Business Education Science Technology Uncategorized

What is Tor Browser? Software for protecting your identity online

Teeth Whitening 4 You
<ins class='dcmads' style='display:inline-block;width:728px;height:90px' data-dcm-placement='N46002.3910832MAHOGANYREVUE/B29181624.356591058' data-dcm-rendering-mode='iframe' data-dcm-https-only data-dcm-gdpr-applies='gdpr=${GDPR}' data-dcm-gdpr-consent='gdpr_consent=${GDPR_CONSENT_755}' data-dcm-addtl-consent='addtl_consent=${ADDTL_CONSENT}' data-dcm-ltd='false' data-dcm-resettable-device-id='' data-dcm-app-id=''> <script src='https://www.googletagservices.com/dcm/dcmads.js'></script> </ins>

Tor Browser offers the best anonymous web browsing available today, and researchers are hard at work improving Tor’s anonymity properties.

Tor logo on a smartphone
Credit: Daniel Constante / Shutterstock
Tor Browser definition

The Tor Browser is a web browser that anonymizes your web traffic using the Tor network, making it easy to protect your identity online.

If you’re investigating a competitor, researching an opposing litigant in a legal dispute, or just think it’s creepy for your ISP or the government to know what websites you visit, then the Tor Browser might be the right solution for you.

A few caveats: Browsing the web over Tor is slower than the clearnet, and some major web services block Tor users. Tor Browser is also illegal in authoritarian regimes that want to prevent citizens from reading, publishing, and communicating anonymously. Journalists and dissidents around the world have embraced Tor as a cornerstone of democracy online today, and researchers are hard at work improving Tor’s anonymity properties.

Advantages of using Tor Browser

Tor Browser offers users many advantages, including the following:

  • Anonymity: By routing your web traffic through a series of nodes, Tor Browser separates your IP address, making it difficult for other entities to track your activity or unmask your identity online.
  • Privacy: Tor’s protocols encrypt your traffic at each node, making it additionally challenging to monitor your activity online.
  • Free and open source: Code for the Tor Browser is open source and freely available for inspection and modification. It is also free of the kinds of compromises commercial browser vendors make in developing and maintaining their products.
  • Access to the .onion sites and the dark web: Tor enables users to navigate to certain websites not available on the clearnet.

Why do people use Tor Browser?

Tor users use Tor Browser for a variety of reasons, but for the main part they do so to have greater anonymity online. This may be because they want to protect their privacy from marketers or identity thieves, or to protect their communications and online activity from being tracked by corporations or government entities. Whistleblowers, journalists, citizens of autocratic regimes are among those who benefit from the anonymity that Tor Browser gives its users, as do IT professionals, executives, lawyers, military professionals, and many others who need to have their work communications and activities cloaked for a variety of reasons, including investigating competitors and keeping strategies confidential. And yes, some Tor users leverage the browser to bypass restricted contact, consume illegal materials, or participate in illegal activities.

Tor Browser’s levels of security

Tor Browser offers three levels of security:

  • Standard, which uses Tor’s onion routing (see below) and encryption
  • Safer, which also disables additional web features for increased security, including JavaScript on non-HTTPS sites
  • Safest, which disables JavaScript on all websites

Where to download Tor Browser

Tor Browser is available for Linux, Mac, and Windows, and has also been ported to mobile. You can download desktop versions from the Tor Project website. If you’re on Android, find Tor Browser or Orbot on the Google Play Store or F-Droid. iOS users can grab Onion Browser, which the Tor Project has endorsed in conjunction with Orbot, from the Apple App Store.

How to use the Tor Browser on mobile and cell phones

More and more people are browsing the web from their phones, and in poorer parts of the world that are mobile first, people are browsing the web only from their phones. As a result, the Tor Project is invested in building a better Tor Browser for mobile phone users.

