Four more common myths about Tor

The Tor browser is so popular in cyber anonymity circles that it has become almost synonymous with security. Its function and capabilities are often unclear to a large number of users who use it on a daily basis, with the result that these small misunderstandings about its mechanism lead wrongly to complacency.


Although its use Tor offers many advantages, it is important to note what its limitations are. Understanding the risks associated with Tor can help you better protect yourself from the risk of violating your privacy. Let's look at four well-known myths covering Tor's mysterious veil.

Myth 1: Tor is not safe because it was developed by the US government

It is true that Tor was developed by the US Navy. This is the reason why one can reasonably suspect that there may be a backdoor that allows the US government to bypass encryption.

Αν και η κυβέρνηση των ΗΠΑ έχει χρηματοδοτήσει (και κατά πάσα πιθανότητα συνεχίζει να χρηματοδοτεί) μέχρι και σήμερα το Tor project, the source code of the software is visible to all users. So far, no one was able to send in the perfect solution, which is not strange.

But it is important to know that this could change at any time. There is no guarantee that Tor's developers will not use it as a tool to spy on their users, but the possibility of this happening is extremely low.

Myth 2: Tor is the ultimate tool for anonymous surfing

There is a very common misconception that Tor is a magical tool to cover fully your identity at the touch of a button.

Its main function is to use one or more proxies with encryption, which makes it very effective in hiding the source of all traffic generated on the internet but this is not as important as the information you provide on websites you are visiting.

If you create accounts with personal data or if you are communicating with public forums then it is very easy to know who you are.

Your identity can be found by methods such as a simple analysis of your writing style, your interests, your clicking habits, and various other factors that "belong" uniquely to you.

Our advice is to avoid giving your personal data to someone you are not ready to trust. Using Tor does not mean you can stop people from delivering your information to third parties.

Myth 3: Tor can not be tracked

The Tor has repeatedly been described as a tool that could put an end to government surveillance.

To some extent, it is true that a government surveillance effort will constantly stumble upon obstacles when it tries to monitor you online. However, this does not mean that it is impossible. Yes, yours IP will remain a secret to anyone who steals the traffic you create on the internet when you leave one exit node. But exit nodes on their own are not difficult to monitor. They can easily see the geographical location, as you can see here.

Myth 4: All my traffic is encrypted

Whether you use Tor or not, our advice is to try to use the protocol HTTPS and TLS whenever possible. Tοr encrypts traffic only as it travels through all the nodes, but whatever comes out of the output node stops being encrypted.

Someone with little know-how can run an exit node, which will record all the information sent through it and thus gain access to all of your accounts and emails.


You may think we are distracting, but it is very important to understand all the dangers surrounding the Tor so that you are prepared.

It is better to know what you are, than to stay complained of a false sense of security. Tor is a powerful tool, but it has a very specific purpose.

It is not a panacea. See it as an electric drill. You can not build a house with it, but it will surely help you build it!

Read them Technology News from all over the world, with the validity of

Follow us on Google News at Google news