Using a Random Mullvad SOCKS5 Proxy for Each Browser Request

Playing around with SOCKS5 Mullvad servers for youtube access, I came across a quite interesting way to have a browser select a new SOCKS5 proxy for each request: Using a Random Mullvad SOCKS5 Proxy for Each Browser Request | K4YT3X

Not sure how useful it is, but given that most advertisements I see are indeed IP/Location-based, I am intrigued to give it a try. I think having a new server for each request may be too much, but if I understand the code correctly, you could adjust that and change it every X request. Would also be great to adjust it per domain.

Also, I don’t have a server to place the PAC file but it seems you can use local PAC files and refer in the Mullvad Browser to it via file:/// .

Any thoughts on this?

Okay, found one downside to this approach: webpages can identify all your entries in the PAC file by keep sending DNS requests. Apparently, this cannot be avoided by design. It will look like this for example.

Not sure how many requests regular homepages make or if this is just unique to those testing pages (also happens on browserleaks.com). Anyone knows this?

PS: having the proxy server fixed per domain is also possible, just ask your favorite LLM

Its really bad idea.

  1. Your browser fingerprint is same for each request so there is no point of doing this at all.
  2. I think now i understand why half of the mullvad server had been blocked by many websites i seen their app reviews on playstore rating went less than 3.5 the main problem the users are complaining is blocked, captcha like this.