymizing Stealth Proxy for Masses

This git repo with docker-compose config setup will allow you to connect to a Telegram over Tor Anonymizing Proxy using excellent mtg:2. It uses iptables to block and redirect all traffic accordingly via TOR.

It will allow you to:

  • expose a stealth and secure telegram proxy for a large group of people
  • originate on telegram servers from one of the tor exit nodes. Be nice because telegram does not run tor hidden services so you are at mercy of tor exit node operators.
  • hide the fact of using telegram
  • hide the fact of using tor, usually you would have to configure telegram client to connect directly to TOR socks port exposing tor usage to your local ISP
  • chose your desired exit geo location (adjust torrc config to set exit node ExitNodes {GB})

Features

  • Enforce all traffic via tor
  • DNS-over-HTTPS via Cloudflare TOR hidden resolver instead of TOR’s built-in DNS mechanism which can be insecure.
  • Replay attack protection
  • Domain fronting
  • FakeTLS implementation - by default appears as “storage.googleapis.com” domain name for standard ssl clients
  • Further proxy chaining
  • FireHOL blocklists