know everything about you if you’re not taking care to anonymise
yourself correctly.
Using tor
The Tor Project has done a grand job of making it super-easy
to install and run; it’s not much more complex than going to
http://www.torproject.org, grabbing the installer, running that, and
using the Tor Browser. You can ignore the Configure options
when Tor is first run – they’re for connecting via a proxy, and can
be set from within the browser later if need be.
If the Tor browser looks familiar, it’s because it’s a respin of
Firefox, tooled to work directly with Tor, offering specific settings,
pre-configured plugins, and security certified to be as secure as
possible out of the box. A regular warning is not to use random
plugins or indeed other browsers (especially Chrome) over Tor,
because you haveno idea what tracking they might
haveimplementedwithinthem.However,therearetwo
defaultpluginsthatwe’llcovershortly,explainingwhy
they’resohandy.
By default, Tor forgets and wipes everything from
sessiontosession,becauseit’sinwhatit calls‘Permanent
private browsingmode’. Ifyou’reafter a morecasual
browsing mode, you might want to select Menu >
Options > Privacy &Security,anddisable Always use
private browsing mode under History. This forces a
restart,andretainscookiesandyourbrowsinghistory– if
you’reafterhigheranonymity,thisis notrecommended.
Movingsecurityinthestrongerdirection,theShield
iconinthetoolbar– ortheMenu>Options>Privacy&
© EFF.ORG, CC BY 3.0 US Security> Securitysection– offersthreedistinctsecurity
Take a look at how much privacy
protection Tor and HTTPS offer
when used. Without either Tor
or HTTPS at every step in the
process, anybody with access to
your connection can potentially
snoop on all your activity,
including the destination site,
your username and password,
your user data, and your location.
Using HTTPS helps to
protect your user data, and your
usernameandpasswordatall
stages.
UsingTormasksyour
destinationsite,usernameand
password,data,and,toa certain
degree, yourlocation.Addinga
VPNwouldfurtherprotectyour
locationdetails,butweshould
pointoutthattherecouldbe
governmentbodiesdirectly
accessingISPdataorthesite.com
servicesviaunknownsnooping
TOR AND HTTPS IN USE
SITE.COM
USER/PW
DATA
LOCATION
SITE.COM•
- USER/PW•
- DATA•
LOCATION
- DATA•
SITE.COM•
- USER/PW•
- DATA•
LOCATION
- DATA•
SITE.COM•
- USER/PW•
- DATA•
LOCATION
- DATA•
SITE.COM•
- USER/PW•
- DATA•
LOCATION
- DATA•
SITE.COM
USER/PW
DATA
LOCATION•
SITE.COM
USER/PW
DATA
LOCATION•
SITE.COM
USER/PW
DATA
LOCATION•
SITE.COM
- USER/PW
- DATA
LOCATION•
- DATA
SITE.COM
- USER/PW
- DATA
LOCATION•
- DATA
SITE.COM•
- USER/PW•
- DATA•
LOCATION
- DATA•
SITE.COM•
USER/PW•
DATA•
LOCATION
SITE.COM•
USER/PW•
DATA•
LOCATION•
SITE.COM•
- USER/PW
- DATA
LOCATION•
- DATA
KEY
HIDDEN BY TOR
HIDDEN BY HTTPS
INTERNET CONNECTION
EAVESDROPPING
DATA SHARING
TOR NETWORK
April 2020 | |^45
Advanced Windows 10
Browse anonymously with Tor