Four more common myths about Tor

The Tor browser is so popular in hacking circles στο διαδίκτυο που έχει γίνει σχεδόν συνώνυμο με την ασφάλεια. Η λειτουργία του και οι δυνατότητές του είναι συχνά ασαφείς σε ένα μεγάλο μέρος των χρηστών που το χρησιμοποιούν σε καθημερινή βάση, με αποτέλεσμα αυτές οι μικρές παρανοήσεις, σχετικά με τον μηχανισμό του, να οδηγούν λανθασμένα σε εφησυχασμό.

Thu

Although its use Tor offers many advantages, it is important to note what its limitations are. Understanding the risks associated with Tor can help you better protect yourself from the risk of violating your privacy. Let's look at four well-known myths covering Tor's mysterious veil.

Myth 1: Tor isn't because it was developed by the US government

It is true that Tor was developed by the US Navy. This is the reason why one can reasonably suspect that there may be a backdoor that allows the US government to bypass encryption.

Although the US government has funded (and presumably continues to fund) the Tor project to this day, the source code of the software is visible to all users. So far, no one has found a backdoor in any of the released software.

But it is important to know that this could change at any time. There is no guarantee that Tor's developers will not use it as a tool to spy on their users, but the possibility of this happening is extremely low.

Myth 2: Tor is the ultimate tool for anonymous surfing

There is a very common misconception that Tor is a magical tool to cover fully your identity at the touch of a button.

Its main function is that one or more proxies with encryption, which makes it very effective at hiding the source of all traffic generated on the internet but this is not as important as the information you give to the websites you visit.

If you create accounts with personal data or if you are communicating with public forums then it is very easy to know who you are.

Your identity can be found by methods such as a simple analysis of your writing style, your interests, your clicking habits, and various other factors that "belong" uniquely to you.

Our advice is to avoid giving your personal data to someone you are not ready to trust. Using Tor does not mean you can stop people from delivering your information to third parties.

Myth 3: Tor can not be tracked

The Tor has repeatedly been described as a tool that could put an end to government surveillance.

To some extent, it is true that a government's monitoring efforts will constantly stumble upon obstacles when they try to watch you on the internet. However, this does not mean that it is impossible. Yes, your IP will remain secret to anyone who discovers the traffic you create on the internet when you leave a exit node. But exit nodes on their own are not difficult to monitor. They can easily see the geographical location, as you can see here.

Myth 4: All my traffic is encrypted

Whether you use Tor or not, our advice is to try using the HTTPS and TLS protocol whenever possible. Tor only encrypts the traffic as it travels through the set of nodes, but what comes out of the output node stops being encrypted.

Someone with little know-how can run an exit node, which will record all the information sent through it and thus gain access to all of your accounts and emails.

Conclusion

You may think we are distracting, but it is very important to understand all the dangers surrounding the Tor so that you are prepared.

It is better to know what you are, than to stay complained of a false sense of security. Tor is a powerful tool, but it has a very specific purpose.

It is not a panacea. Think of it like a power drill. You can't build a house with it, but it will definitely help you in of!.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).