{"id":66827,"date":"2015-10-12T21:47:11","date_gmt":"2015-10-13T01:47:11","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/how-to-browse-anonymously-with-tor\/"},"modified":"2015-10-12T21:47:11","modified_gmt":"2015-10-13T01:47:11","slug":"how-to-browse-anonymously-with-tor","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/how-to-browse-anonymously-with-tor\/","title":{"rendered":"How to Browse Anonymously With Tor"},"content":{"rendered":"<p><p>    Everything you do online can be traced back to your IP address.    Even if youre accessing encrypted websites, networks can see    the websites youre accessing  and the websites themselves    know your IP address. Use the Tor network to browse with    anonymity.  <\/p>\n<p>    Tor is an encrypted network that can route your traffic through    relays, making the traffic appear to come from exit nodes.    Unlike with proxies, the exit node itself doesnt know your IP    address or where you are.  <\/p>\n<p>    When you use a Tor client, your Internet traffic is routed    through Tors network. The traffic travels through several    randomly selected relays (run by volunteers), before exiting    the Tor network and arriving at your destination. This prevents    your Internet service provider and people monitoring your local    network from viewing the websites you access. It also prevents    the websites themselves from knowing your physical location or    IP address  theyll see the IP address and location of the    exit node instead. Even the relays dont know who requested the    traffic theyre passing along. All traffic within the Tor    network is encrypted.  <\/p>\n<\/p>\n<p>    Image Credit: The Tor    Project, Inc.  <\/p>\n<p>    For example, lets say you access Google.com through Tor. Your    Internet service provider and local network operator cant see    that youre accessing Google.com  they just see encrypted Tor    traffic. The Tor relays pass your traffic along until it    eventually reaches an exit node. The exit node talks to Google    for you  from Googles perspective, the exit node is accessing    their website. (Of course, traffic can be monitored at the exit    node if youre accessing an unencrypted website.) The exit node    passes the traffic back along the relays, and the relays dont    know where it ends up.  <\/p>\n<p>    Tor offers anonymity and a path through Internet censorship and    monitoring  people living under repressive regimes with    censored Internet connections can use Tor to access the wider    Internet without fear of reprisal. Whistleblowers can use Tor    to leak information without their traffic being monitored and    logged.  <\/p>\n<p>    Its not a great idea to use Tor for normal browsing, though.    While the architecture does a good job of offering anonymity,    browsing through Tor is significantly slower than browsing    normally.  <\/p>\n<p>    If you want more detailed information about how Tor works,    check out the Tor    Projects website.  <\/p>\n<p>    The Tor Project recommends the Tor    Browser Bundle as the safest, easiest way to use Tor. The    Tor Browser Bundle is a customized, portable version of Firefox    that comes preconfigured with the ideal settings and extensions    for TOr. You can use Tor with other browsers and browser    configurations, but this is likely to be unsafe. For example,    Flash and other browser plug-ins can reveal your IP address     the Tor Browser Bundle disables plug-ins for you and provides a    safe environment, so you dont have to worry about your browser    settings. It also includes the EFFs     HTTPS Everywhere extension, which enables HTTPS on websites    with HTTPS support. HTTPS provides encryption between the exit    node and destination website.  <\/p>\n<p>    Tor recommends that you not download document files, such as    DOC and PDF files, and open them in external applications. The    external application can connect to the Internet to download    additional resources, exposing your IP address.  <\/p>\n<p>    After downloading the Tor Browser Bundle, double-click the    downloaded EXE file and extract it to your hard drive. The Tor    Browser Bundle requires no installation, so you can extract it    to a USB stick and run it from there.  <\/p>\n<\/p>\n<p>    Launch the Start Tor Browser.exe file in the Tor Browser    folder.  <\/p>\n<\/p>\n<p>    The EXE file will launch Vidalia, which connects to the Tor    network. After connecting, Vidalia will automatically open    Tors customized Firefox browser.  <\/p>\n<\/p>\n<p>    Vidalia automatically launches the Tor Browser once it    connects. When you close the browser, Vidalia automatically    disconnects from Tor and closes.  <\/p>\n<\/p>\n<p>    Vidalia creates a local proxy on your system. The Tor Browser    Bundle is configured to route all your traffic through it by    default, as we can see here in the Tor Browsers connection    settings window. You can configure other programs to access Tor    through the proxy, but they may reveal your IP address in other    ways.  <\/p>\n<\/p>\n<p>    Use the Tor Browser to browse the web just as you would with a    normal browser. Its pre-configured with Startpage and    DuckDuckGo,     search engines that respect your privacy.  <\/p>\n<\/p>\n<p>    Remember not to provide any personal information  say, by    logging into an account associated with you  while using the    Tor browser, or youll lose the anonymity.  <\/p>\n<p>      Chris      Hoffman is a technology writer and all-around      computer geek. He's as at home using the Linux terminal as he      is digging into the Windows registry. Connect with him on      Google+.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.howtogeek.com\/114004\/how-to-browse-anonymously-with-tor\/\" title=\"How to Browse Anonymously With Tor\">How to Browse Anonymously With Tor<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Everything you do online can be traced back to your IP address. Even if youre accessing encrypted websites, networks can see the websites youre accessing and the websites themselves know your IP address. Use the Tor network to browse with anonymity <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/how-to-browse-anonymously-with-tor\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-66827","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/66827"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=66827"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/66827\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=66827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=66827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=66827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}