Why is TOR secure? What is TOR and how secure is it?

Browser Tor(Further Tor Browser) ensures the anonymity of your actions on the Internet. It hides your identity and protects your web connections from many types of online surveillance. Tor can also be used to bypass Internet blocks.

  • How to remain anonymous and bypass censorship on the Internet

What will you learn from this chapter?

  • How to Hide Your Digital Identity from the Websites You Visit
  • How to Hide Websites You Visit from ISPs and Spyware
  • How to bypass Internet censorship and filters
  • How to protect yourself from unsafe and potentially malicious websites with an add-on NoScript

1. Introduction to Tor Browser

2.1 Downloading Tor Browser


Image 2. Tor Browser bridge settings

Step 2. Select Yes.


Image 3: Setting up bridges

Step 4. Select option Connect to predefined bridges.

Step 5. Click button [Further] to configure proxy.

Tor Browser will ask if you need it to access the Internet. local proxy. In this example we're assuming you don't need it. If need to, look at the settings of your usual browser and copy the proxy settings from there. (In Firefox, you can find this in the menu Settings > Advanced > Network > Configure. In other browsers, you may find the same settings in the Internet access settings. You can contact support system browser for help.


Image 4. Proxy settings

Step 6. Select option [No].

Step 7 Click button [Connect] to launch launch Tor Browser.


Image 5. Connecting to the Tor network

After a couple of moments, Tor Browser will open.

3.2.2. Connecting to the Tor network with other bridges

You can also connect to the Tor network by specifying bridges on one's own. This is rarely used (mostly they prefer predefined bridges), and therefore there is less chance that this method will be blocked. If you are unable to access the Tor Project website, you can ask for addresses of bridge sites by sending an email to [email protected] , provided that you are using an account Riseup, Gmail or Yahoo. Insert words get bridges in the body of the letter.

If you have There is to gain access to the Tor Project, you can find out the addresses of such bridges, Go to the page https://bridges.torproject.org/options and follow the steps.

Step 1. Click button Just give me the addresses of the bridges!.


Image 1: Obtaining Tor Bridge Addresses

Step 2. Type the characters from the picture ( captcha) and press Enter.


Image 2. Captcha

You will see three bridge addresses.


Image 3. Bridge addresses

Step 3. Now that you have the bridge addresses, you can dial them in Tor bridge settings as shown below.

Note. If this is your first time launching Tor Browser, you may see a screen Tor bridge settings by simply following the steps from . If Tor Browser is already configured, refer to .


Image 4. Tor bridge settings

3.3. Changing Tor Network Access Settings

You can change Tor settings when the program is already configured. Let's say you're traveling to a country where Tor is blocked. How to change settings? Follow the steps:

Step 1: Click button to see the Tor Browser menu.


Image 1. Tor Browser settings menu

Step 2. Select Tor network settings to determine how Tor Browser connects to the Internet.


Image 2. Tor network settings

In the settings you can enable or disable bridges and select other options.

When you're done, click button And restart Tor Browser.

4. Anonymous Internet access via Tor Browser

It's important to remember that Tor Browser provides anonymity only for those actions that occur in the Tor Browser window. Tor itself does not protect all other online activities.

Note. In accordance with privacy policy , Tor Browser configured to not save browser history to your hard drive. Whenever you exit Tor Browser, your history is deleted.

4.1. How to check if Tor Browser is working

Tor Browser hides your IP address from the sites you visit. If the program is configured correctly, it should appear as if you are accessing a website on the Internet from an IP address that is different from your normal IP address, and your physical location cannot be calculated from the IP address.

The easiest way to make sure that the program works is to check on the developer’s website https://check.torproject.org/ .

If you don't use Tor, you will see:


Image 1: Check shows that Tor is not working properly

If you are using Tor, the image will look like this:


Image 2. Test shows that Tor is working as expected

Do you want to know the IP address under which you connect to the Internet via the network? Tor? There are many ways to do this on the Internet, including websites that support encryption. https(which will make life difficult non-providers who want to “fake” the result):

If you go to this site Not Through Tor Browser, you can see your real IP address associated with your real location. If you access via Tor Browser, a different IP address will be displayed.

