{"id":203550,"date":"2017-07-05T08:51:08","date_gmt":"2017-07-05T12:51:08","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser-darkwebnews-com\/"},"modified":"2017-07-05T08:51:08","modified_gmt":"2017-07-05T12:51:08","slug":"tor-browser-darkwebnews-com","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/tor-browser-darkwebnews-com\/","title":{"rendered":"TOR Browser &#8211; darkwebnews.com"},"content":{"rendered":"<p><p>    If you want to browse through a vast sea of unindexed internet,    aka the Deep Web, you will have to use something    called Tor, otherwise you wont be able to access the Deep Web.  <\/p>\n<p>    So, what is Tor and why do I need it?  <\/p>\n<p>    Tor stands for The Onion Router. Youll soon see why the onion    and not some other veggie.  <\/p>\n<p>    It provides fairly good level of online anonymity, privacy and    security to the user.  <\/p>\n<p>    If youve ever stumbled upon a 16-character alpha-semi-numeric    hashes followed by .onion, and tried to open it in    your regular browser; it returned the This webpage is not    available result, right? This address can only be accessed by    Tor browser, specially designed to provide a safe and private    environment.  <\/p>\n<p>    Tor browser bundle can be downloaded for free here    <a href=\"https:\/\/www.torproject.org\/download\/download-easy.html.en\" rel=\"nofollow\">https:\/\/www.torproject.org\/download\/download-easy.html.en<\/a>.    There is no need for installation; you simply extract it    anywhere on your computer and run it.  <\/p>\n<p>    If you open the extracted folder with Browser folder in it, you    will notice that the actual application is called Firefox, and    thats what Tor browser actually is  a modified Firefox    browser with a set of plugins installed.  <\/p>\n<\/p>\n<p>    However, if you try to install any other plugin you might    compromise your anonymity online, and it is not advisable to    make any changes in settings unless you know exactly what you    are doing.  <\/p>\n<p>    Dont even enable scripts or flash player, because those    applications demand direct internet connection, not via Tor    network, which will compromise your IP address and other    information and make you an easy target for hackers.  <\/p>\n<p>    Tor network can also be used for online chatting. Theres an    app called TorChat, and it can be downloaded from here <a href=\"https:\/\/github.com\/prof7bit\/TorChat\" rel=\"nofollow\">https:\/\/github.com\/prof7bit\/TorChat<\/a>.    Many journalists use it for interviews with their confidential    sources or whistleblowers.  <\/p>\n<p>    To put it briefly  <\/p>\n<p>    Tor is essential; there are no two ways about it. If you wish    to browse the deep web, you will have to use Tor. However as I    mentioned, it will also protect your anonymity by passing your    computer through several relays.  <\/p>\n<p>    Drawbacks:  <\/p>\n<p>    The main drawback that I see with it is that it can lull you    into a false sense of security. For anonymous browsing, its an    excellent first step, but its not the only one you need to    take.  <\/p>\n<p>    For more protection, I would strongly advise using Tor within a    VPN service that allows P2P (peer to peer) networking.  <\/p>\n<p>    Without this, while the sites you visit cant be seen, any    eavesdroppers will be able to see that you are using Tor. While    that is not illegal by any means, it does stand out, so you    lose some of the anonymity you fought to get.  <\/p>\n<p>    Other non-important drawbacks include not being able to run    torrents over Tor, and not being able to use browser plugins.  <\/p>\n<p>    How deep down the rabbit hole do you wish to    go?  <\/p>\n<p>    Those were really the basics of Tor browser and Tor network and    these would probably suffice if you only wish to explore and    experiment with it.  <\/p>\n<p>    But if you want to know the core mechanics behind Tor network    and the way it provides the anonymity and privacy, Ill be    happy to get into more details about it.  <\/p>\n<p>    Regular internet  <\/p>\n<p>    Before going into any details about Tor, let me first cover how    the regular internet works.  <\/p>\n<p>    Lets say that Alvin for example wishes to send a message to    Barbara, or visit Barbaras webpage. When Alvin sends his    message, a data package is created,containingAlvins    message, his and Barbaras IP addresses.  <\/p>\n<p>    This data package travels directly from Alvins to Barbaras    computer, making it an easy target for anyone who wishes to    intercept the message or learn the information about Alvin or    Barbara.  <\/p>\n<p>    Spooky, isnt it? Even if your messages arent confidential at    all; why would you allow anybody to have access to you    messages? Its insane.  <\/p>\n<p>    So, if you want to keep your privacy intact, I suggest using    Tor, even for browsing that is not related to Deep Web.  <\/p>\n<p>    Almighty Tor  <\/p>\n<p>    How it works?  <\/p>\n<p>    Well, as mentioned earlier, here is the detailed explanation    for the choice of a veggie. Tor stands for The Onion Router and    Tor Network is a series of connected routers.  <\/p>\n<\/p>\n<p>    When using Tor, Alvins data package would firstly be    encrypted, and then sent through three routers, called nodes,    before the data package reaches Barbara.  <\/p>\n<p>    Mathematical Cryptography comes first  <\/p>\n<p>    Remember that data package that was created when Alvin sent his    message to Barbara? Now using Tor, that data package is    encrypted  not once, but three times.  <\/p>\n<p>    Mathematical encryption basically means that you take a set of    information, Alvins message, and together with the encryption    key you put it in a box.  <\/p>\n<p>    When opening the box without the decryption key, the message    looks totally different than the original data package. It can    look like some other message or like a random messed-up code.  <\/p>\n<p>    To decrypt the code you simply put in reverse  take the    encrypted data package and the decryption key, put them in the    box together, and you get the original message when you open    the box. Simple, right?  <\/p>\n<p>    Now, Tor takes this encrypted data package and encrypts it    twice more, both times using different encryption keys.  <\/p>\n<p>    Journey through a tunnel  <\/p>\n<p>    As mentioned earlier, Tor is a series of routers connected to    form a tunnel. Theyre a set of relays volunteering their    resources to forward traffic for Tor users. Now lets see how    they work.  <\/p>\n<p>    After encrypting the data package 3 times, its ready for    sendoff. Unlike regular network, the data package is not going    directly from Alvin to Barbara.  <\/p>\n<p>    Its first stop is the entry node  the first router or node as    they call it.  <\/p>\n<p>    In order for the data package to reach the entry node it must    be addressed to it, right? So, the package contains information    about the receiver and the sender, in other words Alvin and the    entry node.  <\/p>\n<p>    Once the data package reaches the entry node its being    decrypted only one time. One layer of encrypted information    peels and the other will be peeled when it reaches the    middle node.  <\/p>\n<p>    Once the data package reaches the middle node the process    repeats  one more layer of encryption down.  <\/p>\n<p>    It kind of reminds the onion layers, no? The package that    reached the middle node contains a different set of    information about the sender and the receiver: the sender is    the entry node and the receiver is the middle node.  <\/p>\n<p>    Now, Alvins message is sent to the last router, the exit    node. The last layer of encryption is peeled at the exit    node.  <\/p>\n<p>    The information of the data package that exit node has received    is again  different. It contains info about the middle node as    the sender and the receiver  the exit node.  <\/p>\n<p>    Once the message has been decrypted at the exit node, it is    finally ready for Barbara.  <\/p>\n<p>    Barbara gets the message that Alvin sent her, but the    information about the sender and receiver is different.  <\/p>\n<p>    Barbara knows it came from Alvin, because he probably signed    it, but if anybody intercepts the message and tries to find out    who sent it to Barbara, the data package will only give him    information about the exit node as the sender.  <\/p>\n<p>    The only possible way to reconstruct the journey of the message    is to have access to all routers and have all three decryption    keys.  <\/p>\n<p>    So, now that you know how Tor works, if you still feel you need    more protection, try using VPN with Tor, but thats the story    for another time.  <\/p>\n<p>      The articles and content found on Dark Web News are for      general information purposes only and are      not intended to solicit      illegal activity or constitute legal      advice. Using drugs is harmful to your health and      can cause serious problems including death and imprisonment,      and any treatment should not be undertaken without medical      supervision.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/darkwebnews.com\/tor-guide\/\" title=\"TOR Browser - darkwebnews.com\">TOR Browser - darkwebnews.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> If you want to browse through a vast sea of unindexed internet, aka the Deep Web, you will have to use something called Tor, otherwise you wont be able to access the Deep Web. So, what is Tor and why do I need it <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/tor-browser-darkwebnews-com\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-203550","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/203550"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=203550"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/203550\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=203550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=203550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=203550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}