Windows Help & Advice - UK (2020-04)

(Antfer) #1
know everything about you if you’re not taking care to anonymise
yourself correctly.

Using tor
The Tor Project has done a grand job of making it super-easy
to  install and run; it’s not much more complex than going to
http://www.torproject.org, grabbing the installer, running that, and
using the Tor Browser. You can ignore the Configure options
when Tor is first run – they’re for connecting via a proxy, and can
be set from within the browser later if need be.
If the Tor browser looks familiar, it’s because it’s a  respin of
Firefox, tooled to work directly with Tor, offering specific settings,
pre-configured plugins, and security certified to be as secure as
possible out of the box. A regular warning is not to use random
plugins or indeed other browsers (especially Chrome) over Tor,

because you haveno idea what tracking they might
haveimplementedwithinthem.However,therearetwo
defaultpluginsthatwe’llcovershortly,explainingwhy
they’resohandy.
By default, Tor forgets and wipes everything from
sessiontosession,becauseit’sinwhatit calls‘Permanent
private browsingmode’. Ifyou’reafter a morecasual
browsing mode, you might want to select Menu >
Options > Privacy &Security,anddisable Always use
private browsing mode under History. This forces a
restart,andretainscookiesandyourbrowsinghistory– if
you’reafterhigheranonymity,thisis notrecommended.
Movingsecurityinthestrongerdirection,theShield
iconinthetoolbar– ortheMenu>Options>Privacy&
© EFF.ORG, CC BY 3.0 US Security> Securitysection– offersthreedistinctsecurity


Take a look at how much privacy
protection Tor and HTTPS offer
when used. Without either Tor
or HTTPS at every step in the
process, anybody with access to
your connection can potentially

snoop on all your activity,
including the destination site,
your username and password,
your user data, and your location.
Using HTTPS helps to
protect your user data, and your

usernameandpasswordatall
stages.
UsingTormasksyour
destinationsite,usernameand
password,data,and,toa certain
degree, yourlocation.Addinga

VPNwouldfurtherprotectyour
locationdetails,butweshould
pointoutthattherecouldbe
governmentbodiesdirectly
accessingISPdataorthesite.com
servicesviaunknownsnooping

TOR AND HTTPS IN USE


SITE.COM
USER/PW
DATA
LOCATION

SITE.COM•


  • USER/PW•

    • DATA•
      LOCATION




SITE.COM•


  • USER/PW•

    • DATA•
      LOCATION




SITE.COM•


  • USER/PW•

    • DATA•
      LOCATION




SITE.COM•


  • USER/PW•

    • DATA•
      LOCATION




SITE.COM
USER/PW
DATA
LOCATION•

SITE.COM
USER/PW
DATA
LOCATION•

SITE.COM
USER/PW
DATA
LOCATION•

SITE.COM


  • USER/PW

    • DATA
      LOCATION•




SITE.COM


  • USER/PW

    • DATA
      LOCATION•




SITE.COM•


  • USER/PW•

    • DATA•
      LOCATION




SITE.COM•
USER/PW•
DATA•
LOCATION

SITE.COM•
USER/PW•
DATA•
LOCATION•

SITE.COM•


  • USER/PW

    • DATA
      LOCATION•




KEY
HIDDEN BY TOR
HIDDEN BY HTTPS
INTERNET CONNECTION
EAVESDROPPING
DATA SHARING
TOR NETWORK

April 2020 | |^45


Advanced Windows 10


Browse anonymously with Tor

Free download pdf