diff options
author | Your Name <you@example.com> | 2025-04-05 00:00:11 -0600 |
---|---|---|
committer | Your Name <you@example.com> | 2025-04-05 00:00:11 -0600 |
commit | c3ee1fee1d02ae71f9b40a942e4245c6193aa478 (patch) | |
tree | d97a6cf3f28292e731505f81822cf351caf7848e /feed.org | |
parent | 88b5e102fa352b900cdc74df757e1c8f5386ed01 (diff) |
feed
Diffstat (limited to 'feed.org')
-rw-r--r-- | feed.org | 8 |
1 files changed, 4 insertions, 4 deletions
@@ -35,18 +35,18 @@ When you can't trust your network, your ISP, the sites you're visiting, or your The first job of the Tor Browser to hide your traffic from your network, your ISP, and to keep your IP address hidden from the websites you visit, and it solves this problem in a very cool way. When you visit a website through the Tor Browser, your traffic is sent through the Tor Network, which is a network of thousands of servers run by volunteers. Your traffic is encrypted three-fold and sent through a randomly-picked three servers in the network, in such a way where no single node can see both your IP address the IP address you're visiting. -This means that your ISP can't know what website you're visiting; it'll just be a bunch of encrypted traffic into the Tor Network. The website you're visiting also won't know where your connection came from, just the IP address of the exit node. And even the nodes your traffic was routed through can't simultaneously know your IP address and the address of the website you were visiting. Your three-node "circuit" will automatically rotate periodically as well. Basically it's a proxy/VPN on steroids. +This means that your network and ISP can't know what website you're visiting; it'll just be a bunch of encrypted traffic into the Tor Network. The website you're visiting also won't know where your connection came from, just the IP address of the exit node. And even the tor nodes your traffic was routed through can't simultaneously know your IP address and the address of the website you were visiting. Your three-node "circuit" will automatically rotate periodically as well. Basically it's a proxy/VPN on steroids. -Now, as mentioned above, it's important to stress that though your traffic is truly hidden, by default your network *will* know that you're using Tor for /something/. Using Tor is not illegal anywhere in the US (as far as I know?), but it may be suspicious to your network administrator or possibly blocked on your network. If you're worried about your network knowing you're using Tor, you can use "bridges", which are a fourth optional random proxy your traffic will go through before entering the Tor Network to further obscure the nature of your connection. You can easily enable this in your "connection settings", which will be available right after starting the browser. +Now, as mentioned above, it's important to stress that though your traffic is truly hidden, by default your network and ISP *will* know that you're using Tor for /something/. Using Tor is not illegal anywhere in the US (as far as I know?), but it may be suspicious to your network administrator or possibly blocked on your network. If you're worried about your network and ISP knowing you're using Tor, you can use "bridges", which are a fourth optional random proxy your traffic will go through before entering the Tor Network to further obscure the nature of your connection. You can easily enable this in your "connection settings", which will be available right after starting the browser for the first time. -Also, because your traffic is being passed through so many servers on the way to its destination, keep in mind that browsing will be significantly slower than you're probably used to. It's comfortable enough on a fast home connection, but trying to use Tor over a mobile connection or with slower home internet can get painful. +Also, because your traffic is being passed through so many servers on the way to its destination, keep in mind that browsing will be significantly slower than you're probably used to. It's comfortable enough on a fast home connection, but trying to stream HD video, or using Tor over a mobile connection or with slower home internet can get painful. ** Anti-fingerprinting :PROPERTIES: :ID: 1baaf1c5-6a3c-4828-b931-0e678567da83 :END: -Aside from the network, online surveillance is often done through "fingerprinting", where a website can see/query your browser for all sorts of information to build a profile on your connection. The fonts installed on your computer, browser cookies, browser extensions, your screen size and many more variables can be used to build a unique fingerprint and expose yourself to tracking. +Aside from the network, online surveillance is often done through "fingerprinting", where a website can see/query your browser for all sorts of information to build a profile on your connection. The fonts installed on your computer, browser cookies, browser extensions, your screen size and many more variables can be used to build a unique fingerprint and expose you to tracking. To stop these kinds of attacks, the Tor Browser has many anti-fingerprinting protections build-in, that attempt to make your connection look like every other Tor users, so no-one seems unique. |