4.2. Creating a New Identity

You can create a "new identity" in Tor Browser. In this case, Tor Browser will randomly select a new set of retranslators. From the outside it will look like you are logging in from a new IP address when you visit a particular website. To create a new identity:

Step 1. Click button to open the Tor Browser settings menu.


Image 1: Creating a new identity in Tor Browser

Step 2. Select paragraph New identity.

Tor Browser will clear your browsing history and cookies, then restart and you will continue using a different IP address.

4.3. NoScript Add-on

4.4. Tor Browser Update

You will receive notifications about new Tor Browser updates.

Step 1. Click button to display the Tor Browser menu.


Image 1. Tor Browser Settings

Step 2. Select Check for Tor Browser updates.


Image 2. Checking for Tor Browser updates

The program will tell you if there is a new version of Tor Browser and if an update is required.


Image 3. Program updates

FAQ

Question. Why should I Tor Browser?

Answer. Tor Browser is a useful program if you need to bypass censorship and gain access to certain sites. Tor Browser is useful if you don't want your ISP to know what sites you visit. The program also hides your location on the Internet from websites.

Question. I'm launching Tor Browser; Now all programs that go online work through the Tor network?

Answer. No, by default only what you are working with is sent through the Tor network. Tor Browser. Other programs work as usual - directly through your Internet access provider. You can find out if the Tor network is working by going to Tor test page by the address https://check.torproject.org. Tor's developers also expect people to be careful, use common sense, and use common sense when accessing new and unfamiliar websites.

Question. Is what I'm doing encrypted? Tor Browser?

Answer. Tor encrypts all communications inside Tor networks. Keep in mind that Tor cannot encrypt data that leaves the Tor network. To protect data between Tor exit node and the site you are linking to, it's still better to use HTTPS.

Recently, interest in the anonymous network has been constantly growing. And there are many reasons for this..

“Democratic reforms” in the world are in full swing. The governments of almost all countries now sincerely consider themselves to have the right to decide where their citizens go, what to watch and what to read. Bundles of laws, “with the best intentions” churned out by dumas, councils and parliaments, increasingly define the boundaries of the reservations within which the existence of users on the global Internet is now only possible.

“Don’t go there - come here. Otherwise the snow will fall on your head and you will be completely dead” © “Gentlemen of Fortune”.

Another tense moment is the ongoing revelations of Edward Snowden, from which it is clear that the total surveillance of everyone by the special services has already acquired a truly global scale. Of course, the overwhelming majority of people have nothing to hide, but it is extremely unpleasant to realize that you are under the constant surveillance of special forces, your every step is monitored and recorded, and someone regularly tries to pick their naughty little hands in your “dirty laundry.” And it doesn’t matter for what purpose he does it, whether his intentions are good or not.

Why is it needed, this Tor?

More and more people are trying to preserve the integrity of their private lives from the long nose of the intelligence services. More and more people are trying to get rid of the “fatherly care” of state officials and want to exercise their constitutional right to independently decide where to go, what to choose, where to look and what to do.

And here the anonymous Tor network comes to their aid. Because it can provide an individual with a significant reduction in obsessive attention, simultaneously removing almost all restrictions on movement on the World Wide Web. Tor will hide your online identity, hiding everything you did on the Internet and where you went.

In addition, the Tor network has another small practical bonus. It quite often allows you to bypass such an annoying thing as an IP ban on various sites. It's a small thing, but nice.

What is Tor and how does it work

So, what is the anonymous Tor network? Tor is an abbreviation for The Onion Router (for those who do not know bourgeois, but are curious, see the translation in). If anyone is interested in tedious technical details, let them go to the Tor page on Wikipedia and figure it out. I would like to be a little simpler - on the same page on Lurkomorye. I’ll try to quickly explain it “on the fingers”.

