Days ago We have talked about the launch of the Tails distribution, a GNU / Linux distribution based on network security. In this article we highlighted the inclusion of an update of the famous Tor browser, a well-known browser that promises anonymity and privacy.
Today we are going to talk more about this browser, the Tor network (The Onion Router) is a network that uses the so-called onion chaining, that is, that instead of going directly to the destination, data packets pass through many intermediate nodes along the way, encrypting each message by layers (hence the name), in this way it is possible to hide the identity of the user.
To be able to enter this network, you need the Tor Browser browser, it is a Mozilla Firefox-based browser. Version 5.0 brings the following news:
- Firefox update to version 38.2 ERS.
- Fixed security bugs and Tor network update.
- Fixed bugs on Windows and Mac.
- Integrated Automatic Updates.
The Tor browser is integrated as the default browser in Tails, but also can be downloaded for use on any operating system, even on Android phones using the OrBot app.
In addition to anonymous browsing, the Tor network includes pages that are within the commonly known as DeepWeb (deep internet), which are pages that search engines cannot find. These pages are in the so-called .onion domains, which have weird and huge named urls due to their encryption and must be searched manually. These pages are characterized by a minimal content in HTML(Reminiscent of the internet from the 90s) and for its illegal content for the most part.
When you log in you can find yourself with all kinds of things, from illegal sale of weapons, sale of drugs (the old silkroad) pedophile and criminal forums, secret government documents to hired thugs, which has generated many urban legends on the Internet about the DeepWeb including horror stories, the truth is not as exaggerated as they say. The official currency of Tor is bitcoin Using your own Wallet to buy, if you agree, do so at your own risk.
Also say that Tor by itself is not infallibleFor example, the information from the destination to the last node is not encrypted and certain agencies such as the NSA could analyze who has entered by analyzing the origin and destination times of the packets, some recommendations to use Tor safely are the following.
- Use Tails 1.5, as it has many security measures.
- If you do not want to use Tails, I would refrain from using Windows, attackers could track the cookies of other browsers and thus discover who you are. Instead uses a Linux Live distribution uploaded to Ram and remove the hard drive from your computer for added security.
- Do not access from your usual home router, better a public network.
- Besides Tor, add some additional security measurel, how to use proxy servers, VPN or change the MAC address.
- Disable Microphone and Webcam.
- Do not use personal accounts on Tor, like Facebook, Twiitter, Gmail ... Tor has its own social networks and its own mail server and if you use the ones you normally use, they will know who you are, yes or yes.
- Be careful what you download, some downloads may contain Xploits intended for tracking.
- This should be obvious, but mStay away from child pornography or gun buying sitesThese sites are the most monitored by government agencies.
The Tor browser can be great when you want to browse in complete privacy, the Tor network has a bad reputation because of pedophiles but it is also a place where many journalists or people like Edward Snowden exchange information trying to get away from the focus of multinationals like Google, Facebook, Yahoo who give our data to governments.