{"id":3389,"date":"2017-12-18T14:27:29","date_gmt":"2017-12-18T14:27:29","guid":{"rendered":"https:\/\/peoplecert.wpengine.com\/getbusy\/?p=3389\/"},"modified":"2017-12-19T10:35:24","modified_gmt":"2017-12-19T10:35:24","slug":"grand-tor-go-anonymous-online","status":"publish","type":"post","link":"https:\/\/www.hepis.gr\/getbusy\/en\/2017\/12\/18\/grand-tor-go-anonymous-online\/","title":{"rendered":"How to go anonymous online &#8230;."},"content":{"rendered":"<p>FIFTEEN YEARS HAVE\u00a0passed since a couple of MIT grads and a Navy-funded researcher first built The Onion Router, or\u00a0<a href=\"https:\/\/www.wired.com\/tag\/tor\">Tor<\/a>, a wild experiment in granting anonymity to anyone online. Today, Tor has millions of users. The original project has been endlessly hacked on, broken, and fixed again. While imperfect, it remains the closest thing to a cloak of anonymity for internet users with a high sensitivity to surveillance, without needing serious technical chops. And it\u2019s stronger and more versatile than ever before.<\/p>\n<p>&nbsp;<\/p>\n<p>Tor protects your identity online\u2014namely your IP address\u2014by encrypting your traffic in at least three layers and bouncing it through a chain of three volunteer computers chosen among thousands around the world, each of which strips off just one layer of encryption before bouncing your data to the next computer. All of that makes it very difficult for anyone to trace your connection from origin to destination\u2014not the volunteer computers relaying your information, not your internet service provider, and not the websites or online services you visit.<\/p>\n<p>&nbsp;<\/p>\n<p>Earlier this month, Tor announced an\u00a0update to its so-called onion services, which use Tor\u2019s anonymizing features to hide not just individual people on the web, but servers too, allowing for so-called dark web or darknet sites and other services that can\u2019t be physically traced to any locatable computer. Beyond merely covering your tracks as you visit websites, the new feature has opened Tor up to a new range of applications, enabling a new generation of whistleblowing platforms and new forms of untraceable messaging. Tor\u2019s update has made those onion services less easily discovered and strengthened their encryption.<\/p>\n<p>&nbsp;<\/p>\n<p>That overhaul should cement Tor\u2019s reputation as an indispensable anonymity tool, says Marc Rogers, a security researcher for tech firm Cloudflare, who has also worked on a still-in-development Tor-based network router project himself. \u201cIt\u2019s still pretty much the only game in town,\u201d he says. \u201cAfter this update, I can say that yes, Tor is the best privacy tool out there.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p>Here&#8217;s how you can use Tor today, whether you want to want to browse controversial sites in peace, or send messages the NSA can&#8217;t peep.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Web Browsing<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>The most basic\u2014and by far the most common\u2014way to use Tor is to simply download, install, and run the TorBrowser from the Tor Project\u2019s\u00a0website. Like other Tor apps, it routes all its traffic over Tor, so that you&#8217;re browsing the web truly incognito: The sites you&#8217;re visiting see you as emerging from a random point on the internet and thus can&#8217;t trace your true IP address or your associated identity.<\/p>\n<p>&nbsp;<\/p>\n<p>Aside from making government or other targeted surveillance much more difficult, the TorBrowser also functions as a powerful anti-censorship tool for people in countries like Iran and China, since it hides any direct connection to domains like Google, Facebook, and Twitter that oppressive regimes often block. Be aware, however, that the final computer routing your traffic to a destination website in that three-hop system, known as an \u201cexit node,\u201d can see all of your activity as you connect to a website, even if it doesn\u2019t know\u00a0<em style=\"font-weight: inherit;\">where<\/em>\u00a0that activity comes. Privacy experts warn that law enforcement, intelligence services, and malicious hackers run their own exit nodes for exactly that surveillance purpose. It&#8217;s critical, then, for Tor users to only visit\u00a0HTTPS-protected websites\u00a0to ensure that the information that passes between the browser and the site remains encrypted.