summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorYour Name <you@example.com>2025-04-24 02:10:11 -0600
committerYour Name <you@example.com>2025-04-24 02:10:11 -0600
commita4861c610ac276867813d26b448434d11dbb1986 (patch)
treeff8e5111940a9678556b4012508329f9ba25c1ac
parent2c431b776d21570fe541f9cc2525650e0f4c20e2 (diff)
tor
-rw-r--r--index.html2
-rw-r--r--posts/tor-browser.html426
-rw-r--r--posts/tor-browser.org70
3 files changed, 79 insertions, 419 deletions
diff --git a/index.html b/index.html
index e447851..5af7a15 100644
--- a/index.html
+++ b/index.html
@@ -36,8 +36,6 @@
<h3>Recent articles:</h3>
- <li><a href="https://skylarcloud.xyz/posts/install-pkgs-w-saltstack.html">Examples of installing software in QubesOS with Saltstack</a></li>
-
<li><a href="https://skylarcloud.xyz/posts/torrenting.html">Convenient torrenting with qBittorrent</a></li>
<li><a href="https://skylarcloud.xyz/posts/tor-browser.html">The Tor Browser</a></li>
diff --git a/posts/tor-browser.html b/posts/tor-browser.html
index e2034a6..1ed3b22 100644
--- a/posts/tor-browser.html
+++ b/posts/tor-browser.html
@@ -1,348 +1,80 @@
-<?xml version="1.0" encoding="utf-8"?>
-<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
-"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
-<html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
-<head>
-<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
-<meta name="viewport" content="width=device-width, initial-scale=1" />
-<title>The Tor Browser</title>
-<meta name="generator" content="Org Mode" />
-<style type="text/css">
- #content { max-width: 60em; margin: auto; }
- .title { text-align: center;
- margin-bottom: .2em; }
- .subtitle { text-align: center;
- font-size: medium;
- font-weight: bold;
- margin-top:0; }
- .todo { font-family: monospace; color: red; }
- .done { font-family: monospace; color: green; }
- .priority { font-family: monospace; color: orange; }
- .tag { background-color: #eee; font-family: monospace;
- padding: 2px; font-size: 80%; font-weight: normal; }
- .timestamp { color: #bebebe; }
- .timestamp-kwd { color: #5f9ea0; }
- .org-right { margin-left: auto; margin-right: 0px; text-align: right; }
- .org-left { margin-left: 0px; margin-right: auto; text-align: left; }
- .org-center { margin-left: auto; margin-right: auto; text-align: center; }
- .underline { text-decoration: underline; }
- #postamble p, #preamble p { font-size: 90%; margin: .2em; }
- p.verse { margin-left: 3%; }
- pre {
- border: 1px solid #e6e6e6;
- border-radius: 3px;
- background-color: #f2f2f2;
- padding: 8pt;
- font-family: monospace;
- overflow: auto;
- margin: 1.2em;
- }
- pre.src {
- position: relative;
- overflow: auto;
- }
- pre.src:before {
- display: none;
- position: absolute;
- top: -8px;
- right: 12px;
- padding: 3px;
- color: #555;
- background-color: #f2f2f299;
- }
- pre.src:hover:before { display: inline; margin-top: 14px;}
- /* Languages per Org manual */
- pre.src-asymptote:before { content: 'Asymptote'; }
- pre.src-awk:before { content: 'Awk'; }
- pre.src-authinfo::before { content: 'Authinfo'; }
- pre.src-C:before { content: 'C'; }
- /* pre.src-C++ doesn't work in CSS */
- pre.src-clojure:before { content: 'Clojure'; }
- pre.src-css:before { content: 'CSS'; }
- pre.src-D:before { content: 'D'; }
- pre.src-ditaa:before { content: 'ditaa'; }
- pre.src-dot:before { content: 'Graphviz'; }
- pre.src-calc:before { content: 'Emacs Calc'; }
- pre.src-emacs-lisp:before { content: 'Emacs Lisp'; }
- pre.src-fortran:before { content: 'Fortran'; }
- pre.src-gnuplot:before { content: 'gnuplot'; }
