-
Notifications
You must be signed in to change notification settings - Fork 9
Tor
Zak Dehlawi edited this page Sep 29, 2015
·
5 revisions
##Threats If you are deeply concerned about your privacy and security online or are in an area that heavily monitors Internet activity, the best viable solution is to use Tor. Tor really serves two purpose, it provide users with an anonymized VPN service, where traffic is routed through many servers before reaching its destination. Secondly, it provides access to part of the 'deep web' or hidden Internet servers through what are referred to as '.onion' sites.
##Best Practices
- Test Tor out before you travel or need it to ensure that it works correctly.
- The easiest method to use Tor is via the Tor Browser. Remember to keep your Tor browser and software completely up to date. Check every time before you begin using it!
- Don't connect to personal email accounts or social media when using Tor as it will deanonymize you.
- Consider using a VPN in conjunction with TOR. It is a little more complicated to setup but the confidence in security increases drastically.
##External Reference Really all the information for setting up Tor is on its website so for the most accurate and up to date information be sure to see the documentation: https://www.torproject.org/docs/documentation.html.en