Although this network operates on the basis of the regular Internet, all data in it does not go directly from you to the server and back, as in a “big” network, but everything is sent through a long chain of special servers and is encrypted many times at each stage. As a result, the final recipient, that is, you, becomes completely anonymous for the sites - instead of your real address, a completely wrong IP is displayed, which has nothing to do with you. All your movements become impossible to track, as well as what you did. And intercepting your traffic also becomes completely useless.

This is in theory. In practice, sometimes things are not so rosy. But we’ll talk about all possible problems a little later. You're already tired of the long and boring introduction, aren't you? Can't wait to install and try this miracle? Well, let's go!

Let's start using Tor?

Tor is a rather complicated device to install and configure. And in not so ancient times, connecting an ordinary “kettle” to it became a far from trivial task. However, today everything is much simpler. Smart and kind people took all the necessary modules, collected them into a coordinated group, configured everything as needed and stuffed it into a single package. This package is called . And after downloading, all the fuss with it comes down to the usual unpacking and subsequent stomping on the “I want Tor!” button. And Tor appears.

Of course, computer geeks and those who have nothing better to do or want to amuse their SCI can, as before, download all the necessary modules separately and gnaw at the multi-page technical “Kama Sutra”, trying to tie it all into a single whole, and somehow set it up and run the resulting design. Let's wish them good luck, and let's move on to something more rewarding.

I advise you to pay attention to the link on this tab “ Checking Tor Internet Settings" Clicking on it will help you finally make sure that you are actually now on an anonymous network. By the way, there is also a link to a short guide.

So you are now invisible. However, before your head completely spins from anonymity and imaginary impunity, I will hasten to slightly spoil your mood. Just like that, purely out of personal harm.

I simply have to tell you about some of the “pitfalls” of the Tor network, so that when looking for adventures in your “lower hemispheres,” you don’t hurt them on these stones.

A little security in Tor

So, what Tor cannot protect against. Tor will not be able to protect a person from his own stupidity. If a person has only sawdust instead of brains in his neck growth, or he is purposefully looking for problems for himself, then he will definitely find these problems. And no Tor will help here. Learn to use your brain and exercise basic caution. Tor will also not be able to protect you from chatty programs on your computer. Any plugin or add-on in the browser can instantly “multiply your entire anonymity by zero.” And the browser itself...

That is why the package we are considering uses a specially modified version of Ognelis. By the way, does anyone else need to be reminded that Windows itself is one huge Trojan and a spyware? ( Linux people can breathe freely here - they never worry about such childhood problems of “windows”). Tor will also not be able to protect you from viruses and hackers. Well, it's not designed for that! Get yourself a normal antivirus and firewall, configure them correctly and learn how to use them - and sleep well.

The main problems of the anonymous Tor network

Okay, I’m finishing my lyrical digression and moving directly to the problems of the Tor network itself. The first thing that catches your eye is the speed. Page loading speed. Although the words “speed” and “rushing” are clearly inappropriate here. Pages are loading much slower than usual. This is the price for anonymity. The page you requested, before it gets to your browser, hangs around for a long time between servers around the world. It should, however, be recognized that the situation now is much better than a couple of years ago, and it’s quite possible to live at this rate. If you get used to it a little. No matter what, the network is developing and growing stronger.

Intelligence services

Another - and perhaps the main - problem of the Tor network is intelligence agencies. They just can’t come to terms with the fact that crowds of users roam the Internet freely and uncontrollably without their “all-seeing eye.” And they are constantly making all kinds of attempts to change the situation. The attempts are varied, even downright criminal. Before virus attacks, hacker attacks and hacking, targeted infection of software and servers with Trojans. Although not often, sometimes their efforts end successfully for them, and entire segments fall out of the “onion” network, and a “pative van” comes to one of the unluckiest (or the stupidest, or the most arrogant). But you’re not going to do anything criminal in Tor, are you? This is all to ensure that you do not relax too openly and always remember that Tor is not a panacea, and any anonymity is relative. And if you’ve already decided to gamble with the state, then it’s only a matter of time before you’re caught.