- pre.src-haskell:before { content: 'Haskell'; }
- pre.src-hledger:before { content: 'hledger'; }
- pre.src-java:before { content: 'Java'; }
- pre.src-js:before { content: 'Javascript'; }
- pre.src-latex:before { content: 'LaTeX'; }
- pre.src-ledger:before { content: 'Ledger'; }
- pre.src-lisp:before { content: 'Lisp'; }
- pre.src-lilypond:before { content: 'Lilypond'; }
- pre.src-lua:before { content: 'Lua'; }
- pre.src-matlab:before { content: 'MATLAB'; }
- pre.src-mscgen:before { content: 'Mscgen'; }
- pre.src-ocaml:before { content: 'Objective Caml'; }
- pre.src-octave:before { content: 'Octave'; }
- pre.src-org:before { content: 'Org mode'; }
- pre.src-oz:before { content: 'OZ'; }
- pre.src-plantuml:before { content: 'Plantuml'; }
- pre.src-processing:before { content: 'Processing.js'; }
- pre.src-python:before { content: 'Python'; }
- pre.src-R:before { content: 'R'; }
- pre.src-ruby:before { content: 'Ruby'; }
- pre.src-sass:before { content: 'Sass'; }
- pre.src-scheme:before { content: 'Scheme'; }
- pre.src-screen:before { content: 'Gnu Screen'; }
- pre.src-sed:before { content: 'Sed'; }
- pre.src-sh:before { content: 'shell'; }
- pre.src-sql:before { content: 'SQL'; }
- pre.src-sqlite:before { content: 'SQLite'; }
- /* additional languages in org.el's org-babel-load-languages alist */
- pre.src-forth:before { content: 'Forth'; }
- pre.src-io:before { content: 'IO'; }
- pre.src-J:before { content: 'J'; }
- pre.src-makefile:before { content: 'Makefile'; }
- pre.src-maxima:before { content: 'Maxima'; }
- pre.src-perl:before { content: 'Perl'; }
- pre.src-picolisp:before { content: 'Pico Lisp'; }
- pre.src-scala:before { content: 'Scala'; }
- pre.src-shell:before { content: 'Shell Script'; }
- pre.src-ebnf2ps:before { content: 'ebfn2ps'; }
- /* additional language identifiers per "defun org-babel-execute"
- in ob-*.el */
- pre.src-cpp:before { content: 'C++'; }
- pre.src-abc:before { content: 'ABC'; }
- pre.src-coq:before { content: 'Coq'; }
- pre.src-groovy:before { content: 'Groovy'; }
- /* additional language identifiers from org-babel-shell-names in
- ob-shell.el: ob-shell is the only babel language using a lambda to put
- the execution function name together. */
- pre.src-bash:before { content: 'bash'; }
- pre.src-csh:before { content: 'csh'; }
- pre.src-ash:before { content: 'ash'; }
- pre.src-dash:before { content: 'dash'; }
- pre.src-ksh:before { content: 'ksh'; }
- pre.src-mksh:before { content: 'mksh'; }
- pre.src-posh:before { content: 'posh'; }
- /* Additional Emacs modes also supported by the LaTeX listings package */
- pre.src-ada:before { content: 'Ada'; }
- pre.src-asm:before { content: 'Assembler'; }
- pre.src-caml:before { content: 'Caml'; }
- pre.src-delphi:before { content: 'Delphi'; }
- pre.src-html:before { content: 'HTML'; }
- pre.src-idl:before { content: 'IDL'; }
- pre.src-mercury:before { content: 'Mercury'; }
- pre.src-metapost:before { content: 'MetaPost'; }
- pre.src-modula-2:before { content: 'Modula-2'; }
- pre.src-pascal:before { content: 'Pascal'; }
- pre.src-ps:before { content: 'PostScript'; }
- pre.src-prolog:before { content: 'Prolog'; }
- pre.src-simula:before { content: 'Simula'; }
- pre.src-tcl:before { content: 'tcl'; }
- pre.src-tex:before { content: 'TeX'; }
- pre.src-plain-tex:before { content: 'Plain TeX'; }
- pre.src-verilog:before { content: 'Verilog'; }
- pre.src-vhdl:before { content: 'VHDL'; }
- pre.src-xml:before { content: 'XML'; }
- pre.src-nxml:before { content: 'XML'; }
- /* add a generic configuration mode; LaTeX export needs an additional
