The TOR browser bundle


in Geek stuff, Internet matters, Politics, Security, Writing

The TOR browser bundle seems like a reasonably effective and very easy-to-use means of circumventing web censorship and surveillance.

The speed of web browsing falls significantly when data is routed through the TOR network, but tools like this are increasingly essential as governments undertake more and more inappropriate meddling with the free flow of ideas online.

There are versions for various operating systems. I have tried both the Windows and Mac OS installs and they are both easy to use and at least a bit effective in avoiding tracking and censorship. Remember, however, that TOR is useless if someone is tracking all your web traffic at your point of connection to the internet, for instance by reading all the traffic through your broadband connection or cell phone. If you are worried about that, use public networks along with TOR, or set up an encrypted connection to a proxy or virtual private network and then run TOR from there.

Remember, all security bets are of if an attacker gets malware on your machine or gains physical access to it.

Report a typo or inaccuracy

{ 12 comments… read them below or add one }

. February 7, 2012 at 9:27 am
Nobody in Particular February 8, 2012 at 10:41 am

TOR is good for protecting you from certain risks – like the risk that Twitter or GMail will give your personal information to a hostile government. If you are a pro-democracy activist in China, you should use TOR among other precautions.

You can’t trust internet companies to keep your data safe from governments.

Different nobody in particular February 8, 2012 at 11:03 am

Another useful tool (for penetration testing / intrusion detection):

Eavesdrop is an application for listening in on TCP conversations on the network your computer is attached to.

. February 9, 2012 at 11:53 pm

Using Tor: Assume Exit Nodes are Monitored

Ars Technica is reporting that a security specialist was able to grab a bunch of login/passwords after running Tor nodes to illustrate proper and improper use of the widely-used anonymity network. In this particular case, Dan Egerstad volunteered to be part of the Tor network by running “exit nodes,” and boy did he grab a bunch of sensitive logins and passwords.

Particularly embarrassing is the fact the list contained use by embassy staff of Uzbekistan, Kazakhstan, Iran and India among others. There seems to be no other explanation other than the IT departments of these governments actually recommending Tor as standard operating procedure to access their accounts from abroad.

X February 9, 2012 at 11:53 pm

Anything you do using TOR might just get EXTRA ATTENTION from the spooks. It could serve indirectly as a means for them to concentrate interesting traffic. People use TOR for more interesting activities than they use their own networks for.

X February 10, 2012 at 12:07 am
alUWloZpjv August 5, 2013 at 10:47 pm
. September 7, 2013 at 1:57 pm
. October 8, 2013 at 5:23 pm

Silk Road used the Tor Network, but nothing about the bust suggests Tor has been broken. Tor protects internet users’ identities by shuffling traffic among many servers in a high-tech shell game. It is used by activists and journalists and drug dealers who want to remain hidden online. Even the NSA can’t break the technology, though they’ve tried, according to new documents revealed by the Guardian.

Silk Road used Tor’s Hidden Services feature, which lets operators host their sites without revealing their ip addresses. Only other Tor users can visit Tor Hidden Services, which all use the odd .onion domain. The collected .onion sites form the Dark Net. (Or Deep Web, or Deep Net, there are a lot of names.) Anyone can visit the Dark Net by installing the Tor Browser bundle, which takes about five minutes.

. October 8, 2013 at 5:24 pm

NSA and GCHQ target Tor network that protects anonymity of web users

anon December 26, 2014 at 8:49 pm

Apparently, people attack the TOR network by trying to establish large numbers of exit nodes:

Tor Project statement on today’s attack.

This looks like a regular attempt at a Sybil attack: the attackers have signed up
many new relays in hopes of becoming a large fraction of the network.
But even though they are running thousands of new relays, their relays
currently make up less than 1% of the Tor network by capacity. We are
working now to remove these relays from the network before they become
a threat, and we don’t expect any anonymity or performance effects based
on what we’ve seen so far.

anon December 26, 2014 at 8:50 pm

Leave a Comment

You can use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Previous post:

Next post: