If you are concerned about browsing discreetly, this makes it easier:
The latest Tor Browser is a specially packaged version of Firefox 102 ESR which does all the hard work of setting up a TOR connection.
Version 12 of the Tor Browser is a specially packaged version of Firefox 102, the current Extended Support Release (ESR) and already one of the more secure browser choices. Available for Windows, Linux, and macOS (as a special fat binary that runs natively on both x86-64 and Arm Macs), the Tor Browser bundles together the web browser and a client for The Onion Router, or TOR for short.
Tor 12.0, say the project's leaders, is the first stable release of the browser that supports the Albanian and Ukrainian languages, and thanked "all the volunteers who worked hard to translate Tor Browser into each language."
The Reg has covered TOR a few times over the years, and we don't want to repeat ourselves too much. There are two purposes for accessing the internet over TOR. One is for accessing the normal internet: using TOR hides where you're coming from, so you can't be tracked by your IP address, or even the general geographic region you're in. This makes it much disliked by repressive national governments, which is a good thing in general, really.
The other is for accessing websites that are only visible on the TOR network. These usually have a string of hexadecimal in (or for) their name, but they all end in .onion, which is a special protected name, not used on the normal internet. This doesn't only mean internet drug bazaars such as the Silk Road, although that's probably the most famous example. There are legal uses too. For instance, even the BBC approves of it and hosts a version of its own site on it.
(Score: 2) by VLM on Tuesday December 13, @05:00PM (4 children)
"In the Old Days" you had to set up privoxy between your browser and your tor or sites would just set tracking cookies like crazy anyway. Of course someone could probably do something inside the browser that's similar-enough-ish.
"Everyone" used to assume the outproxies are mostly hosted and logged by the NSA or whomever. True? False? Donno?
Its an interesting proposal that a national secret police force need only host the majority of outproxies in their country to obtain a majority of the outproxy traffic and running an outproxy is not terribly popular, so the effort required can't be that high. ".gov" must be doing something with all that AWS spend, LOL.
(Score: 1, Interesting) by Anonymous Coward on Tuesday December 13, @05:21PM (2 children)
Yes, TOR is a honeypot, just like Telegram and Signal. Publicly available electronic communications are not secure. One time use of burner phones are as close as you can get
(Score: 2) by jasassin on Thursday December 15, @12:50PM (1 child)
I disagree. I use signal because it is a great way to video chat with my friends in other parts of the world.
jasassin@gmail.com GPG Key ID: 0x663EB663D1E7F223
(Score: 0) by Anonymous Coward on Monday December 19, @07:41PM
Yes it is.. That doesn't mean it can't be a honeypot
(Score: 2) by jasassin on Thursday December 15, @12:47PM
I wonder also. Is having a VPN any better than having threatening PGP signed copyright violation letters sent to your ISP (who might give a rats ass less) or a VPN (that is a douche)?
Who knows. I think it's a case by case basis.
jasassin@gmail.com GPG Key ID: 0x663EB663D1E7F223