- (add-to-list 'org-latex-listings-langs '(conf " ")) in .emacs */
- pre.src-conf:before { content: 'Configuration File'; }
-
- table { border-collapse:collapse; }
- caption.t-above { caption-side: top; }
- caption.t-bottom { caption-side: bottom; }
- td, th { vertical-align:top; }
- th.org-right { text-align: center; }
- th.org-left { text-align: center; }
- th.org-center { text-align: center; }
- td.org-right { text-align: right; }
- td.org-left { text-align: left; }
- td.org-center { text-align: center; }
- dt { font-weight: bold; }
- .footpara { display: inline; }
- .footdef { margin-bottom: 1em; }
- .figure { padding: 1em; }
- .figure p { text-align: center; }
- .equation-container {
- display: table;
- text-align: center;
- width: 100%;
- }
- .equation {
- vertical-align: middle;
- }
- .equation-label {
- display: table-cell;
- text-align: right;
- vertical-align: middle;
- }
- .inlinetask {
- padding: 10px;
- border: 2px solid gray;
- margin: 10px;
- background: #ffffcc;
- }
- #org-div-home-and-up
- { text-align: right; font-size: 70%; white-space: nowrap; }
- textarea { overflow-x: auto; }
- .linenr { font-size: smaller }
- .code-highlighted { background-color: #ffff00; }
- .org-info-js_info-navigation { border-style: none; }
- #org-info-js_console-label
- { font-size: 10px; font-weight: bold; white-space: nowrap; }
- .org-info-js_search-highlight
- { background-color: #ffff00; color: #000000; font-weight: bold; }
- .org-svg { }
-</style>
-<style>*{font-family: sans-serif !important}</style>
-</head>
-<body>
-<div id="content" class="content">
-<h1 class="title">The Tor Browser
-<br />
-<span class="subtitle">April 5, 2025</span>
-</h1>
-<table border="2" cellspacing="0" cellpadding="6" rules="all" frame="border" align="center">
-
-
-<colgroup>
-<col class="org-left" />
-
-<col class="org-left" />
-
-<col class="org-left" />
-
-<col class="org-left" />
-</colgroup>
-<tbody>
-<tr>
-<td class="org-left"><a href="https://skylarcloud.xyz">🌎 Home</a></td>
-<td class="org-left"><a href="https://skylarcloud.xyz/feed.html">📡 My feed</a></td>
-<td class="org-left"><a href="https://searx.skylarcloud.xyz">🔭 SearXNG</a></td>
-<td class="org-left"><a href="https://git.skylarcloud.xyz">⚙️ Git Repos</a></td>
-</tr>
-</tbody>
-</table>
-<div id="outline-container-orgd13c352" class="outline-2">
-<h2 id="orgd13c352">Intro</h2>
-<div class="outline-text-2" id="text-orgd13c352">
-<p>
-The immediate threat of government retaliation for speech hasn&rsquo;t been clearer in decades as it is now in the U.S. under the Trump administration. Journalists, law firms, and polling orgs are being targeted in viewpoint-based lawsuits. Legal permanent residents and writers are being held hostage or sent to El Salvidor-ian labor prisons without charges or due process explicitly for their speech. In the cases of targeted individuals, much of the &rsquo;evidence&rsquo; found by the executive&#x2013;and often the speech retaliated against&#x2013;happened online.
-</p>
-
-<p>
-When the internet and online social spaces are rife with surveillance, and our activity is so often tied to our personal identifiers (IP address, name, phone #, email, address, etc.), the job of a malicious government is easy. Every time you fedpost about Trump on Instagram, express support for groups the US is opposed to, or write a controversial article with your name at the top of it, you leave a trail of breadcrumbs&#x2013;no, a trail of loafs&#x2013;that tons of organizations and governments can use to learn your political persuasions, and potentially persecute you for them.
