• Tor browser - what it is and how Tor allows you to hide your online activities. Chameleon - free anonymizer for VKontakte and Odnoklassniki Chameleon anonymizer login without restrictions VKontakte

    Quite often it turns out to be impossible to get into contact in the usual way. A common option is that the system administrator at your work has blocked access to social networks. What to do in this case?

    You can use workarounds. Now I'll show you How can I log into VK through an anonymizer or a mirror?.

    Contents:

    How to log into your VK page

    I remind you that you can log in from the main page, accessible via the link:

    https://vk.com

    If you open it, you will see forms for entering personal data on the left.

    When you enter your username and password (see), click the “Login” button. If the details are correct, you will be taken to your page.

    You may find it useful: .

    How to log into VK through an anonymizer

    Anonymizers are special services that allow you to hide information about the user when working on the network. They are often used as intermediate points when trying to access a website.

    The technology will allow you to hide your real address, which ensures bypassing blocking. Thus, you can try to access a social network, even if you have been blocked.

    All anonymizers work on a similar principle, so choose any one. Finding them is not difficult - just use the search engine (see).

    I'll show you how it works based on the service:

    https://raskruty.ru/tools/anonymizer/

    But pay attention to the address bar. It will not contain the usual contact address, but the URL of the anonymizer through which you gained access.

    How to enter VKontakte through a mirror

    https://cameleo.ru/

    Here you also need to enter the address of the site you are trying to access. When you enter, press the “Go” button.


    Rating: 4.1 out of 5
    Votes: 11

    On July 30, 2017, Russian President Vladimir Putin signed a law prohibiting in Russia the use of technologies for accessing blocked sites, that is, anonymizers and VPNs (Federal Law of July 29, 2017 No. 276-FZ “On Amendments to the Federal Law “On Information, Information technologies and information protection“) In other words, anonymizers and VPN services are prohibited from providing access to sites blocked in Russia by a court decision or Roskomnadzor.

    
    Chameleon(cameleo.ru) - a free anonymizer, a service for visiting blocked sites VKontakte, Odnoklassniki, etc. Very often, Internet users have problems accessing popular sites. The causes of problems vary, from sites being blocked by viruses through a file, to access to entertainment sites being disabled in offices. To bypass all these restrictions, you can use a special service - Chameleon. In order to access any site through an anonymizer, just enter the site address and press the GO button. For greater user convenience, Chameleon offers a quick links option. To go to the desired site, you just need to click on the link with its name. The service's quick links include the following sites: odnoklassniki.ru, vkontakte.ru, dating.ru, loveplanet.ru and mamba.ru.

    What is an anonymizer? This is a special service (site) that allows you to anonymously visit any site. The connection to the desired site is not carried out directly, but through an anonymizer. In this case, from the point of view of the virus or the administrator, you are not viewing VKontakte or Odnoklassniki, but the anonymizer’s website.

    Below you can watch a video about how to use these services (using the Chameleon site as an example), what they are, and how to find them on the Internet.

    Review address:

    Comments and reviews: 25

    1. Oleg 15.05.2011
    Anonymizers are sometimes very helpful, but I still wouldn’t take their use so lightly. All data you receive through anonymirez goes through it. And these are your passwords and personal correspondence, etc. Who creates them and why is the question.

    2. Dmitry 23.05.2011
    Administrators are not fools; when looking at logs of sites visited, they will quickly notice that the same site is visited frequently. Having visited the site, the administrator quickly figures out what it is and why they use it. So you won’t be able to use the same anonymizer for a long time. But the good news is that there are many such services.
    As for viruses, many of them, in addition to blocking VKontakte, also block some popular anonymizers.

    3. Tftyana Kochergina 02.06.2011
    I was hacked and I have a lot of personal information there, please send me the password so that I can go there again! Thanks in advance!!!

    Answer:
    There, there... not very informative.
    If you have been hacked, use the password recovery system that is available on any normal website. In any case, only the support service of the service you are using will help you restore access.

    5. Svetlana 04.08.2011
    I also sometimes use such anonymizers at work, but after using them I often can’t log into my page and it shows that my profile is temporarily blocked! Now I am tormented by the question, can my page be hacked after visiting through an anonymizer?

