Tor Browser 5.0, the privacy browser

The Tor browser promises privacy and safe browsing, today we are going to talk a little about its features

The Tor browser promises privacy and safe browsing, today we are going to talk a little about its features

Days ago We have talked about the launch of the Tails distribution, a GNU / Linux distribution based on network security. In this article we highlighted the inclusion of an update of the famous Tor browser, a well-known browser that promises anonymity and privacy.

Today we are going to talk more about this browser, the Tor network (The Onion Router) is a network that uses the so-called onion chaining, that is, that instead of going directly to the destination, data packets pass through many intermediate nodes along the way, encrypting each message by layers (hence the name), in this way it is possible to hide the identity of the user.

Alice sends a packet to Bob, but instead of going directly to Bob, the encryption message goes through several random nodes in Tor and is finally decrypted and passed to Bob, in this way it is very difficult for someone from outside to know that it has it was Alice who sent the packet

Alice sends a packet to Bob, but instead of going directly to Bob, the encryption message goes through several random nodes of Tor and is finally decrypted and passed to Bob, so it is very difficult for someone from outside to know what has happened. it was Alice who sent the package

To be able to enter this network, you need the Tor Browser browser, it is a Mozilla Firefox-based browser. Version 5.0 brings the following news:

  • Firefox update to version 38.2 ERS.
  • HTTPS-Everywhere, OpenSSL and NoScript updates (Tor doesn't run JavaScript because that would discover the user)
  • Fixed security bugs and Tor network update.
  • Fixed bugs on Windows and Mac.
  • Integrated Automatic Updates.

The Tor browser is integrated as the default browser in Tails, but also can be downloaded for use on any operating system, even on Android phones using the OrBot app.

In addition to anonymous browsing, the Tor network includes pages that are within the commonly known as DeepWeb (deep internet), which are pages that search engines cannot find. These pages are in the so-called .onion domains, which have weird and huge named urls due to their encryption and must be searched manually. These pages are characterized by a minimal content in HTML(Reminiscent of the internet from the 90s) and for its illegal content for the most part.

When you log in you can find yourself with all kinds of things, from illegal sale of weapons, sale of drugs (the old silkroad) pedophile and criminal forums, secret government documents to hired thugs, which has generated many urban legends on the Internet about the DeepWeb including horror stories, the truth is not as exaggerated as they say. The official currency of Tor is bitcoin Using your own Wallet to buy, if you agree, do so at your own risk.

Also say that Tor by itself is not infallibleFor example, the information from the destination to the last node is not encrypted and certain agencies such as the NSA could analyze who has entered by analyzing the origin and destination times of the packets, some recommendations to use Tor safely are the following.

  • Use Tails 1.5, as it has many security measures.
  • If you do not want to use Tails, I would refrain from using Windows, attackers could track the cookies of other browsers and thus discover who you are. Instead uses a Linux Live distribution uploaded to Ram and remove the hard drive from your computer for added security.
  • Do not access from your usual home router, better a public network.
  • Besides Tor, add some additional security measurel, how to use proxy servers, VPN or change the MAC address.
  • Disable Microphone and Webcam.
  • Do not use personal accounts on Tor, like Facebook, Twiitter, Gmail ... Tor has its own social networks and its own mail server and if you use the ones you normally use, they will know who you are, yes or yes.
  • Be careful what you download, some downloads may contain Xploits intended for tracking.
  • Never enable plugins like Flashplayer or JavaScript.
  • This should be obvious, but mStay away from child pornography or gun buying sitesThese sites are the most monitored by government agencies.

The Tor browser can be great when you want to browse in complete privacy, the Tor network has a bad reputation because of pedophiles but it is also a place where many journalists or people like Edward Snowden exchange information trying to get away from the focus of multinationals like Google, Facebook, Yahoo who give our data to governments.


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.