-</p>
-
-<p>
-When you can&rsquo;t trust your network, your ISP, the sites you&rsquo;re visiting, or your government with your internet activity, the value of anonymity becomes clear. The Tor Browser is a web browser that mitigates many of these threats by making your browsing anonymous. Using it, you can create and maintain accounts on various websites, participate in conversation, publish your writing, and get access to information without being surveilled.
-</p>
-</div>
-</div>
-<div id="outline-container-org45a4861" class="outline-2">
-<h2 id="org45a4861">Hiding your web traffic with the Tor Network</h2>
-<div class="outline-text-2" id="text-org45a4861">
-<p>
-The first job of the Tor Browser to hide your traffic from your network, your ISP, and to keep your IP address hidden from the websites you visit, and it solves this problem in a very cool way. When you visit a website through the Tor Browser, your traffic is sent through the Tor Network, which is a network of thousands of servers run by volunteers. Your traffic is encrypted three-fold and sent through a randomly-picked three servers in the network, in such a way where no single node can see both your IP address the IP address you&rsquo;re visiting.
-</p>
-
-<p>
-This means that your network and ISP can&rsquo;t know what website you&rsquo;re visiting; it&rsquo;ll just be a bunch of encrypted traffic into the Tor Network. The website you&rsquo;re visiting also won&rsquo;t know where your connection came from, just the IP address of the exit node. And even the tor nodes your traffic was routed through can&rsquo;t simultaneously know your IP address and the address of the website you were visiting. Your three-node &ldquo;circuit&rdquo; will automatically rotate periodically as well. Basically it&rsquo;s a proxy/VPN on steroids.
-</p>
-
-<p>
-Now, as mentioned above, it&rsquo;s important to stress that though your traffic is truly hidden, by default your network and ISP <b>will</b> know that you&rsquo;re using Tor for <i>something</i>. Using Tor is not illegal anywhere in the US (as far as I know?), but it may be suspicious to your network administrator or possibly blocked on your network. If you&rsquo;re worried about your network and ISP knowing you&rsquo;re using Tor, you can use &ldquo;bridges&rdquo;, which are a fourth optional random proxy your traffic will go through before entering the Tor Network to further obscure the nature of your connection. You can easily enable this in your &ldquo;connection settings&rdquo;, which will be available right after starting the browser for the first time.
-</p>
-
-<p>
-Also, because your traffic is being passed through so many servers on the way to its destination, keep in mind that browsing will be significantly slower than you&rsquo;re probably used to. It&rsquo;s comfortable enough on a fast home connection, but trying to stream HD video, or using Tor over a mobile connection or with slower home internet can get painful.
-</p>
-</div>
-</div>
-<div id="outline-container-orgc9f42fa" class="outline-2">
-<h2 id="orgc9f42fa">Anti-fingerprinting</h2>
-<div class="outline-text-2" id="text-orgc9f42fa">
-<p>
-Aside from the network, online surveillance is often done through &ldquo;fingerprinting&rdquo;, where a website can see/query your browser for all sorts of information to build a profile on your connection. The fonts installed on your computer, browser cookies, browser extensions, your screen size and many more variables can be used to build a unique fingerprint and expose you to tracking.
-</p>
-
-<p>
-To stop these kinds of attacks, the Tor Browser has many anti-fingerprinting protections build-in, that attempt to make your connection look like every other Tor users, so no-one seems unique.
-</p>
-</div>
-<div id="outline-container-org3e6a164" class="outline-3">
-<h3 id="org3e6a164">Letterboxing</h3>
-<div class="outline-text-3" id="text-org3e6a164">
-<p>
-The Browser uses letterboxing, which is a curious little feature that disguises your screen size by having a certain number of pre-chosen website sizes that the window will snap to. This is hard to describe in words but you&rsquo;ll notice it quickly when you use the Browser. You can resize the window as granularly as you wish, but the website will only grow and shrink in certain particular sizes.
-</p>
-</div>
-</div>
-<div id="outline-container-orgc956293" class="outline-3">
-<h3 id="orgc956293">No history</h3>
-<div class="outline-text-3" id="text-orgc956293">
-<p>
-Every time you close the Tor Browser, all cookies and history is removed, so you&rsquo;ll get a clean start every launch.