<\/p>\n<p>&nbsp;<\/p>\n<p>Some popular websites have now even started to run their own Tor onion services,\u00a0including Facebook\u00a0and Pro Publica. That means they&#8217;re essentially hosting a site on Tor&#8217;s network, so that you can visit through the TorBrowser and your traffic remains encrypted all the way to its destination, with no need to trust an exit node.<\/p>\n<h3><strong>\u00a0<\/strong><\/h3>\n<h3><strong>Messaging<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>It\u2019s easy to route not just your web browsing over Tor, but instant messaging, too. The Tor Project offers a program called\u00a0Tor Messenger, which allows you to combine Tor with the chat protocols Jabber, IRC, Google Talk, and others. That means your connection to whatever server is running that chat service routes over Tor, so that the server can\u2019t in theory identify your IP address or location.<\/p>\n<p>Another app called TorChat goes a step further, allowing you to instant message using servers that themselves run as Tor onion services, which can only receive incoming connections through Tor. With that setup, who might want to compromise the messages can&#8217;t locate the servers that host them. And a next-generation tool called\u00a0Ricochet\u00a0takes the IM implementation of Tor yet another step, cutting servers out of the picture altogether. Instead, it turns your computer (or the computer of the person you\u2019re talking to) into an onion service, so that you can connect directly through Tor without any middleman.<\/p>\n<p>&nbsp;<\/p>\n<p>A slower but more widely used and well-audited way to route communications over Tor is SecureDrop. Taking a cue from WikiLeaks and originally coded by the\u00a0late internet activist Aaron Swartz, SecureDrop allows anyone to host an anonymous dropbox for sensitive information. Dozens of news organizations now use it to solicit tips and leaked documents from whistleblowers, including\u00a0<em style=\"font-weight: inherit;\">The New York Times<\/em>,\u00a0<em style=\"font-weight: inherit;\">The Washington Post<\/em>,\u00a0<em style=\"font-weight: inherit;\">The Guardian<\/em>,\u00a0and of course WIRED.<\/p>\n<p>&nbsp;<\/p>\n<p>For larger file transfers, an\u00a0application called Onion Share essentially allows anyone to turn their computer into an onion service that anyone can connect to directly to download files, just as they might from a website\u2014but without leaving any trace of their identity.<\/p>\n<h3><\/h3>\n<h3><strong>Everything Else<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>Instead of trying to route any particular app over Tor, why not route\u00a0<em style=\"font-weight: inherit;\">all<\/em>\u00a0your internet data over the Tor network? That&#8217;s the pitch of products like\u00a0Anonabox\u00a0and\u00a0Invizbox, small, portable routers that run Tor and are designed to siphon every packet that leaves or enters your computer over that protected network. But those routers\u2014particularly Anonabox\u2014have been criticized for security flaws.<\/p>\n<p>&nbsp;<\/p>\n<p>Some security experts warn against routing all your data over Tor anyway. While Tor can effectively hide your IP address, the regular course of anyone&#8217;s web browsing invariably includes sharing identifying details, which could defeat the purpose of using an anonymity tool in the first place.<\/p>\n<p>&nbsp;<\/p>\n<p>Better still, in those cases, is an entire\u00a0Tor-based operating system called Tails, an acronym for The Amnesiac Incognito Live System. The primary benefit of Tails has more to do with security than privacy; you can run it off of a USB drive, which once removed, leaves no trace on the computer that ran it, making it virtually impossible to install malware on the user&#8217;s machine. But as an added bonus, it also routes all data over Tor, adding an extra layer of anonymity. The system is secure enough that it&#8217;s been listed as a trouble spot for the NSA in documents leaked\u00a0by Edward Snowden\u2014and Snowden has also said that he uses it himself to avoid surveillance by his former employer.<\/p>\n<p>&nbsp;<\/p>\n<p>And if it&#8217;s good enough for him, it&#8217;s probably good enough for you.