How secure is the Tor browser part 1 - Tricks Bangla

Tricks Bangla

Read Write and Share your Knowledge || #1 Bangladeshi mobile and desktop based tech forum and community.


Monday, October 7, 2019

How secure is the Tor browser part 1

Who knows, the most effective thanks to staying anonymous online is to cover behind onions! - No, no vegetables are being talked about here, we are talking about The Onion Router. Which you would possibly know as TOR Browser.
You all know the structure of the onion, one onion features a lot of canopies and one cover opens the opposite, the opposite one opens, the other keeps coming. lots of it helps to stay your identity online without following the thought. Many cybercriminals around the world, computer gurus, even many ordinary users use Tor to urge eliminate the concern of presidency, online advertising, personal data.
In this tune, I'll discuss how you'll be able to stay anonymous online using Tor Browser and also discuss what proportion Secure Tor browser really is. What? Phil could be a lot of pleasure for knowing everything, right? So what is the delay? Read the whole tune-up one breath!

Tor Network:

For people who know a bit about the Deep Web, the Dark Web, hear the Tor Network. Initially, Tor Network could be a global network server; Which was developed by the navy and specifically designed for users worldwide to cover their identities online. The Tor Project could be a non-profit organization; people who see the creation of online privacy tools because of the main focus of research.
To use the Tor network, basically, you need a browser which called the Tor browser. Tor Browser could be a browser modified on the Firefox browser that may be downloaded through the Tor project's official website. Just installing the browser on your system will allow you to attach to the present network, no have to set different settings.
Encrypting your online identity on the Tor network with various Tor servers is then encrypted and directed thereto traffic; As a result, it's impossible to trace your identity. Incognito mode could be a feature in any common browser today, we predict if we open the surf and surf the online, our identity is secret, in fact, it is not. Not only will this save your browsing history within the browser, but your ISP will know where, when and what you're visiting online.

How does Tor work?

What we usually do with a browse on the Internet? Just open your favorite browser(chrome/firefox/opera mini) and enter the address. Then your request goes from your computer to your ISP's computer and your ISP requests a page from your requested web server; Once the page is found, it's sent to your computer.
Notice some facts here; Your ISP always knows which site you wish to go to, and therefore the site you're visiting also knows about your computer and your ISP. Because your IP address goes to the positioning you're visiting. So this can be how our identity gets exposed online, and it doesn't even hide once we take a look at the activity.
Not just this, but the web site you're visiting may have cookies thrown in your browser to trace each one of your internet activities. Some sites also use cookies to indicate you tailored ads to boost the standard of your service; as an example, Google or Facebook use cookies to serve ads to everyone. But some sites may again place cookies in your browser to steal all of your data. So you understand how dangerous our personal information is on the net.
Tor Browser works with Tor Network to urge eliminate these disadvantages and particularly to produce you with online privacy. once you enter an address within the Tor browser to access it; The browser instantly encrypts your traffic and drives that traffic through different Tor servers without having to achieve the net server directly.
Suppose you wish to go to “Trick-Bangla” using Tor from Bangladesh, your traffic is encrypted first so nobody can read your request, then first you may head to the USA server from there to Brazil server, then from Indian server to Russian server only then to specific web server. The request is approached. By the way, it becomes almost impossible to detect exactly where the request came from.
But there are some factors that you simply have to know; Normal Internet traffic encrypts the net traffic between the web site and your computer using SSL certificates. Your internet traffic is first encrypted within the Tor browser and transmitted on all servers without encrypting this data, But from the ultimate server implies that the info from the server is shipped to the ultimate target web server where the info is decrypted if the web site doesn't use SSL (https). And decrypted normal data are often risky for your privacy. So whether or not you utilize https, your data will only be encrypted and encrypted.
Another thing, Tor doesn't cover your entire computer's internet traffic under the Tor network. Only traffic that's visited only by the Tor browser is often hidden. Now suppose your Windows background is updating or any software you've got installed is communicating with its server, during this case, it'll not work and this traffic is able to read your ISP. However, you'll be able to manage your entire computer traffic through a personal server using VPN, even with the dust in your ISP's eyes.

Part 2 link: How secure is the Tor browser? part 2

3rd & last part link: How secure is the Tor browser? 3rd & last part

No comments:

Post a Comment