-</p>
-</div>
-</div>
-<div id="outline-container-org7cf2a65" class="outline-3">
-<h3 id="org7cf2a65">Hide everything!</h3>
-<div class="outline-text-3" id="text-org7cf2a65">
-<p>
-When information about your browser and operating system are typically sent to website, the Tor Browser will lie and claim every user is using the same devices. It will hide your time zone, your installed fonts, and refuse to use many risky APIs that can be privacy-intrusive.
-</p>
-</div>
-</div>
-</div>
-<div id="outline-container-org32164a5" class="outline-2">
-<h2 id="org32164a5">Don&rsquo;t make yourself unique</h2>
-<div class="outline-text-2" id="text-org32164a5">
-<p>
-By default, the Tor Browser will use these network and anti-fingerprinting features to make your browser and your connection look as similar as possible to every Tor user, so everyone&rsquo;s traffic is all mingled and indecipherable and difficult to track, but you can definitely break your anonymity by making mistakes when using it. Here are some things to avoid:
-</p>
-</div>
-<div id="outline-container-orgf731f89" class="outline-3">
-<h3 id="orgf731f89">Don&rsquo;t mix Tor and non-Tor traffic/accounts/identities !!!</h3>
-<div class="outline-text-3" id="text-orgf731f89">
-<ul class="org-ul">
-<li>If you create an anonymous online account using Tor, and then access that account on another device without using Tor, you&rsquo;ve deanonymized yourself.</li>
-<li>If you use Tor to commit a crime, and in another tab you access a personal social media service using the same Tor connection, you&rsquo;ve deanonymized yourself.</li>
-<li>If you start a blog using Tor, and publish a post with your name, you&rsquo;ve deanonymized yourself.</li>
-<li>If you&rsquo;re talking to someone on Tor, and you give them your personal email to talk further, you&rsquo;ve deanonymized yourself.</li>
-</ul>
-
-<p>
-This is the most common class of mistake Tor users make that leads to arrests. Always understand what information you may be accidentally linking together that could connect your anonymous activities to your personal identity.
-</p>
-</div>
-</div>
-<div id="outline-container-org7915bd0" class="outline-3">
-<h3 id="org7915bd0">Mostly, don&rsquo;t configure the browser</h3>
-<div class="outline-text-3" id="text-org7915bd0">
-<p>
-Because the Tor Browser is designed to make everyone&rsquo;s connection look similar, if you start changing settings or installing extensions, your browser will become more unique and track-able. Almost always try to just stick to the defaults!
-</p>
-
-<p>
-There are a couple notable exceptions to this rule; options that are meant to be played with if you so desire:
-</p>
-</div>
-<div id="outline-container-orge77e4a8" class="outline-4">
-<h4 id="orge77e4a8">Security settings</h4>
-<div class="outline-text-4" id="text-orge77e4a8">
-<p>
-In the browser settings, there are three &ldquo;security levels&rdquo; you can choose from. Choosing the &ldquo;safer&rdquo; options will restrict websites from more potentially-risky activity, at the cost of many more websites not being able to function. I&rsquo;d recommend defaulting to the most secure option and lowering it if a particular site demands it.
-</p>
-</div>
-</div>
-<div id="outline-container-org69de447" class="outline-4">
-<h4 id="org69de447">Connection settings</h4>
-<div class="outline-text-4" id="text-org69de447">
-<p>
-As mentioned earlier, you can optionally use a bridge to hide the fact that you&rsquo;re using Tor from your network and ISP.