    Answer:
    If you use normal Anonymizers there will be no problems. But do not forget that all your personal data is transmitted through Anonymizer, so you should not abuse it.

    but after them I often can’t access my page; it shows that my profile is temporarily blocked!

    Did you happen to download anything to your computer before?

    6. Lyudmila Shirnina 07.08.2011
    I can't access the page

    Answer:
    Which page of cameleo.ru anonymizer?

    7.melani 30.08.2011
    Tell me, I wanted to add photos to Odnoklassniki, but I can’t, what should I do?

    8. Elizabeth 31.08.2011
    What to do if the "Filter Avoidance" web category is blocked? how to get in touch now???? =)

    9. Katerina 04.09.2011
    Please give me a list of various working anonymizers for logging into the site vkontakte.ru, since chameleon was blocked a few days ago.

    I really suspect that many of them are not working. Check

    Alternatively, you can try a good, time-tested anonymizer http://hidemyass.com
    True, he is very famous and many straightforward admins know about him.

    11. Sveta 14.10.2011
    After Chamelenon, when you log in “in the usual way” to contacts and classmates, a window appears asking you to indicate the phone number to which the SMS code will be sent (megaphone is not supported). What to do? How to disable?

    12. SolodovNik 14.10.2011
    A couple of days ago I tried to log into VKontakte through the Chameleon anonymizer (cameleo.ru) and saw the following message:

    "You are trying to log in as *** from an unusual location.

    To confirm that you are indeed the owner of the page, please provide the last 4 digits of the phone number to which the page is linked."

    Then I tried to log in directly through the website Vkontakte.ru, I logged in normally. I actually have a phone number linked to my account.

    Sveta, most likely your number is not linked and the contact is asking for it as protection. After all, hackers, in order to cover their bottom, try to act through all sorts of proxy servers and anonymizers. You just need to link your number, it's free.

    Although of course the logic of VKontakte is strange. You never know where the user can come from, it’s his business. Apparently the contact is able to determine that they came from an anonymizer, and not just from another computer, and he doesn’t like it.

    13. Inga 21.10.2011
    I can’t open classmates with photos on the page

    15. Olya 13.11.2011
    I can’t send photos to VKontakte. They won’t load, please tell me what to do?

    16. rus 36 13.11.2011
    After using Chameleon, it is better to change the password right away... why? This is already clear, free cheese only.

    17. Mikhail 29.01.2012
    The protection doesn’t even allow the chameleon(((what should I do?? I tried other programs, it doesn’t work...
    Access denied.
    Setting up access control does not allow you to fulfill your request.
    -that's what he writes...

    Answer:
    Chameleon is a very famous anomizer. Administrators know about it. The solution is to use lesser-known services (at your own peril and risk), or use paid services on the “Access Is” website.

    18. Denis 22.02.2012
    I can’t listen to music from a contact, it won’t play, tell me what to do

    Answer:
    You cannot watch videos or listen to online radio or music through the anonymizer. It loads the page, but does not broadcast its media content, since it simply cannot cope with such a volume of traffic.

    19. Valeria 25.02.2012
    I can’t log into my contacts and classmates as soon as I start entering my login a sign pops up
    Account Validation
    Enter your phone number.
    Phone number: +7

    Your phone number is needed so that we can send you a confirmation code and make sure that you are a real person!

    VKontakte guarantees that information about your number will under no circumstances be disclosed or transferred to third parties. This measure was taken in order to protect users from automated spam bots.

    Having access to the specified number, you can always recover the password to your page.

    The service is not available to Megafon subscribers in some regions.
    What should I do

    Answer:
    1. Make sure that you are offered to enter the number on the VKontakte website, and not on a similar one.
    2. Link your phone number to the profile, there are no other options.

    20. Byafya 02.07.2012
    Tell me how to disable the aninomizer on your phone, otherwise it’s eating up a lot of money

    Answer:
    Here we describe a site that provides anonymizer services absolutely free.

    Apparently you used some kind of service that charges money for its service (subscription to a service via SMS). Find the user agreement on the site whose services you used (usually in small, inconspicuous font at the bottom) and read it carefully, everything should be written there.

    P/S
    Never list your mobile phone numbers on websites offering services. 99% that you will be signed up for a paid service.

    21. Karina 15.08.2012
    I can bet. You can leave your phone number. As soon as you receive the code, enter it where necessary and that’s it. Then we call the operator and tell them to turn off the “short number” service.

