This Forum has been archived there is no more new posts or threads ... use this link to report any abusive content
==> Report abusive content in this page <==
Post Reply 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
What is Tor Broswer?
04-08-2014, 04:47 AM
Post: #1
What is Tor Broswer?
I've read that the Tor Browser lets you browse the 'deep' web, however I'm not entirely sure what that entails. Apparently you can visit the black market and such on this browser and it is supposedly near impossible to track someone who is using this browser. Can someone enlighten me as to how this browser works/what it can do?

Thanks

Ads

Find all posts by this user
Quote this message in a reply
04-08-2014, 04:51 AM
Post: #2
 
Tor Browser, is a Special Browser , that contains a VPN (Virtual Private Network) , and it establishes a Secured connection with their Server.

This Method, Prevents hackers from Spying On your Computer Via Your Wireless Connection, it it has many other Special Abilities :
It Can Bypass the Firewalls, it opens the Blocked Websites, and It changes your IP address as well .

If you need any help with the Installation Process ( Linux or Windows)
Send me an E-mail address :
x_guys_x.leb@hotmail.com

Ads

Find all posts by this user
Quote this message in a reply
04-08-2014, 04:54 AM
Post: #3
 
I disagree with the above poster.

VPN are secure but NOT anonymous. They create a secure "tunnel" from you to the site you are connecting to. The VPN services do know who you are and what what data you are transmitting and receiving. Many VPN services will keep logs and WILL turn over those logs to law enforcement. How do you know which VPN services will not? There is no way to know. So it is best to not use them when your aim is to be anonymous rather than secure.

Tor encrypts data from your machine, through your ISP (they do not know where the data is headed nor the content) through several nodes in the Tor relay. Each nod removes a "layer" of encryption just to know where the next relay is. Each node does not know the content, where the data originated, nor the final destination. Once it leaves the last node then the data is completely unencrypted and sent to the site you want. Since it is unencrypted and not under a private network anyone can see this data, BUT it does not matter because there is no way to know who sent/received the data.
https://www.torproject.org/about/overview

Here is a picture representation:
https://www.torproject.org/images/htw2.png

I highly recommend to NOT USE The Tor Bundle. This is because governments have and do target Tor users.
http://jolt.law.harvard.edu/digest/inter...-tor-users

They have and will find flaws in Windows and Firefox to spy on people.
https://blog.torproject.org/blog/tor-sec...vulnerable

This flaw has been corrected, but they exploited it for years before it was discovered. They may be exploiting another that we do not know of.

Does this mean that Tor is vulnerable? No. Tor has not been compromised, just some of the software to use Tor. Many will also say that the government controls many Tor nodes. This does not matter because they would have to control ALL nodes. Since each node does not know where the data came from nor where it is going then controlling many nodes does no good.

So what software should you use?
DO NOT USE WINDOWS. Nor use your every day OS.

Put either Liberte Linux or TAILS on a USB and boot into it.
http://dee.su/liberte
https://tails.boum.org/

The Hidden Wiki (AKA deep web) is over rated. Not as exciting as you would think. Also if you are easily offended, stay away.

Since Tor routs you through many nodes, it is slow. The point is to be anonymous, not fast, secure, or anything else.
Find all posts by this user
Quote this message in a reply
Post Reply 


Forum Jump:


User(s) browsing this thread: 1 Guest(s)