Hi digitalpoint! Here's how I set up my secure HTTPS proxy over a coffee break - and why it might be important for all of us. Let's get to the bottom of it! In our world where online privacy is becoming more and more valuable, an HTTPS proxy is like your own personal digital bulletproof vest. ️ From bypassing geoblocks to protecting your data from prying eyes, the benefits are numerous. And guess what, it's really not as complicated as it may seem at first glance! Step 1: Assign a domain name It all starts with the domain name. This will be the address of your proxy server on the internet. I chose `freemyip.com` to get a free domain, which made the process incredibly easy and fast. Step 2: Install `dumbproxy` Open a terminal and enter the command that will install `dumbproxy`: ``` curl -Lo /usr/local/bin/dumbproxy 'httрs://github.com/Snawoot/dumbproxy/releases/download/v1.6.1/dumbproxy.linux-amd64' && chmod +x /usr/local/bin/dumbproxy ``` Step 3: Create a user Let's create a user for our proxy to add a layer of security. Simply replace `USERNAME` and `PASSWORD` with the preferred data: ``` dumbproxy -passwd /etc/dumbproxy.htpasswd 'USERNAME' 'PASSWORD' ``` Step 4: Configuration Next, configure `dumbproxy` to use TLS and bind to port 443: ``` OPTIONS=-auth basicfile://?path=/etc/dumbproxy.htpasswd -autocert -bind-address :443 ``` And create the `systemd` service to manage `dumbproxy`: ``` [Unit] Description=Dumb Proxy Documentation=httрs://github.com/Snawoot/dumbproxy/ After=network.target network-online.target Requires=network-online.target [Service] EnvironmentFile=/etc/default/dumbproxy User=root Group=root ExecStart=/usr/local/bin/dumbproxy $OPTIONS TimeoutStopSec=5s PrivateTmp=true ProtectSystem=full LimitNOFILE=20000 [Install] WantedBy=default.target ``` Step 5: Run and Test Now activate and run `dumbproxy`: ``` systemctl daemon-reload systemctl enable dumbproxy systemctl start dumbproxy ``` Let's see if everything is working correctly: ``` curl -x 'httрs://USERNAME:ASSWORD@DOMAIN' http://ifconfig.co ``` Configure clients Finally, let's connect our devices to our new proxy. **Windows and Mac**: Use this PAC script: ``` function FindProxyForURL(u, h){return "HTTPS example.com:443";} ``` **Chrome**: Can be run with the proxy specified directly: ``` chromium-browser --proxy-server='https://example.com:443' ``` Now you know how to set up your own secure HTTPS proxy to help you stay anonymous on the internet and bypass potential blockages. So digitalpoint, how many of you have already tried something like this? Share your thoughts, tips or success/failure stories. Let's share our experiences and help each other out!