<\/p>\n<p>&nbsp;<\/p>\n<p>Source: <a href=\"https:\/\/www.wired.com\/story\/the-grand-tor\/\">www.wired.co<\/a>m<\/p>\n","protected":false},"excerpt":{"rendered":"<p>FIFTEEN YEARS HAVE\u00a0passed since a couple of MIT grads and a Navy-funded researcher first built The Onion Router, or\u00a0Tor, a wild experiment in granting anonymity to anyone online. Today, Tor has millions of users. The original project has been endlessly hacked on, broken, and fixed again. While imperfect, it remains the closest thing to a cloak of anonymity for internet users with a high sensitivity to surveillance, without needing serious technical chops. And it\u2019s stronger and more versatile than ever before.<\/p>\n","protected":false},"author":2,"featured_media":2060,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[33],"tags":[],"class_list":["post-3389","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-misc-en"],"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to go anonymous online .... - GetBusy<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hepis.gr\/getbusy\/en\/2017\/12\/18\/grand-tor-go-anonymous-online\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to go anonymous online .... - GetBusy\" \/>\n<meta property=\"og:description\" content=\"FIFTEEN YEARS HAVE\u00a0passed since a couple of MIT grads and a Navy-funded researcher first built The Onion Router, or\u00a0Tor, a wild experiment in granting anonymity to anyone online. Today, Tor has millions of users. The original project has been endlessly hacked on, broken, and fixed again. While imperfect, it remains the closest thing to a cloak of anonymity for internet users with a high sensitivity to surveillance, without needing serious technical chops. And it\u2019s stronger and more versatile than ever before.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hepis.gr\/getbusy\/en\/2017\/12\/18\/grand-tor-go-anonymous-online\/\" \/>\n<meta property=\"og:site_name\" content=\"GetBusy\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-18T14:27:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-12-19T10:35:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hepis.gr\/getbusy\/wp-content\/uploads\/sites\/2\/2017\/09\/20170326130351-shutterstock-601199840.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"enic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"enic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hepis.gr\/getbusy\/en\/2017\/12\/18\/grand-tor-go-anonymous-online\/\",\"url\":\"https:\/\/www.hepis.gr\/getbusy\/en\/2017\/12\/18\/grand-tor-go-anonymous-online\/\",\"name\":\"How to go anonymous online .... - GetBusy\",\"isPartOf\":{\"@id\":\"https:\/\/www.hepis.gr\/getbusy\/#website\"},\"datePublished\":\"2017-12-18T14:27:29+00:00\",\"dateModified\":\"2017-12-19T10:35:24+00:00\",\"author\":{\"@id\":\"https:\/\/www.hepis.gr\/getbusy\/#\/schema\/person\/5e67ec38ca41a8a70c0d6c2956bc502a\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.hepis.gr\/getbusy\/en\/2017\/12\/18\/grand-tor-go-anonymous-online\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hepis.gr\/getbusy\/en\/2017\/12\/18\/grand-tor-go-anonymous-online\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hepis.gr\/getbusy\/en\/2017\/12\/18\/grand-tor-go-anonymous-online\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hepis.gr\/getbusy\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to go anonymous online &#8230;.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hepis.gr\/getbusy\/#website\",\"url\":\"https:\/\/www.hepis.gr\/getbusy\/\",\"name\":\"GetBusy\",\"description\":\"Just another Hepis site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hepis.gr\/getbusy\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hepis.gr\/getbusy\/#\/schema\/person\/5e67ec38ca41a8a70c0d6c2956bc502a\",\"name\":\"enic\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.hepis.gr\/getbusy\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9d45d7d2ad7a86b30de5263bec504105b6adcb97672e07226b29f1c5dec6ff5b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9d45d7d2ad7a86b30de5263bec504105b6adcb97672e07226b29f1c5dec6ff5b?s=96&d=mm&r=g\",\"caption\":\"enic\"},\"url\":\"https:\/\/www.hepis.gr\/getbusy\/en\/author\/enic\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to