    22. Roman 20.09.2012
    Anonymizers are both useful and safe. The second, of course, does not apply to all anonymizers, but only to those that you install yourself on your own hosts. For example, I did exactly this - I installed an anonymizer on my website and calmly use it.

    Answer:
    Not everyone, not everyone, has knowledge of how servers and server scripts work. For many people, a regular line in the hosts file containing the command “vk.com 127.0.0.1” is an insurmountable barrier to accessing the VKontakte website.

    23. Yayaya 22.09.2014
    all these anonymizers are bullshit, they won’t let you into any of them

    24. Vlad 18.03.2016
    Who knows for 100% - Gebnya can figure out the user if he uses the chameleon cameleo.RU?43

    Answer:
    http://cameleo.ru/terms.html - Terms of use of the service

    The rules are very simple:
    The service is NOT intended for:
    - DoS attack
    - Hacking sites
    - Publishing messages that defame others
    as well as for any other activity that violates:
    - Laws of the Russian Federation
    - Rules of the site you are viewing

    If these rules are violated, we reserve the right to disclose information about the violator at the request of law enforcement agencies or the injured party.
    By using this service, you agree to comply with these rules.

    25. Alexey 14.09.2016
    I went to Diaccess today and saw the following message:
    ---
    Resource is blocked
    Sorry, but requested content was blocked.
    ---

    I don’t understand why he was blocked? This is not a torrent site or a political portal. Just a harmless service that sometimes helped a lot.

    Using this article, you can access a blocked site through an anonymizer in just two clicks. This method is the best because you only need to enter the domain of the blocked site, and the online program will do the rest.

    What is an anonymizer

    This is a computer program or script for browsers. The whole point is that Roskomnadzor blocks sites for Russian IPs. That is, in Russia, if you go to a blocked site, you will not be allowed in, but a user from France, with the IP of that country, can easily access this resource.

    So the anonymizer changes your IP to some other non-Russian one. And then everything becomes in order and you can come in freely. Another question is if the hosting has blocked the site, then no anonymizers will help.

    Popular anonymizers

    I will analyze the three most popular anonymizers at the moment that I use myself. I will experiment on two sites that are currently blocked.

    1. new-rutor.org is my favorite torrent tracker
    2. nnm-club.me is a cool portal with a large library of files and articles.

    To bypass this lock you need to use one of the methods, I choose an anonymizer.

    Access a blocked site using the anonymizer proxfree.com

    The easiest way for everyone is to access a blocked site through the anonymizer proxfree.com, all attempts were successful. In order to open a blocked site, go to proxfree.com and enter the domain name and click proxfree.

    After clicking, the server will connect its fake IPs and successfully access the site. Since the tool is free, it inserts its own advertisements, don’t worry, everything is fine.

    Second unblocksit.es

    The domain zone unblocksit.es is not Russian, but the site is in our language. Everything is the same, go in, enter the domain, check the “I’m not a robot” checkbox and unlock.

    Third cameleo.xyz (chameleon)

    The most famous is cameleo.xyz. It doesn’t work well, I only logged into Rutorg the fifth time. Go ahead and enter the domain in the field.

    Then you can freely browse the site. It works very poorly and not always; this anonymizer is more suitable for social networks, for example, Odnoklassniki, logging in under the guise of another person with a different IP.

    These three sites are still working, they are very often blocked, so I will supplement the article with new ones and delete old ones.

    So you have learned how to access a blocked site through an anonymizer in three ways, and absolutely free. And also a video, watch the lesson.

    Hello, dear readers of the blog site. You probably know that any of your actions on the network (website pages viewed, files downloaded, videos watched) can be tracked, and from completely different places (by contacting your Internet provider, rummaging through your computer, or searching in the logs of the sites you visited ). Anonymity on the Internet exists only if you don’t start “digging deep.”

    There are some solutions to the “leaving trace problem” that we have already covered. For example, you can and then no traces of your visits will be saved on your computer. Or, for example, when blocking access to some sites (for example, to log into Contact or Odnoklassniki from a work computer).

