

Also, your web browsers need to be set to use a SOCKS proxy (somehow similar to setting up HTTP proxies) on a localhost port.

This has to be done for all connections individually. Thus, it needs to be configured manually in order to protect all your traffic.
TIMBUKTU SSH PROXY SERVER PC
This is comparable to local forwarding that takes traffic sent to a specific port on a PC and sends it to a remote location over the SSH connection. It is sometimes called an SSH proxy, even though the preferred term is proxy using the SSH tunnel. The SSH client (e.g., PuTTY) sends the traffic (from the applications that use the SSH tunnel) through the proxy to the SSH server. The SSH server may act as a SOCKS proxy server. Using dynamic port forwarding on an SSH connection works much the same as a VPN or proxy. To a web server that is accessed through an SSH tunnel, the connection will appear as if it’s coming from the SSH server and not the local computer. This would bypass content and website filters on a local network, and prevent anyone using a public Wi-Fi network from seeing what is being browsed. Web browsing HTTP traffic could, for example, be directed through an SSH tunnel to encrypt it. Network traffic from a local computer can be sent to the SSH server through a secure connection. SSH tunneling is used to route traffic through an SSH secure connection (created using the SSH protocol) and it allows a remote SSH server to operate as a proxy server. Once the SSH connection has been established to a remote host, the connection between the computers is encrypted and therefore secure. SSH (Secure Shell) is a remote login shell that uses a protocol that connects remote computers via an encrypted connection. Sometimes called ‘the poor man’s VPN”, the proxy on the top of an SSH tunnel (SSH proxy) is a handy solution for securing your Internet connection while using public Wifi networks or even unblocking restricted websites while traveling abroad.