In September 2019, the Tor Project announced the official release of Tor Browser for Android, replacing the Guardian Project’s Orfox as the officially endorsed Tor Browser for Android. (The Guardian Project’s similarly named Orbot, a Tor proxy for Android that lets you tunnel all your app traffic over Tor, not just web traffic, continues to be alive and well.)

Due to technical restrictions on Apple’s proprietary iOS platform, the Tor Project has not yet released an official Tor Browser for iPhone and iPad users, but endorses Onion Browser for iOS users who want to browse the web anonymously. Onion Browser maintains a change log of release notes, including security issues and results of previous security audits on GitHub.

How to use the Tor Browser on macOS and Windows

The Tor Project offers Tor Browser for macOS, Windows, and Linux, as well as Android. From a macOS or Windows desktop, navigate via web browser to the Tor Browser download page and select the version for your operating system. From there, the Electronic Freedom Foundation maintains a thorough step-by-step guide for installing and using Tor Browser on macOS and Windows.

How to use Tor Browser

For most people, using Tor Browser is as simple as downloading it and running it, the same way you’d download Chrome or Firefox.

If you’ve never used Tor, the first thing you’ll notice is that it’s slow — or at least, slower than regular internet browsing. Still, Tor has gotten quite a bit faster over the years, and with a good internet connection, you can even watch YouTube videos over Tor.

Tor Browser gives you access to .onion websites that are available only within the Tor network. For instance, try to access The New York Times at https://www.nytimes3xbfgragh.onion/ and Facebook at https://www.facebookcorewwwi.onion using a regular web browser. Go on. We’ll still be here when you get back. Didn’t work, did it? You can only reach these sites over Tor. This makes it possible to read the news anonymously, a desirable feature in a country where you don’t want the government knowing which news sites you’re reading, when you’re reading them, and for how long.

Using Tor Browser comes with one major annoyance: Many prominent web services block access to Tor, often without useful error messages. If a site you normally visit suddenly returns 404 when visiting over Tor, the service is likely blocking Tor traffic and being needlessly opaque about it. Sites that do not block Tor might push you to click through a ton of captchas. It’s not the end of the world, but it is annoying.

How Tor Browser works

Tor Browser routes all your web traffic through the Tor network, anonymizing it. As the images below illustrate, Tor consists of a three-layer proxy, like layers of an onion (hence Tor’s onion logo). Tor Browser connects at random to one of the publicly listed entry nodes, bounces that traffic through a randomly selected middle relay, and finally spits out your traffic through the third and final exit node.

how tor works 1
How Tor works, step 1

Electronic Frontier Foundation

As a result, don’t be surprised if Google or another service greets you in a foreign tongue. These services look at your IP address and guesstimate your country and language, but when using Tor, you will often appear to be in a physical location halfway around the world.

tor 2
How Tor works, step 2

Electronic Frontier Foundation

If you live in a regime that blocks Tor or need to access a web service that blocks Tor, you can also configure Tor Browser to use bridges. Unlike Tor’s entry and exit nodes, bridge IP addresses are not publicly listed, making it difficult for web services, or governments, to blacklist those IP addresses.

tor 3
How Tor works, step 3

Electronic Frontier Foundation

The Tor network routes TCP traffic of all kinds but is optimized for web browsing. Tor does not support UDP, so don’t try to torrent free software ISOs, as it won’t work.

Is Tor Browser safe to use?

While Tor Browser enhancing your anonymity online, it does not protect users from all dangers of the web. Also, the final relay of the Tor network is not encrypted, meaning that traffic between the exit node and destination server could be monitored. Kaspersky offers advice on staying safe while using Tor Browser, including keeping the browser and all extensions up to date, employing a firewall and antivirus software, and using Tor Browser randomly to decrease the likelihood of leaking identifiable patterns in your online activity.