    But there is a much more comprehensive solution - this is the so-called TOR. Essentially, this is software that, with a very high degree of probability, allows you to hide from prying eyes everything that you do and have done on the Internet. It’s precisely on the basis of this technology that it works Tor Browser, which will be discussed today. Essentially, it wraps complex technology in the shell of a normal-looking browser, accessible to any Internet user, which everyone can use. But its filling is unusual...

    What is TOR?

    I don’t want to overload you with technical terms and concepts that, by and large, will be superfluous. I’ll just literally outline in a nutshell (on my fingers) the principle of operation of the Tor technology and the Tor Browser built on its basis. This knowledge will allow you to understand what to expect from this software, what strengths and weaknesses it has, so that you can consciously use it for your needs.

    So, initially all this was brewed in one of the US military departments. History is silent about why they needed this, but at the beginning of the 2000s, the beginnings of Thor technology were completely unexpectedly made available to the public. Moreover, the source codes were open and this software became freely distributed. What does it mean? And how much can you trust such a “gift”?

    The question is fair, but you can trust it precisely because the code of this technology is open. The fact is that since then (over a decade and a half) these program codes have been studied (and made changes) by hundreds, if not thousands of people who understand this, and no “bookmarks” or “secret doors” have been found. Where it's about safety(in our case, transfer and storage of information), it is better to work with open source software (software).

    By the way, this is why when choosing n, but for . They simply belong to the category of free software and their code has been checked by thousands of competent specialists. It’s somehow calmer, because I store a lot of passwords for services tied to money and losing them would be very expensive.

    So, TOP technology allows you to access websites and download something from the network without leaving any traces behind. That is, when you open, for example, a website through Tor Browser, it will be impossible to track your computer’s IP address on this website (and therefore to identify you). Even your Internet provider will not understand (even if you want) that you visited this site (and it will be impossible to prove it). Well, the browser itself will not store all traces of your wanderings on the Internet.

    Wonderful, isn't it? I understand that in this way people can cover up their dark affairs. Not without this, of course. But the general idea of ​​Thor is still bright - to provide the Internet user with real freedom in the form of complete anonymity. For example, in some countries access to certain resources may be blocked without justification, but Tor Browser will allow you to bypass these obstacles and not be punished for this violation, because they will not know that you did it (or will not prove it). But that's not the point...

    How TOR works? This is called onion routing. Look. There is a network of nodes owned by adherents of this technology. Three arbitrary nodes are used to transmit data. But which ones? And this is precisely what no one knows.

    The Tor browser sends a packet to the first node, and it contains the encrypted address of the second node. The first node knows the key for the encryption and, having learned the address of the second, forwards the packet there (it’s like removing the first layer of an onion). The second node, having received the packet, has a key to decrypt the address of the third node (another layer has been removed from the onion). Thus, from the outside it is not possible to understand which site you ended up opening in your Tor Browser window.

    But please note that only the path is encrypted(routing), and the contents of the packets themselves are not encrypted. Therefore, to transmit secret data, it would be better to first encrypt it (at least in the TruCrypt mentioned above), since the possibility of intercepting it (for example, using sniffers) exists.

    In addition, this technology there are a few more disadvantages(or features):

    1. Your ISP (or anyone else who monitors your traffic) may realize that you are using Tor. He won't know what you're watching or doing online, but sometimes the mere fact of knowing you're hiding something can have consequences. Take this into account and, if possible, study ways to enhance camouflage (and they exist), if this is critical for you.
    2. The TOR network does not use special high-speed equipment, but, in fact, ordinary computers. This brings up another drawback - speed the transmission of information in this secret network can vary significantly and sometimes it is clearly not enough for, for example, viewing media content.

    Where can I download the official Russian version of Tor Browser?

    On this blog I have already published an article on that. There was also mention of the Torah. Naturally, it is better and safer to download any product from the developers’ website, i.e. the official one (I think you know). The Tor Browser download page is located at this address (I repeat once again that for security reasons it is better to download from the official website):

    Please note that before clicking on the download button, you must select a language. The default is English, but you can select a dozen more options from the drop-down list, including fully localized Russian version. This is how it will work more pleasantly when the interface language is native.

    Although, during installation you will again be asked about your preferred interface language and you can also select Russian there. Otherwise, the installation process is no different from installing any other browser.

