Hello friends and welcome to nextiseasy. If you want to use your Internet safely and you don't want anyone to track your IP. And you also want to bounce your IP from one place to another? But you don't know HOW? then this articles will help you. Read this at the last and we will talk about the Tor Browser, How is it Works, Is it safe and other...
WHAT IS TOR BROWSER?
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained (portable).
WHO USES TOR AND WHY?
Anonymity is Tor’s bread and butter, and as such it is probably impossible to ever get a comprehensive view of its userbase. There are certain trends that become apparent, however, and some Tor advocates are especially vocal about their reasons for using the service.
Tor has become popular with journalists and activists in countries with restrictions on the Internet and expression. Countries like China are known for censoring their citizens’ access to the Web; Tor provides a way around this control.
For whistleblowers, Tor provides a safe avenue to leak information to journalists. In fact, Edward Snowden released information on the NSA’s PRISM program to news organizations via Tor. One doesn’t need to be a freedom fighter to appreciate Tor, however. Many academics and ordinary citizens endorse Tor as a tool to keep privacy and freedom of expression alive in the Information Age.
To be fair, the fact that Tor allows such communities to grow is troubling. However, it is important to note that criminal activity on Tor is a consequence, not a goal, of the Project’s commitment to freedom of expression.
HOW DOES TOR WORKS?
The Tor network runs through the computer servers of thousands of volunteers (over 4,500 at time of publishing) spread throughout the world. Your data is bundled into an encrypted packet when it enters the Tor network. Then, unlike the case with normal Internet connections, Tor strips away part of the packet's header, which is a part of the addressing information that could be used to learn things about the sender such as the operating system from which the message was sent.
Finally, Tor encrypts the rest of the addressing information, called the packet wrapper. Regular Internet connections don't do this either.
The modified and encrypted data packet is then routed through many of these servers, called relays, on the way to its final destination.The roundabout way packets travel through the Tor network is akin to a person taking a roundabout path through a city to shake a pursuer.
Each relay decrypts only enough of the data packet wrapper to know which relay the data came from, and which relay to send it to next. The relay then rewraps the package in a new wrapper and sends it on.
The layers of encrypted address information used to anonymize data packets sent through Tor are reminiscent of an onion, hence the name. That way a data packet's path through the Tor network cannot be fully traced.
Some regular Internet data packets are encrypted using a protocol called Secure Socket Layer (SSL) or its newer, stronger cousin Transport Layer Security (TLS). For example, if you submit your credit card information to an online store, that information travels across the network in an encrypted state to prevent theft.
However, even when you use SSL or TLS, it's still possible for others to intercept those packets and see the information's metadata — who sent that encrypted information and who received it — because the addressing wrappers in SSL or TLS are not encrypted. In Tor, they are, which hides the sender and receiver of a given transmission.
Further, if you use the Tor Browser to visit a website that does not use encryption to secure users' connections, then your data packet will not be encrypted when it makes the final hop from the last Tor relay to the website's server. That's because the data packet's destination lies outside the Tor network. So it's best to be sure that a website offers some kind of SSL or TLS encryption, usually denoted by an "https" instead of simply "http" in the Web address, before trying to access it anonymously.
IS TOR SECURE?
However, documents leaked by former National Security Agency (NSA) contractor Edward Snowden show that the NSA has tried to crack, infiltrate or weaken any encryption that the
agency does not itself control.
In light of this news, nearly all independent encryption and online communication services have become suspect, including Tor.
MORE INFORMATION
It contains Tor, a modified Firefox ESR, Torbutton, TorLauncher, NoScript, and HTTPS-Everywhere. Read the design document, the ChangeLog for the branch maint-6.5, and the ChangeLog for the alpha branch.
How can I make my own bundle?
We use Gitian to ensure that byte-for-byte reproducible packages can be built from our source repository by anyone. To rebuild the bundle, check out the Tor Browser builder repository and see the README.build for instructions. You may also find the Tor Browser Hacking intro document useful for learning about the build system and our development processes.
Where else can I get Tor Browser?
In some countries the Tor Project website is blocked or censored and it is not possible to download Tor directly. The Tor Project also hosts a mirror of Tor Browser Bundle on Github.
If you any Question or queries related to TOR browser please free to comment we will answer in 18 hours...
Thanks for Reading...
CREDITS
[1]https://www.torproject.org/projects/torbrowser.html.en
[2]http://www.digitaltrends.com/computing/a-beginners-guide-to-tor-how-to-navigate-through-the-underground-internet/
[3]http://www.tomsguide.com/us/what-is-tor-faq,news-17754.html
[4]http://pinterest.com
0 comments:
Post a Comment