{"id":39039,"date":"2014-09-23T10:50:10","date_gmt":"2014-09-23T14:50:10","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/how-to-use-the-tor-browser-to-surf-the-web-anonymously\/"},"modified":"2014-09-23T10:50:10","modified_gmt":"2014-09-23T14:50:10","slug":"how-to-use-the-tor-browser-to-surf-the-web-anonymously","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/how-to-use-the-tor-browser-to-surf-the-web-anonymously\/","title":{"rendered":"How to use the Tor Browser to surf the web anonymously"},"content":{"rendered":"<p><p>    Recently,     BoingBoing ran an article about how some librarians in    Massachusetts were installing Tor software in all their public    PCs to anonymize the browsing habits of their patrons. The    librarians are doing this as a stand against passive government    surveillance as well as companies that track users online and    build dossiers to serve highly-targeted advertising.  <\/p>\n<p>    It's an    interesting project and a bold stand for user privacy. But the    good news is that if you want to browse anonymously, you don't    have to go to the library to use Tor. Connecting to the Tor    network from your own PC is quick and painless thanks to the    Tor project's dead simple Tor Browser.  <\/p>\n<p>    Tor is    a computer network run by volunteers worldwide. Each volunteer    runs what is called a relay, which is just a computer that runs    software allowing users to connect to the Internet via the Tor    network.  <\/p>\n<p>    Before    hitting the open Internet, the Tor Browser will connect to    several different relays, wiping its tracks each step of the    way, making it difficult to figure out where, and who, you    really are.  <\/p>\n<p>    While    Tor is gaining a reputation as a tool for     buying illicit goods online, the software has numerous    legitimate uses. Activists masking their location from    oppressive regimes and journalists communicating with anonymous    sources are two simple examples.  <\/p>\n<p>    If,    like the librarians in Massachusetts, you don't have an exotic    reason for using Tor, it's still a good tool to keep your    browsing private from your ISP, advertisers, or passive    government data collection. But if the NSA or other    three-letter agency decided to actively target your browsing    habits that's a whole different ballgame.  <\/p>\n<p>    The    easiest way to use Tor is to download    the Tor Browser. This is a modified version of Firefox    along with a bunch of other software that connects you to the    Tor network.  <\/p>\n<p>    Once    you've downloaded the installer, you have two options: You can    just install the software or you can check the installation    file's GPG signature first. Some people like to check the    installation file to make sure they've downloaded the proper    version of the browser and not something that's been tampered    with.  <\/p>\n<p>    But    checking the GPG signature is not a painless process    and requires an additional software download. Nevertheless, if    that's something you'd like to do, the Tor Project has a    how-to    explaining what's required.  <\/p>\n<p>    Whether    or not you've checked the GPG signature, the next step is to    install the Tor browser itself.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/2686467\/how-to-use-the-tor-browser-to-surf-the-web-anonymously.html\/RK=0\/RS=6nFOy765.M1NsKyFU.o5mUMskTQ-\" title=\"How to use the Tor Browser to surf the web anonymously\">How to use the Tor Browser to surf the web anonymously<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Recently, BoingBoing ran an article about how some librarians in Massachusetts were installing Tor software in all their public PCs to anonymize the browsing habits of their patrons. The librarians are doing this as a stand against passive government surveillance as well as companies that track users online and build dossiers to serve highly-targeted advertising. It's an interesting project and a bold stand for user privacy.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/how-to-use-the-tor-browser-to-surf-the-web-anonymously\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-39039","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/39039"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=39039"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/39039\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=39039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=39039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=39039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}