Tor (previously called the Onion Router) is free software that provides online anonymity.
The Main implementation of Tor is written in the C programming language and consists of roughly 146,000 lines of source code.
The Tor browser directs Internet traffic through a free, worldwide network consisting of more than three thousand links to hide the location of the user and prevent any tracking on the network or traffic analysis. Using Tor is noticeably difficult to track Internet activity, including visits to specific sites, sent and received Internet messages and other forms of communication. Tor browser is designed to protect the privacy of users, maintain their freedom and ability to conduct confidential business.
Original data including the point of destination, when using this browser are encrypted several times and routed through a virtual channel includes sequential and random links. Each link recognizes “layer” encryption, which is revealed only in the next link. The final link takes the last layer of encryption and sends the original data, without revealing or even knowing the sender to the destination. This method reduces the probability of intercept of the original data and completely hides the routing. For this reason, when reference was made to the best browsers, Tor is the one of the first places.
However, it has weaknesses. As all the existing network to ensure anonymity, Tor cannot and does not attempt to protect against monitoring of traffic at the border of its network. This means that the input and output of the network can be viewed. In addition, the Tor browser protects you from traffic analysis, but it cannot prevent the identification of the traffic.
Recommended
How to get out of "Skype" on the "Android" and not only
How to get out of "Skype" "Android"? This question bothers many users. The thing is that the messenger is not so difficult. But there are features that are only for mobile versions. To log out of Skype in this case more difficult than it seems. But i...
Kingo ROOT: how to use the program to gain administrative rights on Android
The Gadgets on the platform Android regained the lion's share of the market. Developers are continually perfecting the OS, trying to fit the needs of the users, but from year to year admit palpable mistake: forbid the owner to "stuffing" of his gadge...
How to get from Stormwind to Tanaris: practical tips
World of Warcraft is an iconic MMORPG, uniting millions of players around the world. There are many locations and puzzles, secret trails and larger, but rather dangerous paths. Sooner or later, every player chose the side of the Alliance, we have to ...
Despite the above shortcomings, Tor and alternative systems JonDonym (JAP) are considered more sustainable than their alternatives in the face of VPN. In a study conducted to analyze the amounts of encrypted data flow, which passes through the system VPN, Tor or JonDo, showed that the latter two services is much more difficult to analyze.
Despite this, operators of some online sites have the ability to prevent connections from Tor nodes, or offer limited functionality for users of that browser. If to speak about other free browsers, it is obvious that such restrictions no longer exist. For example, usually impossible to edit Wikipedia when using Tor or when using an IP address that uses a Tor exit node (this is recognized in connection with the use of the TorBlock extension).
Despite the many illegal and harmful things that some users do when using this service, it is a significant endorsement for lawful purposes. According to international data, the Tor browser is part of a wider strategy for the protection of private life and anonymity. Recent years have seen the growth of popularity of service associated with conducting business and financial transactions.
Article in other languages:
AR: https://tostpost.com/ar/computers/16517-what-is-a-tor-browser.html
BE: https://tostpost.com/be/kamputary/32027-shto-ya-lyae-saboy-bra-zer-tor.html
DE: https://tostpost.com/de/computer/31705-was-ist-ein-tor-browser.html
ES: https://tostpost.com/es/equipos/31567-lo-que-representa-el-tor-browser.html
HI: https://tostpost.com/hi/computers/18155-what-is-a-tor-browser.html
JA: https://tostpost.com/ja/computers/16212-what-is-a-tor-browser.html
KK: https://tostpost.com/kk/komp-yuterler/32359-b-l-b-ld-red-tor-brauzer.html
PL: https://tostpost.com/pl/komputery/33411-co-to-jest-tor-browser.html
PT: https://tostpost.com/pt/computadores/33159-o-que-tor-um-navegador.html
TR: https://tostpost.com/tr/bilgisayarlar/28770-nedir-tor-browser-m.html
UK: https://tostpost.com/uk/komp-yuteri/32568-scho-yavlya-soboyu-tor-brauzer.html
Alin Trodden - author of the article, editor
"Hi, I'm Alin Trodden. I write texts, read books, and look for impressions. And I'm not bad at telling you about it. I am always happy to participate in interesting projects."
Related News
Canon MF4410: the perfect solution for organizing print and not only for small office or home
multi-function device of the budget level with a very modest price and an impressive set of technical features – Canon MF4410. Also, this machine boasts a large list of possible places of use. Niche with this device. Equipme...
How to burn videos to disc from your computer?
of Course, today the Internet is everywhere, and in fact the need to record any video, audio or any other files on removable media is not as popular as before. However, there are situations that you need to record a new movie or y...
File sharing - what is it? Resources for file sharing
the article describes this resource as file sharing. What is he like? Why do we need file sharing and why they are gradually replacing torrent trackers?the Beginning of the computer ageonce upon a time computers were an attribute ...
How to build in Minecraft portal to heaven?
When you start the game your character is in the middle of the world, which is largely similar to the common area, which can be found in reality. Forests alternate with fields, you can find both desert and snow biomes. And all thi...
The problem of heating: the temperature of the hard disk
Active advertising of its products from manufacturers of cooling systems for the main components of the personal computer has done its job: now even schoolchildren know that the Central processor chip and powerful graphics card if...
Creating backing tracks in home: how to remove voice from a song
Chanting – it is an activity that like to do very many citizens, despite the fact that some of them simply can't sing. However, no lack of hearing or voice are not able to reduce the immense love of the person singing, even ...
Comments (0)
This article has no comment, be the first!