-</p>
-</div>
-</div>
-</div>
-</div>
-</div>
-</body>
+<!DOCTYPE html>
+
+<html>
+ <head>
+ <title>The Tor Browser</title>
+ <link rel="stylesheet" href="../styles.css">
+ </head>
+
+ <body>
+ <center>
+ <div>
+ <h1>The Tor Browser</h1>
+
+ <p>The threat of government retaliation for online speech hasn't been more clear in decades as it is now in the U.S. under the Trump administration. The Trump administration and Immigrations Enforcement scrape data from social media to find undocumented people or advocates for causes the admin dislikes. Polling organizations, journalists, activists, and claimed "illegal terrorists" are having their online speech and activity used to reliate against them.</p>
+
+ <p>When the internet and online social spaces are rife with surveillance, and our online activity is so often tied to our personal identifiers (IP address, name, phone #, email, address, etc.), the job of a malicious government is easy. Every time you fedpost about Trump on Instagram, express support for groups the US is opposed to, or write a controversial article with your name at the top of it, you leave a trail of breadcrumbs--nay, loafs--that lots of organizations and governments can use to learn your political persuasions, and potentially persecute you for them.</p>
+
+ <p>When you can't trust your network, your ISP, the sites you're visiting, or your government with your internet activity, the value of anonymity becomes clear. The Tor Browser is a web browser that mitigates many of these threats by making your browsing anonymous. Using it, you can create and maintain accounts on various websites, participate in conversation, publish your writing, and get access to information without being surveilled.</p>
+ </div>
+ </center>
+
+ <div>
+
+ <h2>Hiding your web traffic with the Tor Network</h2>
+
+ <p>The first job of the Tor Browser to hide your traffic from your network, your ISP, and to keep your IP address hidden from the websites you visit, and it solves this problem in a very cool way. When you visit a website through the Tor Browser, your traffic is sent through the Tor Network, which is a network of thousands of servers run by volunteers. Your traffic is encrypted three-fold and sent through a randomly-picked three servers in the network, in such a way where no single node can see both your IP address the IP address you're visiting.</p>
+
+ <p>This means that your network and ISP can't know what website you're visiting; it'll just be a bunch of encrypted traffic into the Tor Network. The website you're visiting also won't know where your connection came from, just the IP address of the exit node. And even the tor nodes your traffic was routed through can't simultaneously know your IP address and the address of the website you were visiting. Your three-node "circuit" will automatically rotate periodically as well. Basically it's a proxy/VPN on steroids.</p>
+
+ <p>Now, as mentioned above, it's important to stress that though your traffic is truly hidden, by default your network and ISP *will* know that you're using Tor for /something/. Using Tor is not illegal anywhere in the US (as far as I know?), but it may be suspicious to your network administrator or possibly blocked on your network. If you're worried about your network and ISP knowing you're using Tor, you can use "bridges", which are a fourth optional random proxy your traffic will go through before entering the Tor Network to further obscure the nature of your connection. You can easily enable this in your "connection settings", which will be available right after starting the browser for the first time.</p>
+
+ <p>Also, because your traffic is being passed through so many servers on the way to its destination, keep in mind that browsing will be significantly slower than you're probably used to. It's comfortable enough on a fast home connection, but trying to stream HD video, or using Tor over a mobile connection or with slower home internet can get painful.</p>
+
+ <h2>Anti-fingerprinting</h2>
+
+ <p>Aside from the network, online surveillance is often done through "fingerprinting", where a website can see/query your browser for all sorts of information to build a profile on your connection. The fonts installed on your computer, browser cookies, browser extensions, your screen size and many more variables can be used to build a unique fingerprint and expose you to tracking.</p>
+
+ <p>To stop these kinds of attacks, the Tor Browser has many anti-fingerprinting protections build-in, that attempt to make your connection look like every other Tor users, so no-one seems unique.</p>
+
+ <h3>Letterboxing</h3>
+
+ <p>The Browser uses letterboxing, which is a curious little feature that disguises your screen size by having a certain number of pre-chosen website sizes that the window will snap to. This is hard to describe in words but you'll notice it quickly when you use the Browser. You can resize the window as granularly as you wish, but the website will only grow and shrink in certain particular sizes.</p>
+
+ <h3>No history</h3>
+
+ <p>Every time you close the Tor Browser, all cookies and history is removed, so you'll get a clean start every launch.</p>
+
+ <h3>Hide everything!</h3>
+
