{"id":188722,"date":"2017-04-21T02:06:22","date_gmt":"2017-04-21T06:06:22","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/how-to-protect-your-privacy-online-with-tor-browser-techradar\/"},"modified":"2017-04-21T02:06:22","modified_gmt":"2017-04-21T06:06:22","slug":"how-to-protect-your-privacy-online-with-tor-browser-techradar","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/how-to-protect-your-privacy-online-with-tor-browser-techradar\/","title":{"rendered":"How to protect your privacy online with Tor Browser &#8211; TechRadar"},"content":{"rendered":"<p><p>Introduction        <\/p>\n<p>      If you want to keep your web browsing private, you can use      the Incognito mode in Chrome, Private Browsing in Firefox,      InPrivate mode in Microsoft Edge, and so on. While this will      prevent other people who use your computer from seeing your      browsing history, it doesn't prevent your ISP from monitoring      the sites you are visiting. You might well want to  for any      number of reason  browse the internet completely      anonymously, and this is precisely what Tor Browser offers.    <\/p>\n<p>      Standing for The Onion Router, Tor offers multiple levels of      protection to ensure that your online activities, location      and identity are kept entirely private.    <\/p>\n<\/p>\n<p>      Start by downloading and installing Tor Browser. Click Finish once the      installation is complete, and Tor will launch for the first      time. You'll be greeted by a settings dialog that is used to      control how you connect to the Tor network.    <\/p>\n<p>      In most cases you should be able to just click the Connect      button, but if you connect to the internet through a proxy      you will need to click the Configure button to enter your      settings.    <\/p>\n<p>      There will be a slight delay while Tor establishes a      connection to the network via relays  the program warns that      the initial connection could take as long as several minutes       but once this connection has been made, the Tor browser      will launch ready for use.    <\/p>\n<p>      Tor is based on the same code as Firefox, so if you have used      Mozilla's web browser everything should seem fairly familiar.      Even if you haven't used Firefox before, it should not take      you long before you start to feel at home  it's not so      different to the likes of Edge, Chrome and Internet Explorer.    <\/p>\n<p>      Before you get started, it's worth noting that using Tor      Browser is a balancing act between privacy\/security and web      usability. By default, security is set to Low  although this      is still far more secure than any other web browser.    <\/p>\n<p>      If you would like to increase this, click the green onion      icon to the left of the address bar and select Privacy and      Security Settings. Use the Security Level slider to choose      your preferred level of protection, bearing in mind the      warnings that appear about the features that may stop working      on the sites you visit.    <\/p>\n<p>      In order to get the most from Tor, you need to change a few      of your browsing habits  the first of these is the search      engine you use.    <\/p>\n<p>      Rather than opting for the likes of Google and Bing, the      recommendation is that you instead turn to Disconnect.me. This is a site that prevents      search engines from tracking you online, and you can use it      in conjunction with Bing, Yahoo or DuckDuckGo.    <\/p>\n<p>      While we're on the subject of changing habits, you also need      to avoid installing browser extensions, as these can leak      private information.    <\/p>\n<p>      As you browse the internet, the Tor browser helps to keep you      secure by avoiding directly connecting to web sites. Instead,      your connection is bounced around between multiple nodes on      the Tor network, with each jump featuring anonymizing.    <\/p>\n<p>      This not only makes it all but impossible for a website to      track who and where you are, it is also responsible for the      slightly slow performance you will notice while browsing with      Tor.    <\/p>\n<p>      You can protect your privacy even further by clicking the      green onion button and selecting the 'New Tor Circuit for      this site' option which will force Tor to find a new route to      the site.    <\/p>\n<p>      The new circuit option only applies to the current active      tab, and it may be that you want a more drastic privacy      safety net. Click the green onion button and select 'New      identity', bearing in mind that this will close and restart      Tor in order to obtain a new IP address.    <\/p>\n<p>      When you connect to a site using Tor, you may notice that a      popup appears warning you that a particular site is trying to      do something that could potentially be used to track you.      Just how often these messages appear will depend not only on      the sites you visit, but also the privacy settings you have      in place.    <\/p>\n<p>      An important part of staying safe and anonymous online is      ensuring that you use the HTTPS rather than HTTP versions of      websites. So you don't have to remember to do this for every      site you visit, Tor Browser comes with the HTTPS Everywhere      extension installed by default. This will try to redirect you      to the secure version of any website if it is available, but      you should keep an eye on the address bar as an extra      safeguard.    <\/p>\n<p>      If you are connected to a secure site, you will see a green      padlock icon. If this isn't present, click the 'i' icon for      more information.    <\/p>\n<p>      The most secure way to connect to the internet through Tor,      however, is to visit .onion sites. These are also known as      hidden Tor services, and they are inaccessible to search      engines; to find them, you have to visit them directly.    <\/p>\n<p>      To help you to find such sites, there are a number of .onion      directories out there. These sites can only be accessed using      Tor, but you do need to take care  it's quite common to come      across sites with illegal contents, or promoting illegal      activities.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.techradar.com\/how-to\/how-to-protect-your-privacy-online-with-tor-browser\" title=\"How to protect your privacy online with Tor Browser - TechRadar\">How to protect your privacy online with Tor Browser - TechRadar<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Introduction If you want to keep your web browsing private, you can use the Incognito mode in Chrome, Private Browsing in Firefox, InPrivate mode in Microsoft Edge, and so on. While this will prevent other people who use your computer from seeing your browsing history, it doesn't prevent your ISP from monitoring the sites you are visiting. You might well want to for any number of reason browse the internet completely anonymously, and this is precisely what Tor Browser offers.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/how-to-protect-your-privacy-online-with-tor-browser-techradar\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-188722","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/188722"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=188722"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/188722\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=188722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=188722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=188722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}