Tor Browser is a service run by volunteers, providing privacy and identity concealment on the Internet by disguising your identity and hiding the sites you contact. The service also protects you from the Tor network itself.
Tor Browser offers an easy and fast way to connect to the Tor network for people who may sometimes need privacy and anonymity when opening websites.
Some of you can be heard about the browser Tor-Tor and privacy of those who thought of browsing the hidden Web DeepWeb They said Tor browser Tor:
The origin of the word Tor Tor is a word consisting of three abbreviated parts The Onion Router
Date of the program Tor Browser Tor:
Was programmed by the staff of the US Naval Research Laboratory (NRL) in 1990 for the purpose of protecting US intelligence contacts on the Internet by detecting them for online routing.
The tool was manufactured in 2002.
In 2004, the US Research Laboratory published the program under the umbrella of the free license.
EFF (Electronic Frontier Foundation) approved funding for the project.
The year 2006 showed the actual tool that protects the privacy and in this period the project funded several sources such as - International Broadcasting Bureau IBB, Human Rights Monitoring HRW, University of Cambridge, Google ... etc
Why did the American Research Laboratory publish the code and make it available free of charge?
This question was asked to one of the National Security Officers NSA said:
"If this device falls into the hands of spiders or even ordinary infiltrators, the more an American intelligence agent uses this tool, the more they say," Oh, look at one of the CIA agents who has entered. "The security solution we saw was to share this tool with all the people. Who is now entering or browsing this page is a security employee or not. "
What is the Tor network?
Is a set of volunteer servers that provide the hiding and safe browsing of people when they use the Internet, by connecting them to the series of virtual tunnels virtual rather than direct connection to the Internet.
How Tor works to hide your connection:
Tor enters the user into a series of encrypted paths passing through a number of switches. This series of circuits called Circuit is a special circle of this client that is known only to the client application. This series of tracks run between nodes and these nodes change periodically with racer tracks at each time period and at each surfing. As in the pictures Green Line: represents the encrypted line.
Red Line: represents the unencrypted font.
The question is: Why is there an unencrypted line
Because Tor cannot encrypt your connection when you log out of servers or Tor browser circles and your connection to the other site server. This is a challenge
Inconsistency against national security attacks complex traffic analysis.
(Do not be afraid of the subject is not so easy to know who entered and left as soon as the button even from the most powerful national security organizations. So I said a challenge and not break hidden, and if you abide by the instructions of use and not to click on everything you see will not hold anything of this.
When you browse Tor for the first time and you want to search for something specific to say "tools Tkir sites" write it in hidden search engines like Ahmia surprised you will not find anything in the search results !! Why !!!
Tor protects websites and their users from their personal identifiers and IP and any information about them.
Therefore, you will find that the Internet sites black or hidden dark-net are in groups and classified within Wikibodies Wikis and cannot be found if you are looking for the traditional way you get accustomed to the normal search engines.
Some disadvantages of using Tor Browser TOR
You will see a huge number of sites that provide contraband such as drugs, weapons, child porn sites (child pornography has been banned both online and not - hidden but hidden on the Internet is difficult to control such acts), sites of scams .... etc.
You can not know who is behind this site or trust it or not (there are lots of sites run by the federal police and others to hunt criminals).
Sites to kill the traffickers, hackers and human organs traders.
Therefore, you should monitor your work and check well above all and know what the purpose of your use of this net.
Here are some tips:
Do not confuse the hidden Internet and Tor, Tor Browser is the portal to the hidden Internet and is not the hidden Internet!
I did not explain Tor and all the terms in detail, this is not my task but your task, all I have to tell you on the right path and you have to cut it yourself.
I also want to understand the simplest explanations how things work around you in a simplified way, because you are a user do not need to know the complexity that lies behind how these tools work.
Example: We all know that antivirals protect you from viruses but do you know how? Do you know how viruses are built primarily? Do you really need to know all this to use anti-virus? I do not think so.
An example of our real life, most of us take the panadol pills when it hurts his head or feels his headache, but does he know how this medicine works in the body? Does he need to know that mainly if he is only a consumer or a user of his! ... etc. So also be an explanation of things. If you ask why do not explain in detail.
I did not explain in part how to protect yourself when you use Tor or some of the national security tactics in Tor. I will explain that God willing if God wrote my age for that time.
If you want to use this website to access Facebook or Twitter for normal communication, you are advised to use the worldwide internet.
ليست هناك تعليقات:
إرسال تعليق