+ <p>When information about your browser and operating system are typically sent to website, the Tor Browser will lie and claim every user is using the same devices. It will hide your time zone, your installed fonts, and refuse to use many risky APIs that can be privacy-intrusive.</p>
+
+ <h2>Don't make yourself unique</h2>
+
+ <p>By default, the Tor Browser will use these network and anti-fingerprinting features to make your browser and your connection look as similar as possible to every Tor user, so everyone's traffic is all mingled and indecipherable and difficult to track, but you can definitely break your anonymity by making mistakes when using it. Here are some things to avoid:</p>
+
+ <h3>Don't mix Tor and non-Tor traffic/accounts/identities !!!</h3>
+
+ <li>If you create an anonymous online account using Tor, and then access that account on another device without using Tor, you've deanonymized yourself.</li>
+ <li>If you use Tor to commit a crime, and in another tab you access a personal social media service using the same Tor connection, you've deanonymized yourself.</li>
+ <li>If you start a blog using Tor, and publish a post with your name, you've deanonymized yourself.</li>
+ <li>If you're talking to someone on Tor, and you give them your personal email to talk further, you've deanonymized yourself.</li>
+
+ <p>This is the most common class of mistake Tor users make that leads to arrests. Always understand what information you may be accidentally linking together that could connect your anonymous activities to your personal identity.</p>
+
+ <h3>Mostly, don't configure the browser</h3>
+
+ <p>Because the Tor Browser is designed to make everyone's connection look similar, if you start changing settings or installing extensions, your browser will become more unique and track-able. Almost always try to just stick to the defaults!</p>
+
+ <p>There are a couple notable exceptions to this rule; options that are meant to be played with if you so desire:</p>
+
+ <h4>Security settings</h4>
+
+ <p>In the browser settings, there are three "security levels" you can choose from. Choosing the "safer" options will restrict websites from more potentially-risky activity, at the cost of many more websites not being able to function. I'd recommend defaulting to the most secure option and lowering it if a particular site demands it.</p>
+
+ <h4>Connection settings</h4>
+
+ <p>As mentioned earlier, you can optionally use a bridge to hide the fact that you're using Tor from your network and ISP.</p>
+ </div>
+ </body>
</html>
diff --git a/posts/tor-browser.org b/posts/tor-browser.org
deleted file mode 100644
index 043d19b..0000000
--- a/posts/tor-browser.org
+++ /dev/null
@@ -1,70 +0,0 @@
-#+title: The Tor Browser
-#+subtitle: April 5, 2025
-#+HTML_HEAD_EXTRA: <style>*{font-family: sans-serif !important}</style>
-#+OPTIONS: num:nil toc:nil timestamp:nil
-
-#+ATTR_HTML: :border 2 :rules all :frame border :align center
-| [[https://skylarcloud.xyz][🌎 Home]] | [[https://skylarcloud.xyz/feed.html][📡 My feed]] | [[https://searx.skylarcloud.xyz][🔭 SearXNG]] | [[https://git.skylarcloud.xyz][⚙️ Git Repos]] |
-
-* Intro
-
-The threat of government retaliation for speech hasn't been more clear in decades as it is now in the U.S. under the Trump administration. Journalists, law firms, and polling orgs are being personally targeted by Trump in viewpoint-based lawsuits. Legal permanent residents and writers are being held hostage or sent to El Salvidor-ian labor prisons without charges or due process explicitly for their speech. In the cases of targeted individuals, much of the 'evidence' found by the executive--and often the speech retaliated against--happened online.
-
-When the internet and online social spaces are rife with surveillance, and our online activity is so often tied to our personal identifiers (IP address, name, phone #, email, address, etc.), the job of a malicious government is easy. Every time you fedpost about Trump on Instagram, express support for groups the US is opposed to, or write a controversial article with your name at the top of it, you leave a trail of breadcrumbs--no, a trail of loafs--that tons of organizations and governments can use to learn your political persuasions, and potentially persecute you for them.
-
-When you can't trust your network, your ISP, the sites you're visiting, or your government with your internet activity, the value of anonymity becomes clear. The Tor Browser is a web browser that mitigates many of these threats by making your browsing anonymous. Using it, you can create and maintain accounts on various websites, participate in conversation, publish your writing, and get access to information without being surveilled.
-
-* Hiding your web traffic with the Tor Network
-
-The first job of the Tor Browser to hide your traffic from your network, your ISP, and to keep your IP address hidden from the websites you visit, and it solves this problem in a very cool way. When you visit a website through the Tor Browser, your traffic is sent through the Tor Network, which is a network of thousands of servers run by volunteers. Your traffic is encrypted three-fold and sent through a randomly-picked three servers in the network, in such a way where no single node can see both your IP address the IP address you're visiting.
