Search
  • Videos
  • Windows 10
  • 5G
  • Best VPNs
  • Cloud
  • Security
  • AI
  • more
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • Windows 10
    • 5G
    • Best VPNs
    • Cloud
    • Security
    • AI
    • TR Premium
    • Working from Home
    • Innovation
    • Best Web Hosting
    • ZDNet Recommends
    • Tonya Hall Show
    • Executive Guides
    • ZDNet Academy
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

The 10 step guide to using Tor to protect your privacy

3 of 10 NEXT PREV
  • What is Tor?

    What is Tor?

    Tor stands for The Onion Router project.

    The Onion Router (TOR) is a non-profit setup which runs a network designed to improve personal privacy and increase anonymity online by masking Internet traffic, as well as preventing online domains from gathering information about you and your browsing habits.

    Published: July 22, 2016 -- 09:30 GMT (02:30 PDT)

    Caption by: Charlie Osborne

  • What is Tor used for?

    What is Tor used for?

    Tor is used by people who are privacy-conscious -- especially after Edward Snowden's disclosures about the NSA, In addition, the network is used by journalists, people avoiding censorship, businesses and traders in underground markets. You can only access the underbelly of the Internet, known as the "Deep Web" and .onion web addresses -- which are not indexed by standard search engines -- through Tor.

    Published: July 22, 2016 -- 09:30 GMT (02:30 PDT)

    Caption by: Charlie Osborne

  • How does it work?

    How does it work?

    Tor uses relays and nodes ran by volunteers to disguise your traffic and the true origin of your IP address, a de facto network of tunnels rather than a direct line to websites you visit. Instead of sending packets of data directly to a server, this information is bounced to different relay points. By doing so, the network helps you disguise your digital footprint and keep out spying eyes.

    Published: July 22, 2016 -- 09:30 GMT (02:30 PDT)

    Caption by: Charlie Osborne

  • Does Tor encrypt my data and traffic?

    Does Tor encrypt my data and traffic?

    The answer is no. Tor is only a traffic anonymizer and does not encrypt your traffic, but the use of virtual private networks (VPNs) in addition to Tor and staying away from HTTP-based websites will help. Use HTTPS whenever possible.

    Published: July 22, 2016 -- 09:30 GMT (02:30 PDT)

    Caption by: Charlie Osborne

  • Do I have to pay?

    Do I have to pay?

    Tor is free and open-source with a number of developers working on the network, which is compatible with Windows, Mac, Linux/Unix, and Android.

    Published: July 22, 2016 -- 09:30 GMT (02:30 PDT)

    Caption by: Charlie Osborne

  • How do I use Tor?

    How do I use Tor?

    You simply download the browser for PCs and Orbot for Android devices. The software is already configured for you, but as the network relays traffic indirectly, it is unlikely you will reach the same speed levels as before.

    Published: July 22, 2016 -- 09:30 GMT (02:30 PDT)

    Caption by: Charlie Osborne

  • How do I access .onion addresses?

    How do I access .onion addresses?

    The "clear web" is the layer of the Internet which is indexed by search engines including Google. Underneath, you have the "deep web" and "dark web," the latter of which is associated with illegal operations.

    Onion addresses are part of the "deep web," and to access them, you need to know the 16-character code instead of a standard URL. You can find these through deep web search engines, forums and through invitations -- and some companies, such as Facebook, have issued .onion addresses for Tor users.

    Published: July 22, 2016 -- 09:30 GMT (02:30 PDT)

    Caption by: Charlie Osborne

  • How can I stay safe?

    How can I stay safe?

    If you're going to use Tor, you need to understand some of the basics of Internet security. As a standard tip, disable plugins and software which could leave you open to exploit, such as Flash and Java.

    You should keep in mind that Tor does not prevent you from operating system security vulnerabilities -- and considering how many flaws are found in software on Windows, you may want to use a different OS to stay as protected as possible.

    Published: July 22, 2016 -- 09:30 GMT (02:30 PDT)

    Caption by: Charlie Osborne

  • Anonymity isn't fool proof

    Anonymity isn't fool proof

    There are still ways that police agents can scrutinize your activity, so do not consider yourself 100 percent protected just because you are using Tor. If you visit illegal domains, buy or sell illegal goods or download explicit, banned material, Tor may not protect you.

    Published: July 22, 2016 -- 09:30 GMT (02:30 PDT)

    Photo by: Shutterstock

    Caption by: Charlie Osborne

  • So, should I use Tor?

    So, should I use Tor?

    If you want to help anonymize your traffic, do so -- but for tasks which need a high Internet speed such as torrenting, this is not the right solution. In addition, if you want to use the network for illegal activity, this is at your own risk.

    Do not consider Tor as the ultimate solution to security -- it is, instead, one aspect. VPNs and sticking to HTTPS are also important components to protecting yourself and your data.

    Published: July 22, 2016 -- 09:30 GMT (02:30 PDT)

    Photo by: Wikimedia Commons

    Caption by: Charlie Osborne

3 of 10 NEXT PREV
Charlie Osborne

By Charlie Osborne | July 22, 2016 -- 09:30 GMT (02:30 PDT) | Topic: Security

  • What is Tor?
  • What is Tor used for?
  • How does it work?
  • Does Tor encrypt my data and traffic?
  • Do I have to pay?
  • How do I use Tor?
  • How do I access .onion addresses?
  • How can I stay safe?
  • Anonymity isn't fool proof
  • So, should I use Tor?

Here are 10 easy steps to show you how to use the Tor network to mask your browsing habits.

Read More Read Less

How does it work?

Tor uses relays and nodes ran by volunteers to disguise your traffic and the true origin of your IP address, a de facto network of tunnels rather than a direct line to websites you visit. Instead of sending packets of data directly to a server, this information is bounced to different relay points. By doing so, the network helps you disguise your digital footprint and keep out spying eyes.

Published: July 22, 2016 -- 09:30 GMT (02:30 PDT)

Caption by: Charlie Osborne

3 of 10 NEXT PREV

Related Topics:

Security TV Data Management CXO Data Centers
Charlie Osborne

By Charlie Osborne | July 22, 2016 -- 09:30 GMT (02:30 PDT) | Topic: Security

Show Comments
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 3
  • iVerify: Added security for iPhone and iPad users

    I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...

  • iStorage datAshur BT hardware encrypted flash drive

    FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.

  • Netgear BR200 small-business router

    The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...

  • YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections

    The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...

  • Apricorn Aegis Secure Key 3NXC

    The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...

  • YubiKey 5Ci Clear Limited Edition

    Transparency in security.

  • Certo AntiSpy iPhone Spyware Detection

    Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion. ...

ZDNet
Connect with us

© 2021 ZDNET, A RED VENTURES COMPANY. ALL RIGHTS RESERVED. Privacy Policy | Cookie Settings | Advertise | Terms of Use

  • Topics
  • Galleries
  • Videos
  • Sponsored Narratives
  • Do Not Sell My Information
  • About ZDNet
  • Meet The Team
  • All Authors
  • RSS Feeds
  • Site Map
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In
  • Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums