# Quick start

<figure><img src="https://3706808397-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FJ1kEaMoiT7xVUWAPVbNQ%2Fuploads%2Fgit-blob-6ef82af3293fe0a93118dc0334b3b995556e5305%2Fimage.png?alt=media" alt=""><figcaption><p>Proxying Web traffic over Earendil</p></figcaption></figure>

In this tutorial, we'll show you how to proxy web traffic through the Earendil network using the `earendil` GUI.

If you haven't already, **install the GUI** from the [Installation](https://docs.earendil.network/getting-started/installation) section.

## Configure + start Earendil

All of `earendil`'s configuration options are specified in a YAML config file, located in the "Settings" tab of the GUI.

![](https://3706808397-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FJ1kEaMoiT7xVUWAPVbNQ%2Fuploads%2Fgit-blob-9b6e7d28d28dea32c0eaaeee0c1d7c0aaa825e42%2Fimage.png?alt=media)

Paste this config file into your Settings tab:

```yaml
# relays to connect to
out_routes:
  # arbitrary name for this relay
  example-relay-free:
    # IP and port where the relay is listening
    connect: 62.210.93.59:12345
    # relay's long-term identity
    fingerprint: 4b7a641b77c2d6ceb8b3fecec2b2978dfe81ae045ed9a25ed78b828009c4967a
    # obfuscation protocol to use
    obfs:
      # obfuscation secret, generated and provided by the relay
      sosistab3: randomly-generated-cookie-lala-doodoo
```

By default, Earendil exposes a Socks5 proxy server on `localhost:30003` that will proxy traffic through Earendil.

Now, start the daemon by pressing "Start" in the bottom tray. Go to the "Logs" tab, and you should see `earendil`'s logs appearing.

![](https://3706808397-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FJ1kEaMoiT7xVUWAPVbNQ%2Fuploads%2Fgit-blob-3c76aa0ce60ca1b4d190b1d8380387d468c67b00%2Fimage.png?alt=media)

You're all connected on the Earendil side!

## Connect your browser

To browse the web through Earendil, we need to configure a web browser to use our Earendil SOCKS5 proxy (at `localhost:30003`). For Firefox this looks like:

![image](https://hackmd.io/_uploads/SkLZ828Sp.png)

Visit any website as you normally would, except now all your traffic is going through Earendil! You can confirm this by [checking](https://bgp.he.net/) your IP address: you're properly connected if it's `62.210.93.59`. That's the IP address of this tutorial's bootstrap node.

Now you can use Earendil as a web proxy to browse the internet anonymously! Feel free to share [speed tests](https://speed.cloudflare.com/) in our [Discord](https://discord.gg/AVsGbhzTzx).

{% hint style="warning" %}
**Obtaining relay information safely**

In the configuration above, we added a *publicly available* example relay that the Mel team maintains.

It is important to note that in production, *Earendil relay information will not generally be publicly available*. You will need to personally know a relay operator to obtain contact information out-of-band, through chat, email, or offline.

This is to ensure **ban-resistance**: if any client can just request relay information, attackers can simply join the network to get a list of relays, which can let them block or identify Earendil traffic.

Thus, if you want to actually ensure ban-resistance, don't use the relay we gave you above! Instead, you can come to [our Discord](https://discord.gg/jdVuk4Qj89) to ask other users for help.
{% endhint %}