Disadvantages of Tor Browser

Like all software, Tor Browser has downsides, such as the following:

  • Slow performance: Tor’s routing and encryption can slow down internet performance, making certain activities challenging, such as downloading large files.
  • Security issues: Tor Browser can be vulnerable at its entry and exit nodes, thus making it not a security panacea for web traffic.
  • Untrusted sites: Tormayallow access to unsafe sites that may otherwise be blocked by other browsers. This could lead to exposure to unsafe content or untrusted downloads.

For most people reading this article, Tor Browser is completely legal to use. In some countries, however, Tor is either illegal or blocked by national authorities. China has outlawed the anonymity service and blocks Tor traffic from crossing the Great Firewall. Countries such as Russia, Saudi Arabia, and Iran are working hard to prevent citizens from using Tor. Most recently, Venezuela has blocked all Tor traffic.

It’s easy to see why a repressive regime hates Tor. The service makes it easy for journalists to report on corruption and helps dissidents organize against political repression.

The freedom to communicate, publish, and read anonymously is a prerequisite for freedom of expression online, and thus a prerequisite for democracy today. Using and supporting Tor helps support freedom of expression around the world. Technically sophisticated users are encouraged to donate bandwidth to the Tor network by running a relay.

How to get on the dark web?

Let’s get this “dark web” nonsense out of the way once and for all. While it’s true that some criminals use Tor to commit crimes, criminals also use the regular internet to commit crimes. Bank robbers use getaway cars on public highways to commit crimes. We don’t slander highways or the internet, because that would be foolish. Tor has tons of legitimate uses and is considered by many a cornerstone of democracy today.

So when you hear people talking in scared whispers about the “dark web” or the “deep web” or somesuch nonsense, understand that there is a lot more going on here than just “The Four Horsemen of the Infocalypse are using computers in non-normative ways.” Anonymity online is not merely the bailiwick of criminals and trolls.

As a practical matter, Tor is for ordinary people, because criminals willing to break the law can achieve better anonymity than Tor provides. As the Tor FAQ points out:

Doesn’t Tor enable criminals to do bad things?

Tor’s mission is to advance human rights with free and open-source technology, empowering users to defend against mass surveillance and internet censorship. We hate that there are some people who use Tor for nefarious purposes, and we condemn the misuse and exploitation of our technology for criminal activity.

It’s essential to understand that criminal intent lies with the individuals and not the tools they use. Just like other widely available technology, Tor can be used by individuals with criminal intent. And because of other options they can use it seems unlikely that taking Tor away from the world will stop them from engaging in criminal activity. At the same time, Tor and other privacy measures can fight identity theft, physical crimes like stalking, and be used by law enforcement to investigate crime and help support survivors.

Is Tor Browser anonymous?

Tor Browser offers the best anonymous web browsing available today, but that anonymity is not perfect. We are currently witnessing an arms race between researchers seeking to strengthen Tor, or even develop a next generation anonymity tool, and governments around the world studying how to break Tor’s anonymity properties.

The most successful technique to de-anonymize Tor Browser users has been to hack them. The FBI has used this technique successfully in numerous criminal cases, and under Rule 41, enacted in 2016 by US Chief Justice Roberts of the Supreme Court, the FBI can now mass hack large numbers of computers anywhere in the world using a single warrant.

Such hacking techniques ought to concern everyone, as innocent Tor users will inevitably get caught up in such fishing expeditions.

Does that mean you shouldn’t use Tor? Certainly not, if you care about your privacy online. Tor Browser is an essential tool that will only improve with time. If you don’t care about your privacy? Well, Edward Snowden said it best:

“Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.”

jmporup
Senior Writer

J.M. Porup got his start in security working as a Linux sysadmin in 2002. Since then he’s covered national security and information security for a variety of publications, and now calls CSO Online home. He previously reported from Colombia for four years, where he wrote travel guidebooks to Latin America, and speaks Spanish fluently with a hilarious gringo-Colombian accent. He holds a Masters degree in Information and Cybersecurity (MICS) from UC Berkeley.

Leave a Reply

Your email address will not be published. Required fields are marked *