TOR: private and anonymous surfing
TOR: private and anonymous surfing
TOR In this day and age, ensuring our privacy when surfing the Internet is a challenge and it makes sense to be concerned about protecting our personal information, preserving our individual freedom, avoiding unwanted tracking and protecting confidential information.
Many of you may think that using a Virtual Private Network (VPN) guarantees our privacy, but this is certainly not the case. VPN if used correctly and a reliable VPN provider is chosen, a VPN connection can significantly improve the user’s privacy online, but it cannot guarantee absolute privacy.
So from Business Adapter®, we will analyze another option that promises private and anonymous surfing on the Internet; it is The Onion Router (TOR).
What is TOR?
TOR is an anonymous communications network that allows users to browse the Internet in a more secure and private way, i.e. anonymously, since it hides the IP address and redirects the browsing traffic through different routers, which are called nodes, encrypting the information.
How did TOR come about?
In the 1990s, the lack of security on the Internet, as well as the ease of detecting users, prompted the U.S. Navy to consider how it could protect intelligence communications from potential attacks.
It later became an open source project managed by a non-profit organization.
How does TOR work?
TOR works by routing traffic through a series of volunteer servers distributed around the world, making it extremely difficult for anyone to trace a user’s Internet activity back to its source.
It uses a layered encryption technique (hence the name“Onion“) to hide the user’s identity and the information transmitted.
Who can use TOR?
In principle, the TOR browser is open to everyone, so anyone can go to the official website of The Onion Router and download the browser, without any restrictions. And what’s more, it’s free!
Is the use of TOR illegal?
TOR is not illegal to use, although its use has been associated with illegal activities due to its ability to hide users’ identities. However, it is also widely used by journalists, activists and people living in countries with Internet censorship to access information and services securely and without restrictions.
It should be noted that in some countries, TOR is banned, for example in China and Russia.
The use of TOR and how to navigate the Deep web and the Dark web is the responsibility of the individual user.
Advantages of using TOR
We detail five advantages of using TOR:
Online anonymity:
TOR hides the user’s IP address and masks the user’s online activity, providing a high level of anonymity. This makes it difficult for websites, governments or other third parties to track the user’s online activities.
Improved privacy:
By routing traffic through a network of encrypted servers, TOR helps protect user privacy by preventing Internet service providers (ISPs), advertisers and other third parties from collecting browsing data and profiling the user.
Security in public networks:
When used on public Wi-Fi networks, TOR can add an additional layer of security by encrypting traffic, which helps protect the user’s personal and confidential information from interception and hacker attacks.
Access to blocked content:
TOR can circumvent Internet censorship and blockages, allowing users to access content that may be restricted or banned in certain geographic regions. This is especially useful for people living in countries with online censorship.
Support for freedom of expression:
TOR is used by journalists, activists and human rights defenders to communicate securely and without fear of government repression. It facilitates the exchange of sensitive information and the reporting of human rights abuses anonymously and securely.
Disadvantages of using TOR
But not everything is good for this browser, we also find some things that are not so good, such as:
Privacy bangs:
It is important to note that although TOR provides the possibility of browsing with privacy and anonymity on the network, absolute anonymity does not exist, so you could be tracked if, for example, you provide any identifying information, such as passwords, name, email, or something that can identify you, can make you “visible” while browsing.
It should also be noted that the Internet Service Provider (ISP) we are using will know whether we are connected to TOR or not.
Reduced connection speed:
Due to the routing through multiple nodes of the TOR network, the connection speed can be significantly slower compared to standard Internet browsing. This is because each node adds some latency to the communication process.
Possible association with illegal activities:
Although TOR is legitimately used to protect privacy and circumvent online censorship, it has also been associated with illegal activities, such as drug trafficking, child pornography and the sale of illegal products on dark web marketplaces. This can generate a negative reputation for TOR users and may attract unwanted attention from authorities.
Potential vulnerabilities:
Although TOR is designed to provide anonymity and privacy, it is not foolproof. Vulnerabilities have been identified in the past that could potentially compromise the security and anonymity of users. In addition, malicious websites may take advantage of these vulnerabilities to attempt to identify or track TOR users.
Possible blockages and restrictions:
Some online services may block access to TOR users due to concerns about abuse or malicious activity. This may result in the inability to access certain websites or services while using TOR.
Technical complexity:
To use TOR effectively, users may need a certain level of technical knowledge to properly configure the software and understand how the network works. This can present a barrier for less experienced or less technical users who may find the process confusing or intimidating.
TOR and Data Protection
The AEPD in 2020 published a document called “Measures to minimize tracking on the Internet” where it already talked about the TOR browser, for advanced users who wanted to achieve a higher level of control and protection against unwanted tracking on the Internet.
However, the AEPD itself points out that using these browsers inappropriately can pose other risks to privacy and security in our connections.
On the other hand, INCIBE recommends using search engines other than Google, Yahoo or Bing, which are less privacy intrusive and do not collect personal information, such as:
Business Adapter® at your service
If you want information about the scope that the Data Protection Regulation has in your business, contact us by email: info@businessadapter.es, you can also call 96 131 88 04, or leave your message in this form:
[su_button url=”https://businessadapter.es/contacto” target=”blank” background=”#f6f903″ color=”#181818″ size=”7″ center=”yes” icon_color=”#000000″]Contact us, we will be pleased to help you.[/su_button]