Is Downloading Tor Safe

Sep 22, 2016  Page 1 of 2 - Is Tor totally safe? - posted in General Security: Firstly, Id like to sorry if this question sounds stupid to you Im intending to use Tor to replace Chrome & Firefox. I heard that. What is Tor browser, and is it safe? Note: If you'd like to increase your privacy online without downloading Tor software, click here for tips on disabling web browser tracking.

On October 29-30 in Sao Paulo, Brazil, the Hackers to Hackers Conference will occur, and one of its presentations will be about how the Tor anonymizing network was compromised by French researchers. Tor, in case you don’t keep up with internet security and obscurity, is a network of nodes that randomize your path through the internet, making it harder to track what sites and services you use. Traffic on the internet is a series of hops from router to router and network to network, and in Tor each network node has only the name of the relay it was handed the information from and the relay it handed the information to — so a full path of the traffic destination is never known. That way compromised nodes can’t be used to monitor traffic.

What basically happens is that you connect to the Tor network via an encrypted connection. All requests you make through the network are bounced around inside for a while, and then exit the network at a random point and hit your destination. The return packet hops back into the Tor network and repeats the steps in reverse, bouncing around inside and then returning via your encrypted connection. Anyone watching your connection will see only encrypted traffic, and anyone watching the site you’re going to will see random traffic coming from some random spot on the internet. You can picture the internet as a giant cloud (as everyone likes to do); Tor is an encrypted cloud that resides inside the bigger internet cloud that you can’t see into, or even very far if you happen to be in it.

This doesn’t make you completely safe on the internet, however. If an attacker can see the traffic leaving your computer and also the traffic arriving where you want to go, an end-to-end timing attack can occur with a statistical analysis used to figure out how likely it is for that traffic to be you. It’s also an important point that Tor alone isn’t enough to protect your online browsing habits.

The breach of Tor that will be revealed at Hackers to Hackers wasn’t released with much in the way of real information; The blog at Torproject.org has a written response to the incident and is worth a read to try and separate sensationalism from fact. It seems clear that Tor isn’t positive that a compromise has occurred, and in fact take the stance that this is a fact of life; it’s what makes security better. Innovation is often driven by competition and adversity, after all.

Installing and using Tor

The most common use of Tor is the Tor Browser Bundle for Windows, Mac, and Linux, which is easy to install and use. The Browser Bundle is basically just a portable, standalone version of Firefox — you run it when you want to surf anonymously, and you switch back to your usual browser of choice when you’re finished. There are some caveats to surfing with the Tor Browser, so be sure to read the warnings on the download page before you dive in.

In testing, both Google Chrome and Internet Explorer 8 shows the same IP address, while the Tor browser showed an IP address based in the Netherlands. Warnings of Google captchas and other security warnings occurred regularly, and many sites seemed broken. It forces one to think about how much information is leaked to companies just to assure a standard browsing experience.

If you’d rather something a little more granular than an entire browser, the Tor Download page has a bunch of other options, including packages for your Android or iOS device, or standalone versions of Tor that can be used for more than just browser traffic.

Tor is a bit slower than your normal browsing experience, but that’s the price you pay for relative obscurity. Come Hacker to Hacker perhaps it’ll emerge that the Tor network isn’t safe at all; that it’s just as dangerous as the rest of the internet. That, in turn, will make Tor more safe as those intent upon safety through anonymity innovate to close the doors and windows open to the world. Every system has it’s faults. In a world where you can only be as safe as possible and never completely safe, take safe as possible every time.

Read more of ExtremeTech’s security, privacy, and hacking coverage

Q. I've heard you talk about a software called Tor before, but what does it do? Is it safe to download? And is it available to everyone? - Richard M.; listens on 880 AM WCBS, New York.

A. This is a great question, Richard, because Tor software is often the subject of controversy. If you're considering downloading this software, you need to be aware of the pros and cons, especially since Tor will allow you to browse through some pretty dark areas of the internet.

What is Tor?

In its simplest definition, Tor is a web browser software that conceals your identity when you're online. It does this in a few different ways. First, it uses encryption to scramble the data that's being communicated within the network. Second, it routes that data between random servers within the Tor network to hide your online identity, including data tied to your personal IP address.

Tor

What is Tor used for?

You've probably heard some unnerving things associated with Tor. We're not going to pretend there isn't truth to those claims. Tor can be used for good things and bad.

Positives: The best thing about Tor is that it provides anonymity for people who would want to browse the web without being tracked by their internet service provider, websites, the government and other interest parties. You can also use Tor to access services that are blocked by some internet providers, or governments.

Note: If you'd like to increase your privacy online without downloading Tor software, click here for tips on disabling web browser tracking.

Negatives: It's true that Tor has a dark side. Not the software itself, but the places to where it grants access on the internet. You may have heard the term 'Dark Web' before. This is a portion of the internet that is often used for illegal activities such as child pornography, the sale of drugs, prostitution, etc. Tor software is needed to access the Dark Web, so needless to say, using the software could lead you into some pretty dark places. Click here for more information on the Dark Web and what's hiding in the shadows of the internet.

Is Tor safe?

The easiest answer: Yes, and no. The software itself is safe to use. And, if you're using it for its basic function of hiding your online identity, then you shouldn't run into any trouble. However, if you're using Tor with the intent of accessing the Dark Web, then you could easily encounter more than you bargained for.

What does Tor cost?

Tor software is free to download, however, you may be asked by the software's developers to make a donation. You are not obligated to do so, but there are various sections of the Tor website where donations are requested.

Is Tor Browser Safe On Android

Final verdict

Is Tor Browser Safe Quora

Although Tor does have its benefits, it is an extreme way to obtain online anonymity, and should only be used by those who find it absolutely necessary. Because of the risks associated with the Dark Web, Tor may not be the best option for the average internet user. Instead, try the tips in these articles to gain more privacy online, no special software required.

Downloads Links

Is Tor Browser Safe Reddit

Get security alerts as they happen.

Is Downloading Tor Safe Mode

Stay ahead of breaches, recalls, frauds and scams with Kim's Alerts newsletter.