0% found this document useful (0 votes)
54 views4 pages

Introduction To Tor Browser

The Tor browser is designed for anonymous web surfing and protects user privacy through onion routing, which encrypts data multiple times. It offers three levels of security, with varying degrees of protection, and is used by various individuals including government agencies, journalists, and those seeking online privacy. While it provides access to the dark web, which hosts both legitimate and illicit activities, it also faces vulnerabilities such as exit node blocking and potential attacks that could compromise user anonymity.

Uploaded by

wizardretard98
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views4 pages

Introduction To Tor Browser

The Tor browser is designed for anonymous web surfing and protects user privacy through onion routing, which encrypts data multiple times. It offers three levels of security, with varying degrees of protection, and is used by various individuals including government agencies, journalists, and those seeking online privacy. While it provides access to the dark web, which hosts both legitimate and illicit activities, it also faces vulnerabilities such as exit node blocking and potential attacks that could compromise user anonymity.

Uploaded by

wizardretard98
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

INTRODUCTION TO TOR BROWSER

Tor browser?
The Tor (the onion routing) browser is a web browser designed for anonymous web surfing and
protection against traffic analysis. Although Tor is often associated with the darknet and criminal
activity, law enforcement officials, reporters, activists, whistleblowers and ordinary security-
conscious individuals often use the browser for legitimate reasons.
Onion Routing project—is an open-source privacy network that enables anonymous web
browsing. The worldwide Tor computer network uses secure, encrypted protocols to ensure that
users' online privacy is protected. Tor users' digital data and communications are shielded using a
layered approach that resembles the nested layers of an onion.

How Tor works

The Tor browser works by using a technology known as onion routing. The onion router is a
peer-to-peer (P2P) overlay network that enables users to browse the internet anonymously.
Onion routing uses multiple layers of encryption to conceal both the source and destination of
information sent over the network. It is designed so no one can monitor or censor online
communication.

Once a user installs Tor, the browser uses Tor servers to send data to an exit node, which is the point at
which data leaves the network. Once this data has been sent, it is encrypted multiple times before being
sent to the next node. Repeating this process makes it difficult to trace the data back to the original
source. In addition to encryption, the Tor browser does not track browsing history or store cookies.

TOR CONNECTIONS
Levels of security
The Tor browser offers three levels of security, including the default level plus two additional
levels. Each level provides a different degree of protection, with the maximum protection found
in the highest level.
1. On the default setting, the browser is the most user-friendly; however, this setting
provides the lowest level of security.
2. The second level provides more security but offers a slower experience. For example,
JavaScript-enabled sites may run slower as this setting disables JavaScript on non-
Hypertext Transfer Protocol Secure (HTTPS) sites.
3. The third and highest level of security disables some fonts and images, in addition to
JavaScript, on all sites.
TOR WEAKNESS

 Tor exit node block. Websites can block users using the Tor browser from accessing
their page.
 Bad apple attack. In 2011, a documented attack revealed the exposure of the Internet
Protocol (IP) addresses of Bit Torrent users on the Tor browser.
 Sniper attack. A type of distributed DoS (DDoS) attack, a sniper attack overwhelms exit
nodes until they run out of memory. An attacker can reduce the number of functioning
exit nodes, increasing the chances of users using exit nodes controlled by the attacker.
 Relay early traffic confirmation attack. In 2014, Tor released a security advisory after
discovering a deanonymization attempt on the browser's users. Bad actors modified the
headers of cells and sent them back to the user. If the entry node was also part of the
attack, an attacker could capture the IP address of users by the attacking relays.
 Mouse fingerprinting. In 2016, a researcher discovered they could track mouse
fingerprinting using a time measurement at the millisecond level. Using this method,
third parties could identify users by tracking their mouse movements when using a
specific website and comparing their mouse movements on the Tor browser or a regular
browser.
Who Uses Tor and Why
Though Tor is best known for its illicit uses, many Internet users can have different, valid
reasons for accessing the Internet via Tor.
Let's take a closer look at who uses Tor and why:
 Government agencies: Tor can protect and securely share sensitive government
information.
 For-profit enterprises: Companies that use Tor can benefit from increased data privacy
and security.
 Illicit organizations: Criminals sometimes use Tor to shield their online activity.
 Private individuals: Anyone wishing for more online privacy and better cybersecurity
can benefit from the Tor browser. Journalists, activists, and people facing censorship may
choose to interact online via Tor.

Access to the dark web

The dark web refers to the parts of the internet not indexed by search engines. It contains a range
of websites, including forums and marketplaces, that require specific software for access. While
anyone can surf the public internet, the dark web is a private network where users do not disclose
their real IP addresses. This makes it a more secure place to do business on the web but also a
place where many illegal activities occur.

Users such as the military, politicians, journalists and criminals use the dark web. The dark web
was created to enable individuals or groups to communicate in a way that is, in their view,
untraceable. Besides potential illegal uses, the dark web also serves a number of legitimate
purposes, including enabling whistleblowers to share information that they might not otherwise
be able to share.

The Tor browser enables people to have access to the dark web. While many associate the dark
web with illegal activities, the Tor network also has a number of legitimate uses. These include
communicating or browsing in countries implementing internet censorship.
How to Download and Install Tor on Your Operating System – A Step-by-Step Guide

Below, we will explain the Tor installation process for all of the systems it supports: Windows,
macOS, Linux, and Android. Simply scroll to your operating system to get the steps.

Installing Tor on Windows

Step 1: Go to the Tor Project website and click on the Tor browser download button in the top
right corner of your screen (as shown below).

Step 2: You’ll find yourself on the download page. Select the first icon from the left to download
the installation file for Windows. If you want to download the browser in a specific language,
you can click “Download in another language or platform.” This will allow you to download the
Tor browser in one of 35 alternative languages.

Step 3: A file will be downloaded onto your computer. Opening this file will start the process
and install the Tor browser. Choose your preferred language, then press “OK.”

Step 4: The Browser Setup will appear. Choose the destination folder (usually you don’t have to
change anything here, and the installer will automatically create a new folder for it) and press
“Install.”

Step 5: During the installation process, you can opt for Tor to start automatically once you’re
done installing it. If you choose not to, you’ll have to open it yourself by looking up the program.

FOLLOW THIS LINK ON THE YOUTUBE SENT

https://www.youtube.com/watch?v=5EZJq1BeZ6w

QUESTIONS

Look for blocked site and using TOR browser show how to access it

You might also like