Officials

In addition to intelligence agencies representing the interests of states, government officials often pose a problem for the anonymous Tor network. The desire to “keep and not let go” in people who have seized power is ineradicable. Occasionally, in relation to some things, this desire is completely justified and fair, but more often than not, it is not. And the bit of freedom granted by Tor acts like a red rag on them. The Tor network is already banned in some countries. Legislatively. There was such an attempt in Russia. So far only in the draft version. Whether and when this project will become law, I do not know. At the moment, the Tor network in Russia operates without restrictions. If they ban it, something else will be found instead. I won’t lay out here verbatim folk wisdom on this matter, but I’ll say it a little softer and more streamlined: “For every action there is a reaction.”

Hackers

Another scourge for Tor is hackers. Some of them are ideological. and some are simply stoned to *** (sorry for the unparliamentary expression). Periodically, most often during a spring or autumn exacerbation, they organize “crusades”, trying to “cleanse the world from filth.” At the same time, the opinion of the world itself does not bother them at all. They feel that they have the right to decide for everyone. Not long ago there was a “campaign” against, let’s say, unconventional porn on the Tor network. The matter in this case is quite godly. However, along with porn, a bunch of completely white sites were also cut down. Just like that, in passing. And who said that next time they will limit themselves to only this? So know that if your favorite “onion” site suddenly stopped opening, then it is quite possible that these are the actions of one of these people with a sore brain.

Infected files

Hackers are closely related to the problem with infected files of the Tor Browser itself. And here the ears of various intelligence agencies are often peeking out, trying to plant their Trojan on you instead of an anonymous network. For example, in App Store they still offer to download the infected Tor Browser. Moreover, the App Store administration was notified about this several times back in the fall. However, the Trojan is still there. Strange situation and strange slowness. True, all the strangeness instantly disappears when you remember that the tender and reverent friendship between the Apple Corporation and the US NSA is growing stronger day by day. So, download the files of Tor itself exclusively from the official website, or our engine, in fact, will also give you the file directly from the official website.

Minor disadvantages of Tor

The review of more or less serious problems of the Tor network is over. Let's move on to minor troubles. I have already spoken about periodically disappearing sites. Now about Russian sites in this anonymous network. They are few. But they already exist, and there are more and more of them. And even on many foreign-speaking forums there are sections for Russians. So where to wander and who to talk to you will find. However, the main language on the Tor network is still English, and everything delicious on this network is in bourgeois. Although all kinds of dictionaries and dictionaries are always at your service.

Further. It should be remembered that the Tor network is fundamentally not moderated or controlled by anyone. Sometimes some kind of control is found on individual sites when their owners set rules for their visitors. But not more. Therefore, you may well stumble upon things that shock you. Be prepared for this. Also in this network there are various scumbags, outright schizoids, maniacs and other freaks. There are plenty of them on the “big” Internet, but on the anonymous network they feel more comfortable and are not particularly embarrassed. Their percentage is much smaller than government officials are trying to tell us, but they exist. And if you have minor children, I recommend protecting them from Tor.

And in general, I urgently demand that the Internet be protected from children! This will only benefit the Internet. This will make him much safer.

Well, in general, I told all the horror stories. Let me just remind you about viruses that Tor will not protect you from - protect yourself. Well, about anonymity once again - it is never one hundred percent, use your gray matter more often.

And for dessert, a small list of “onion” sites, so to speak, for overclocking.

Goodies and bonuses - a small list of “onion” sites

By the way, if you haven’t realized yet, in Tor Browser you can open both regular sites of the “big” Internet, bypassing some inconveniences, and special sites of the anonymous “onion” network. These sites are located in a special pseudo-domain zone .onion(look carefully at the address). They do not open from the regular Internet. At all. Only from a running and connected Tor Browser.

