Four more common myths about Tor

The program s Tor is so popular in the circles that deal with it which has become almost synonymous with security. Its operation and capabilities are often unclear to a large portion of users who use it on a daily basis, and as a result, these minor misconceptions about its mechanism lead to false complacency.

Thu

Although its use Tor offers many advantages, it is important to note what its limitations are. Understanding the risks associated with Tor can help you better protect yourself from danger of your privacy. Let's look at four well-known myths that shroud Tor in mystery.

Myth 1: Tor is not secure because it was developed by of the United States

Είναι αλήθεια ότι το Tor αναπτύχθηκε από το Πολεμικό Ναυτικό των ΗΠΑ. Αυτή είναι και η αιτία που εύλογα κάποιος μπορεί να υποψιάζεται ότι πιθανά να υπάρχει κάποια κερκόπορτα η οποία να επιτρέπει στην κυβέρνηση των ΗΠΑ να μπορεί να παρακάμπτει τη .

Although the US government has funded (and probably continues to fund) the Tor project so far, the source code of the software is visible to all users. So far, no one found a door lock on any version of the software that was released.

But it is important to know that this could change at any time. There is no guarantee that Tor's developers will not use it as a tool to spy on their users, but the possibility of this happening is extremely low.

Myth 2: Tor is the ultimate tool for anonymous surfing

There is a very common misconception that Tor is a magical tool to cover fully your identity at the touch of a button.

Its main function is that it uses one or more proxies with encryption, which makes it very effective at hiding the source of all traffic generated on the internet, but this is not as important as the which you give to you are visiting.

If you create accounts with personal data or if you are communicating with public forums then it is very easy to know who you are.

Your identity can be found by methods such as a simple analysis of your writing style, your interests, your clicking habits, and various other factors that "belong" uniquely to you.

Our advice is to avoid giving your personal data to someone you are not ready to trust. Using Tor does not mean you can stop people from delivering your information to third parties.

Myth 3: Tor can not be tracked

The Tor has repeatedly been described as a tool that could put an end to government surveillance.

To some extent, it is true that a government's monitoring efforts will constantly stumble upon obstacles when they try to watch you on the internet. However, this does not mean that it is impossible. Yes, your IP will remain secret to anyone who discovers the traffic you create on the internet when you leave a exit node. But exit nodes on their own are not difficult to monitor. They can easily see the geographical location, as you can see here.

Myth 4: All my traffic is encrypted

Whether you use Tor or not, our advice is to try using the HTTPS and TLS protocol whenever possible. Tor only encrypts the traffic as it travels through the set of nodes, but what comes out of the output node stops being encrypted.

Someone with little know-how can run an exit node, which will record all the information sent through it and thus gain access to all of your accounts and emails.

Conclusion

You may think we are distracting, but it is very important to understand all the dangers surrounding the Tor so that you are prepared.

It is better to know what you are, than to stay complained of a false sense of security. Tor is a powerful tool, but it has a very specific purpose.

It is not a panacea. Δείτε το σαν ένα τρυπάνι. Δεν μπορείτε να χτίσετε ένα σπίτι με αυτό, αλλά σίγουρα θα σας βοηθήσει στην κατασκευή του!.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).