go anonymous online .... - GetBusy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hepis.gr\/getbusy\/en\/2017\/12\/18\/grand-tor-go-anonymous-online\/","og_locale":"en_US","og_type":"article","og_title":"How to go anonymous online .... - GetBusy","og_description":"FIFTEEN YEARS HAVE\u00a0passed since a couple of MIT grads and a Navy-funded researcher first built The Onion Router, or\u00a0Tor, a wild experiment in granting anonymity to anyone online. Today, Tor has millions of users. The original project has been endlessly hacked on, broken, and fixed again. While imperfect, it remains the closest thing to a cloak of anonymity for internet users with a high sensitivity to surveillance, without needing serious technical chops. And it\u2019s stronger and more versatile than ever before.","og_url":"https:\/\/www.hepis.gr\/getbusy\/en\/2017\/12\/18\/grand-tor-go-anonymous-online\/","og_site_name":"GetBusy","article_published_time":"2017-12-18T14:27:29+00:00","article_modified_time":"2017-12-19T10:35:24+00:00","og_image":[{"width":750,"height":422,"url":"https:\/\/www.hepis.gr\/getbusy\/wp-content\/uploads\/sites\/2\/2017\/09\/20170326130351-shutterstock-601199840.jpeg","type":"image\/jpeg"}],"author":"enic","twitter_card":"summary_large_image","twitter_misc":{"Written by":"enic","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.hepis.gr\/getbusy\/en\/2017\/12\/18\/grand-tor-go-anonymous-online\/","url":"https:\/\/www.hepis.gr\/getbusy\/en\/2017\/12\/18\/grand-tor-go-anonymous-online\/","name":"How to go anonymous online .... - GetBusy","isPartOf":{"@id":"https:\/\/www.hepis.gr\/getbusy\/#website"},"datePublished":"2017-12-18T14:27:29+00:00","dateModified":"2017-12-19T10:35:24+00:00","author":{"@id":"https:\/\/www.hepis.gr\/getbusy\/#\/schema\/person\/5e67ec38ca41a8a70c0d6c2956bc502a"},"breadcrumb":{"@id":"https:\/\/www.hepis.gr\/getbusy\/en\/2017\/12\/18\/grand-tor-go-anonymous-online\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hepis.gr\/getbusy\/en\/2017\/12\/18\/grand-tor-go-anonymous-online\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.hepis.gr\/getbusy\/en\/2017\/12\/18\/grand-tor-go-anonymous-online\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hepis.gr\/getbusy\/"},{"@type":"ListItem","position":2,"name":"How to go anonymous online &#8230;."}]},{"@type":"WebSite","@id":"https:\/\/www.hepis.gr\/getbusy\/#website","url":"https:\/\/www.hepis.gr\/getbusy\/","name":"GetBusy","description":"Just another Hepis site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hepis.gr\/getbusy\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/www.hepis.gr\/getbusy\/#\/schema\/person\/5e67ec38ca41a8a70c0d6c2956bc502a","name":"enic","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.hepis.gr\/getbusy\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9d45d7d2ad7a86b30de5263bec504105b6adcb97672e07226b29f1c5dec6ff5b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d45d7d2ad7a86b30de5263bec504105b6adcb97672e07226b29f1c5dec6ff5b?s=96&d=mm&r=g","caption":"enic"},"url":"https:\/\/www.hepis.gr\/getbusy\/en\/author\/enic\/"}]}},"jetpack_featured_media_url":"https:\/\/www.hepis.gr\/getbusy\/wp-content\/uploads\/sites\/2\/2017\/09\/20170326130351-shutterstock-601199840.jpeg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9rTFC-SF","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.hepis.gr\/getbusy\/en\/wp-json\/wp\/v2\/posts\/3389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hepis.gr\/getbusy\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hepis.gr\/getbusy\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hepis.gr\/getbusy\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hepis.gr\/getbusy\/en\/wp-json\/wp\/v2\/comments?post=3389"}],"version-history":[{"count":0,"href":"https:\/\/www.hepis.gr\/getbusy\/en\/wp-json\/wp\/v2\/posts\/3389\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hepis.gr\/getbusy\/en\/wp-json\/wp\/v2\/media\/2060"}],"wp:attachment":[{"href":"https:\/\/www.hepis.gr\/getbusy\/en\/wp-json\/wp\/v2\/media?parent=3389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hepis.gr\/getbusy\/en\/wp-json\/wp\/v2\/categories?post=3389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hepis.gr\/getbusy\/en\/wp-json\/wp\/v2\/tags?post=3389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}