  • Tor Wiki(http://torwikignoueupfm.onion/) - Directory of Tor links.
  • The Hidden Wiki(http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page) is the first site where every new user of the Tor network should look. Contains links to almost all resources of the “onion” network. Often inaccessible due to huge influx of visitors.
  • The Uncensored Hidden Wiki(http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page) - mirror of The Hidden Wiki. Moderation is minimal.
  • TORDIR(http://dppmfxaacucguzpc.onion/) - a large catalog of “onion” sites.
  • Tor Search(http://kbhpodhnfxl3clb4.onion/), Torgle(http://zw3crggtadila2sg.onion/torgle), TORCH(http://xmh57jrzrnw6insl.onion/) and The Abyss(http://nstmo7lvh4l32epo.onion/) - search engines on the Tor network, at least one of them works.
  • Flibusta(http://flibustahezeous3.onion/) - a mirror of the famous library in the “onion” network (RU language).
  • OnionNet(http://onionnetrtpkrc4f.onion/) - IRC network. The main language of communication is English. Different channels for discussion, even illegal. Additional servers: ftwircdwyhghzw4i.onion, renko743grixe7ob.onion, nissehqau52b5kuo.onion.
  • vTOR“e(http://da36c4h6gxbckn32.onion/) - social network. interest clubs, blogs, forum.
  • RAMP(http://ramp2bombkadwvgz.onion/) is today's largest trading platform in the Russian-language segment of the Tor network. Recently, there have been a lot of complaints about the actions of the administration and the increasing number of cases of scammers. (So ​​don't click your beak and keep your eyes and ears open) Moreover, the largest selection in the entire network. And the highest prices.
  • RUForum(http://ruforumqewhlrqvi.onion/) - Russian-language forum with communication and sale of everything that is not allowed. Recently it has been closed to outsiders. Registration is paid - $10.
  • Amberroad(http://amberoadychffmyw.onion/) is one of the largest shadow trading platforms.
  • Assassination Market(http://assmkedzgorodn7o.onion/) - betting on guessing the date of death of all sorts of bad people. Anyone can add a person to the list or increase the bid on existing positions. At the moment, Barack Obama and Ben Bernanke are in the lead.
  • Hack IT(http://tuwrg72tjmay47uv.onion/) - a live service for hiring hackers.
  • WikiLeaks(http://zbnnr7qzaxlk5tms.onion/) - I hope there is no need to explain what it is? Mirror in the “onion” network (ENG).
  • Onion-Portal(http://ximqy45aat273ha5.onion/) - guide to the “onion” network (RU).
  • http://k4bmdpobhqdguh2y.onion/ - blog about new hidden network services (ENG).
  • Lukochan(http://562tqunvqdece76h.onion/Lukochan/) - large board (ENG, RU).
  • Silk Road(http://silkroadvb5piz3r.onion) - another large anonymous trading platform (ENG).
  • Keys open doors(http://wdnqg3ehh3hvalpe.onion/) - a site about hacking game consoles and all kinds of gadgets (ENG).
  • http://n2wrix623bp7vvdc.onion/hackingservices.html - a resource about hacking social networks, etc. (ENG).

I intentionally do not cite all kinds of political-revolutionary-partisan resources here. Whoever needs it will find it himself.

The article is provided solely for the purpose of familiarizing yourself with the technology of the Tor browser.

In recent years, one has heard more and more often about restrictions on the Internet. Governments of different countries prohibit their citizens’ access to resources containing content that, in the opinion of deputies, is incorrect. Operators are forced to transmit information about users, and there is no talk of any anonymity on the Internet. At the same time, it is not always the case that sites blocked by decision of certain authorities actually contain materials that can harm users.

“The forbidden fruit is sweet,” and various restrictions on the Internet have given rise not only to ways to circumvent them, but also to an entire secret network, which can only be accessed using special means that hide information about the user. The anonymous network is called Tor, and it is available absolutely free to everyone.

What is Tor

The abbreviation Tor stands for The Onion Router. This name may seem ridiculous to people who are not familiar with the concept of onion routing. It refers to the technology of anonymous exchange of information using a standard computer network. The principle of operation of the system is based on permanent encryption of data during transmission from the server to the client. Data passes through many network nodes, thereby erasing traces that could lead to the sender and recipient of the information.

