{"id":66504,"date":"2015-08-28T17:43:27","date_gmt":"2015-08-28T21:43:27","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tails-browsing-the-web-with-tor-browser\/"},"modified":"2015-08-28T17:43:27","modified_gmt":"2015-08-28T21:43:27","slug":"tails-browsing-the-web-with-tor-browser","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/tails-browsing-the-web-with-tor-browser\/","title":{"rendered":"Tails &#8211; Browsing the web with Tor Browser"},"content":{"rendered":"<p><p>    Tor    Browser is a web browser based on Mozilla Firefox and configured to    protect your anonymity. Given the popularity of Firefox, you    might have used it before and its user interface is like any    other modern web browser.  <\/p>\n<p>    Some frequently asked questions about the browser can be found    in the    FAQ.  <\/p>\n<p>    Here are a few things worth mentioning in the context of Tails.  <\/p>\n<p>    Tor Browser in Tails is    confined with AppArmor to protect the    system and your data from some types of attack against    Tor Browser. As a consequence,    it can only read and write to a limited number of folders.  <\/p>\n<p>    This is why you might face Permission    denied errors, for example if you try to download files    to the Home folder.  <\/p>\n<p>        You can save files from Tor        Browser to the Tor        Browser folder that is located in the Home folder. The content of this folder        will disappear once you shut down Tails.      <\/p>\n<p>        If you want to upload files with Tor Browser, copy them to that folder        first.      <\/p>\n<p>        If you have activated the         Personal Data persistence feature, then you can        also use the Tor Browser        folder that is located in the Persistent folder. In that case, the        content of this folder is saved and remains available        across separate working sessions.      <\/p>\n<p>      To be able to download files larger than the available RAM,      you need to activate the       Personal Data persistence feature.    <\/p>\n<p>    Using HTTPS instead of HTTP encrypts your communication while    browsing the web.  <\/p>\n<p>    All the data exchanged between your browser and the server you    are visiting are encrypted. It prevents the Tor exit node to    eavesdrop on your communication.  <\/p>\n<p>    HTTPS also includes mechanisms to authenticate the server you    are communicating with. But those mechanisms can be flawed,    as    explained on our warning page.  <\/p>\n<p>    For example, here is how the browser looks like when we try to    log in an email account at riseup.net, using their webmail interface:  <\/p>\n<\/p>\n<p>    Notice the padlock icon on the left of the address bar saying    \"mail.riseup.net\" and the address beginning with \"https:\/\/\"    (instead of \"http:\/\/\"). These are the indicators that an    encrypted connection using HTTPS is being used.  <\/p>\n<p>    You should try to only use services providing HTTPS when you    are sending or retrieving sensitive information (like    passwords), otherwise its very easy for an eavesdropper to    steal whatever information you are sending or to modify the    content of a page on its way to your browser.  <\/p>\n<\/p>\n<p>    HTTPS    Everywhere is a Firefox extension included in Tor Browser and produced as a    collaboration between The Tor    Project and the Electronic    Frontier Foundation. It encrypts your communications with a    number of major websites. Many sites on the web offer some    limited support for encryption over HTTPS, but make it    difficult to use. For instance, they may default to unencrypted    HTTP, or fill encrypted pages with links that go back to the    unencrypted site. The HTTPS Everywhere extension fixes these    problems by rewriting all requests to these sites to HTTPS.  <\/p>\n<p>    To learn more about HTTPS Everywhere you can see:  <\/p>\n<p>    Tor alone is not enough to protect your anonymity and privacy    while browsing the web. All modern web browsers, such as    Firefox, support JavaScript,    Adobe    Flash, cookies and    other services which have been shown to be able to defeat the    anonymity provided by the Tor network.  <\/p>\n<p>    In Tor Browser all such    features are handled from inside the browser by an extension    called Torbutton which    does all sorts of things to prevent the above type of attacks.    But that comes at a price: since this will disable some    functionalities and some sites might not work as intended.  <\/p>\n<p>      In Tails, the       circuit view of Tor      Browser is disabled because we are not sure whether it      would have security implications in the particular context of      Tails (see #9365 and      #9366). This      feature is safe to use outside of Tails.    <\/p>\n<p>      You can see the Tor circuits in the network map of      Vidalia.    <\/p>\n<p>    Having all JavaScript disabled by default would disable a lot    of harmless and possibly useful JavaScript and render unusable    many websites.  <\/p>\n<p>    That's why JavaScript is enabled by default in    Tor Browser.  <\/p>\n<p>    But we rely on Torbutton to disable all potentially    dangerous JavaScript.  <\/p>\n<p>    We consider this as a necessary compromise between security and    usability and as of today we are not aware of any JavaScript    that would compromise Tails anonymity.  <\/p>\n<p>      To understand better the behavior of Tor Browser, for example regarding      JavaScript and cookies, you can refer to the       Tor Browser design document.    <\/p>\n<p>    You can use the security slider of Torbutton to    disable browser features as a trade-off between security and    usability. For example, you can use the security slider to    disable JavaScript completely.  <\/p>\n<p>    The security slider is set to low by default. This    value provides the default level of protection of    Torbutton and the most usable experience.  <\/p>\n<p>    To change the value of the security slider, click on the     button and choose Privacy    and Security Settings.  <\/p>\n<\/p>\n<p>    The New Identity feature of    Tor Browser:  <\/p>\n<p>      This feature is not enough to strongly separate      contextual identities in the context of Tails as the      connections outside of Tor      Browser are not restarted.    <\/p>\n<p>      Shutdown and restart Tails instead.    <\/p>\n<p>    For more details, see the     design and implementation of the Tor Browser.  <\/p>\n<\/p>\n<p>    To allow more control over JavaScript, for example to disable    JavaScript completely on some websites, Tor Browser includes the NoScript extension.  <\/p>\n<p>    By default, NoScript is    disabled and some JavaScript is allowed by the Torbutton extension as    explained above.  <\/p>\n<p>    For more information you can refer to the NoScript website and features.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/tails.boum.org\/doc\/anonymous_internet\/Tor_Browser\/index.en.html\" title=\"Tails - Browsing the web with Tor Browser\">Tails - Browsing the web with Tor Browser<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Tor Browser is a web browser based on Mozilla Firefox and configured to protect your anonymity. Given the popularity of Firefox, you might have used it before and its user interface is like any other modern web browser <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/tails-browsing-the-web-with-tor-browser\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-66504","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/66504"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=66504"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/66504\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=66504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=66504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=66504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}