-
-This means that your network and ISP can't know what website you're visiting; it'll just be a bunch of encrypted traffic into the Tor Network. The website you're visiting also won't know where your connection came from, just the IP address of the exit node. And even the tor nodes your traffic was routed through can't simultaneously know your IP address and the address of the website you were visiting. Your three-node "circuit" will automatically rotate periodically as well. Basically it's a proxy/VPN on steroids.
-
-Now, as mentioned above, it's important to stress that though your traffic is truly hidden, by default your network and ISP *will* know that you're using Tor for /something/. Using Tor is not illegal anywhere in the US (as far as I know?), but it may be suspicious to your network administrator or possibly blocked on your network. If you're worried about your network and ISP knowing you're using Tor, you can use "bridges", which are a fourth optional random proxy your traffic will go through before entering the Tor Network to further obscure the nature of your connection. You can easily enable this in your "connection settings", which will be available right after starting the browser for the first time.
-
-Also, because your traffic is being passed through so many servers on the way to its destination, keep in mind that browsing will be significantly slower than you're probably used to. It's comfortable enough on a fast home connection, but trying to stream HD video, or using Tor over a mobile connection or with slower home internet can get painful.
-
-* Anti-fingerprinting
-
-Aside from the network, online surveillance is often done through "fingerprinting", where a website can see/query your browser for all sorts of information to build a profile on your connection. The fonts installed on your computer, browser cookies, browser extensions, your screen size and many more variables can be used to build a unique fingerprint and expose you to tracking.
-
-To stop these kinds of attacks, the Tor Browser has many anti-fingerprinting protections build-in, that attempt to make your connection look like every other Tor users, so no-one seems unique.
-
-** Letterboxing
-
-The Browser uses letterboxing, which is a curious little feature that disguises your screen size by having a certain number of pre-chosen website sizes that the window will snap to. This is hard to describe in words but you'll notice it quickly when you use the Browser. You can resize the window as granularly as you wish, but the website will only grow and shrink in certain particular sizes.
-
-** No history
-
-Every time you close the Tor Browser, all cookies and history is removed, so you'll get a clean start every launch.
-
-** Hide everything!
-
-When information about your browser and operating system are typically sent to website, the Tor Browser will lie and claim every user is using the same devices. It will hide your time zone, your installed fonts, and refuse to use many risky APIs that can be privacy-intrusive.
-
-* Don't make yourself unique
-
-By default, the Tor Browser will use these network and anti-fingerprinting features to make your browser and your connection look as similar as possible to every Tor user, so everyone's traffic is all mingled and indecipherable and difficult to track, but you can definitely break your anonymity by making mistakes when using it. Here are some things to avoid:
-
-** Don't mix Tor and non-Tor traffic/accounts/identities !!!
-
-- If you create an anonymous online account using Tor, and then access that account on another device without using Tor, you've deanonymized yourself.
-- If you use Tor to commit a crime, and in another tab you access a personal social media service using the same Tor connection, you've deanonymized yourself.
-- If you start a blog using Tor, and publish a post with your name, you've deanonymized yourself.
-- If you're talking to someone on Tor, and you give them your personal email to talk further, you've deanonymized yourself.
-
-This is the most common class of mistake Tor users make that leads to arrests. Always understand what information you may be accidentally linking together that could connect your anonymous activities to your personal identity.
-
-** Mostly, don't configure the browser
-
-Because the Tor Browser is designed to make everyone's connection look similar, if you start changing settings or installing extensions, your browser will become more unique and track-able. Almost always try to just stick to the defaults!
-
-There are a couple notable exceptions to this rule; options that are meant to be played with if you so desire:
-
-*** Security settings
-
-In the browser settings, there are three "security levels" you can choose from. Choosing the "safer" options will restrict websites from more potentially-risky activity, at the cost of many more websites not being able to function. I'd recommend defaulting to the most secure option and lowering it if a particular site demands it.
-
-*** Connection settings
-
-As mentioned earlier, you can optionally use a bridge to hide the fact that you're using Tor from your network and ISP.