Thanks to Tor, users do not have to worry about their anonymity on the Internet. They get the opportunity to view any information they are interested in, secretly leave messages on sites, send each other encrypted personal messages, and do much more secretly from everyone. Using Tor, you can easily bypass all ISP restrictions imposed on sites.

As you can understand, sites on the hidden Tor network are not moderated or checked by anyone. You cannot send a content complaint to them, and if you do, such actions will lead to nothing. Accordingly, in Tor you can find, among other things, information prohibited in all countries. Shocking, illegal, devoid of humanity and meaning, materials and services are contained on the Tor network. This is why it got the name “dark internet”. Sites created exclusively for access via Tor are located in the .onion domain zone. They are not indexed by regular search engines and can only be accessed through the anonymous Tor network.

You can view information on the Tor network through any computer, but this requires a browser of the same name, which is distributed free of charge.

How to use the Tor browser

Starting to use Tor is quite simple; to do this, you need to download Tor Browser from a regular browser and install it. Tor is installed as follows:

Once the Tor browser is installed on your computer, it must be properly configured to work on the anonymous network. Launch Tor using the Start Tor Browser.exe shortcut from the folder where it was installed. Next, you need to set the primary parameters. This can be done automatically by clicking “Connect” in the window that opens, but this method does not always work.

If you are unable to automatically connect to the Tor network, you can select “Configure” and set the necessary parameters yourself. The process of manually setting up Thor is also quite simple; you will need to answer 2 questions:


When the answers are selected, the Tor browser will again try to make automatic adjustments based on the received data. This may take a couple of minutes, after which Tor will start.

Please note: The Tor browser is based on Firefox.

To finally make sure that the computer is now on an anonymous network, you need to click on the “Check Tor Internet settings” button.

If a page opens that says that the browser uses Tor, then everything is configured correctly, and the program can be used for anonymous access to resources.

Important: In the Tor browser, you can view the chain through which user anonymity is achieved. On any page, click the green onion icon to the left of the address bar. A pop-up menu will open, where you can see through which chain the request passes from the computer to the final server.

To achieve maximum privacy, Tor provides 4 levels of security. By default, the browser sets it to minimum, but you can change this setting if you wish. To do this, click on the green onion to the left of the browser line and select “Privacy and Security Settings.”

A new window will open where you can use the slider to adjust the security level from low to high. Next to each of the options it is written how they differ and what functions they turn off. The higher the security level, the worse various plugins and services will work in the browser, and the content will be displayed on sites.

For basic use of the Tor browser, a low security level is sufficient.

What are the disadvantages of the Tor browser?

Complete anonymity on the Internet is quite a significant advantage for many to completely switch to the Tor browser. Despite this, the number of people who use it on a regular basis is small.

With such an initiative, the free Internet is becoming smaller before our eyes. At the same time, most users are sure that Tor and VPN cannot be limited in any way. We asked advice on this from Mikhail Lisnyak, the creator of the meditative service for tracking currency quotes and oil prices Zenrus and a teacher at Moscow Coding School, whose course registration started today.

VPN - in a nutshell - is the creation of a virtual network on top of another network, for example our Internet. That is, an encrypted channel is created between the user and the VPN server, through which the user connects to another network, and it turns out that a person from Moscow accesses the Internet as if he were from, for example, Amsterdam. We are now considering one of the VPN options, which relates to the information feed; in general, there are many more different types and applications, but their operating principles are absolutely the same.

Tor is a routing system based on encryption and a distributed network of intermediary nodes (they can also be ordinary Tor users). When connecting to Tor, the client collects a list of available intermediary nodes, selects several of them, and in turn encrypts each sent packet with the keys of the selected nodes. Next, this packet, encrypted with several keys, is sent to the first (input) intermediary node. The latter decrypts its key and sends the packet further, the second node decrypts its own, and so on. At the end, the last node decrypts the last “layer” and sends the packet out to the Internet. You can think of it as an onion, with each subsequent node peeling off a layer. Actually, this is what Tor stands for - The Onion Routing, that is, “onion routing”. Since almost the entire path of the packet is encrypted and no one except the input node knows the sender of the packet, the system ensures anonymity and security of traffic.

