Say on a browser tab i want to use either a specific ip or a different ip from the other tabs of that browser or other browsers on my system. How can I achieve this?
Like lets say on Firefox I open the shopping container which is only used for (a dedicated container for), let’s say as an example, Amazon.com. Let’s say I use Proton VPN on my computer. I want this shopping container, every time it is opened, to go through a predefined VPN that is dedicated to it and is different from the VPN that is being used throughout the system. Is this possible? How? What is the best way (privacy conscious - open source) to achieve it?
Mozilla VPN with Containers can do that. If you need a more general, but rather complicated solution, use multiple instances of a browser in different network namespaces and route these through different VPNs.
Yes this is possible (assuming I understand your goals correctly). I am aware of two approaches that get you close to what you want:
FIrefox + Mozilla VPN + multi-account container extension
This would allow you to set per-container VPN configurations (e.g. VPN server “xyz” for the “shopping” container and server “abc” for the “work” container).
This approach doesn’t work on a per-container basis, but can be configured to work on a per-domain basis (so VPN server “xyz” for “some-site.tld” and server “abc” for “some-other-site.tld”).
Thanks!
Which, 1 or 2, would you say is more leak/bleed proof, in that there would be no way Amazon.com (going by my example above) would ever be able to see/know the ips or sites being used elsewhere?
…leak/bleed proof, in that there would be no way Amazon would ever be able to see…
If I truly needed that level of certainty, I’d go with a harder to screw up / more certain, but much less convenient approach (use separate virtual-machines, with firewall’s configured to block all traffic other than to the specific VPN server I want that specific VM to connect to, and then use that VM to connect to just the single site or service you want to isolate).
I think that is most likely total overkill for your situation, but because I don’t 100% understand the specifics of what you are trying to accomplish and based on your wording (“no way that [a website] could ever see…”) that is likely the approach I would take just to make user error or misconfiguration or a momentary slip up as difficult as possible. There are both more extreme and less extreme ways to compartmentalize depending on your goals.
But let’s take a step back from implementation and talk about your goal. Sticking to your example, what specifically is it you are trying to prevent Amazon from knowing? And how serious are the consequences if you mess up?
I find this type of question (what is your threat level?) amusing, since, the way I see it, it’s black or white…it’s either all or nothing.
Let me explain…
Say you are wanted by the police and there is a warrant out for your arrest, For the sake of argument, let’s say you are wrongfully accused…you were framed…and need time to gather the proof that it wasn’t you…and you can’t do that from jail (really had to add all that bit just to mitigate any potential sidetracking ).
You have a hide out. Obviously you don’t want the police to know your hide out and thus, obviously, you are not going to tell the police your address. There won’t be telling them just ones, or just a little bit. You don’t tell them period as telling them 0.01% vs 100% yield the same consequence… Jail.
So when, in my example, I say i want to isolate Amazon, it’s the same thing. I either isolate it completely or not at all. Half assing it to any degree defeats the purpose of isolating to being with.
1. also works with any socks5, since you can manually configure containers to do this
2. I’m currently making some improvement in managing this. I also have in the plan to assign a random exit per site, kind of replicating the Tor Browser user experience.
it would be great if you can have that functionality built in an extension for Chromium browsers , and even better if it’ll be independent from mullvad app , ie : we can have another vpn (or no vpn) app running and still benefit from this