    However, when you first launch you will be asked if you need to make additional settings to connect to the TOR network. In the vast majority of cases, it will be enough to simply click on the “Connect” button:

    It will take some time for the browser to successfully connect to the Tor network:

    After this, a window will open in a browser that looks normal at first glance, but works with the Internet by creating encrypted tunnels (analogues).

    However, the developers themselves emphasize that Thor is not a panacea(at least with default settings). Therefore, those who are paranoid about absolute anonymity are advised to follow the link for clarification on this matter.

    How to use the Tor browser?

    When you first load the browser, you are immediately prompted use anonymizer to search at disconnect.me. Actually, it is this service that will be used as “ ” in this browser (you can change this in the settings), i.e. when entering a request in newly opened browser tabs or when entering it through the address bar in any tab, the disconnect.me anonymizer will open with search results.

    The search is actually conducted by Google (you can select from the settings in the top panel of the service - see the screenshot below), but no traces of who exactly conducted the search remain (remember, I wrote about the fact that, but in fact, nothing can be permanently deleted , so those who are concerned about anonymity need to remember this).

    Don't forget also select search language(in the top panel of the disconnect.me window on the right), because thanks to the anonymizer, Google will not be able to recognize your preferred language automatically. Although, by choosing, for example, Russian, you to some extent lift the veil of secrecy about your incognito for this search engine. But here you need to make a compromise - either convenience, .

    Yes, the Tor browser will also warn you when you first click on the link that it is better to load pages in English, to avoid, so to speak.

    Personally, I chose the “No” option, because convenience is more important to me, and I don’t speak any other languages ​​besides Russian. Alas and ah.

    By the way, you can check it yourself that you have indeed been “encrypted”. To do this, it will be enough to go to the site from any other browser, and then do the same from under Thor. As you can see, TOR replaces (I became a sultry Norwegian) and this is only a small part of protecting your anonymity.

    By the way, if you click on the onion to the left of the address bar, you will be able to see the same chain of three nodes (proxy) that separates your computer from the site you are visiting (I wrote about onion routing just above):

    If desired, this chain of nodes can be changed. You can also change your “browser-created personality” if you don’t like the current one. However, this will close all open tabs in Tor and it will be automatically reloaded.

    Here you can also access security settings:

    By default, all privacy settings (anonymity are enabled), but the security level is at the lowest level due to the fact that only in this case you all functions of this browser will be available. If you set the security settings of the Tor browser to “high”, a whole bunch of browser functions will be available only after you force them to be activated (i.e., everything is disabled by default). For me this is overkill, so I left everything as it was, but you can choose something in the middle (compromise).

    Otherwise Tor Browser is similar to Mozilla Firefox, because it is essentially assembled on its basis. This will be clearly visible when you go to settings (by clicking on the button with three horizontal lines in the upper right corner):

    Good luck to you! See you soon on the pages of the blog site

    You might be interested

    Incognito - what is it and how to enable incognito mode in Yandex browser and Google Chrome
    Search and browsing history in Yandex - how to open and view it, and, if necessary, clear or delete it How to make the main page of Yandex or Google the starting page, as well as set any page (for example, this one) as the home page
    How to install WhatsApp on a computer - PC version and use WhatsApp Web online (via a web browser) How to install Google Chrome, Yandex Browser, Opera, Mazila and Internet Explorer on your computer for free What is VPN - purpose, principle of operation and advantages of VPN

    Thousands of anonymizers that have spread throughout the RuNet space were created for fraudulent purposes. First, they will help you log into the social network page, and then they will demand money. Most often, there will be requests to send SMS or messages will begin to be sent from the phone number entered during registration. There are sites that put the phone number in their software and collect the funds themselves.

    When you click on them, you will be logged into vk.com.

    Risks when using unverified anonymizers

    If after a query in search engines you go to unverified and a shareware anonymizer, then your VKontakte account will probably be stolen. There is also a risk of losing money on your mobile phone account according to the scheme described above. Logins and passwords will be stored in the own database of such sites and can be used later, so as not to arouse suspicion for the source of what is happening. That's why should be vigilant and careful when using such unverified services.

    Safe use of the anonymizer site

    One way to access a page through a secure anonymizer site is presented in the article.

    Using a secure and trusted proxy server

    If the mobile version and the above are not suitable (for example, the sites are blacklisted by the system administrator at work), then you can use proven and secure anonymous proxy servers.