But you can block Tor. First, the Tor client must somehow obtain a list of entry nodes. To do this, the client connects to the root registry of these nodes. If you block access to this root server, the client will not be able to obtain a list of input nodes on the network and, of course, will not be able to connect to the network. There is a manual way to obtain nodes (for example, through mail), but this, firstly, is not very convenient, and secondly, if the supervisory authorities discover the addresses of these nodes, they can still be immediately blocked.

In addition, there is such a system as DPI - a packet analysis and filtering system. Now this system is gradually being implemented in Russia by providers. It is quite expensive, so not all providers use it. But that's it for now. I think that in the near future all backbone providers will install it. This system can analyze traffic at a low level, determine the type of this traffic (even encrypted, but without receiving the content itself), filter it and, if necessary, send it for blocking. Now these systems are already able to identify Tor traffic based on certain criteria. Tor responded by coming up with a traffic masking system (obfsproxy), but gradually they are learning to detect it too. And using all this is becoming more and more difficult for the average user.

If the authorities want, they will block everything for the vast majority of users. Particularly stubborn geeks will be able to find loopholes, but for the average user this is not an option

That is, Tor can be banned in an entire country using the same DPI. When they introduce criminal liability for the use of such software, several show trials will quickly be held, and that will be the end of it for the most part. There are no sane replacements for Tor yet. The same i2p is banned in exactly the same way. Now blocking Tor is not easy, it is expensive, but it is quite feasible if the state really wants it.

In general, everything has already been invented and is used, for example, in glorious China. Known nodes are blocked, traffic is analyzed by DPI, and identified packets are blocked (and information about the sender is sent to the right place). Plus, there is a “forward connection” system, when a suspicious packet to some server on the Great Firewall is “suspended”, and the firewall itself makes the same request to this server and analyzes the response. And then, based on various criteria, it is determined whether it is possible or not.

If the authorities want, they will block everything for the vast majority of users. Of course, especially stubborn geeks will be able to find loopholes, they will be covered, new loopholes will be found - this is an eternal process, as happens with viruses and antiviruses. But for the average user this is not an option. In addition, there is always the opportunity to introduce white lists or simply close the entire external Internet completely. But I hope it doesn't come to that.

Full name: Tor Browser Bundle. Built on the Mozilla Firefox platform and is one of the most anonymous browsers in the world. When using the Internet, changes your IP address to a random IP address. Uses IP from different countries: Romania, Luxembourg, Switzerland, Germany. Does not store cookies or a log of visited sites, does not remember logins and passwords. Uses a special secure network of anonymous proxy servers.

Installing Tor

You can download this browser from the official website: https://www.torproject.org/download/download-easy.html.en

Select your language and click Download Tor Browser Bundle:

Run the downloaded file:

Click OK:

Install:

Ready:

Using Tor Browser

Launch the program. If you haven't unchecked Launch Tor Browser Bundle After the installation is completed, it will start automatically.

When you first launch you will see a window Tor network settings. Here you need to select the connection type. Nowadays, in most cases, the first option is suitable - a button Connect:

After this, the browser connects to the Tor network, which will hide your real IP address, ensuring your anonymity. Wait for connection to the network:

For greater privacy, you can request English versions of pages. But this is not a key indicator of anonymity. You can click No:

Tor browser is not installed on the system in the traditional way, because... is a portable application. You can carry the program with you on a flash drive. By default, when unpacking it is placed in the folder Tor browser on the desktop:

You can move the browser folder to any location. When you want to launch TOP to anonymously visit a site, enter the folder with the program and run the file Start Tor Browser.exe:

After pressing the button New identity and before using a new IP address, go to 2ip.ru and see what has changed.


To imitate another identity, it is advisable to change not only the IP, but also the country. If necessary, press the button Tor, select item New identity (New Identity), until the country changes:

Attention! Due to the fact that when working through the Tor browser, traffic goes through many proxy servers, the page loading speed is much lower than through a regular browser.