persiangre.blogg.se

Using tor safely
Using tor safely




Unfortunately many sites ask for more personal information than they need through web forms. If you visit a website using Tor Browser, they don't know who you are or your true location. Unsafe: Any other browser configured to use Tor as a proxyĬontrol what information you provide through web forms.Tor only protects applications that are properly configured to send their Internet traffic through Tor. Tor does not protect all of your computer's Internet traffic when you run it. Use Tor Browser and software specifically configured for Tor Though there are some things you can practice to improve your anonymity while using Tor and offline. If you need alternatives, consider i2p, or gnunet, or just getting a VPN somewhere.Generally it is impossible to have perfect anonymity, even with Tor. Since we don't want to get into the business of writing more usable (and more Tor-friendly) BitTorrent software, it's simplest just to tell people not to do it. The trouble there is that it's a slippery slope, and so far everybody who has made a check-box in their torrent software for just tracker traffic also makes a check-box right next to it for the bulk traffic. And it could even be OK to send the tracker traffic over Tor. That's even what the Pirate Browser folks are trying to do. That said, it should be fine to just fetch the torrent files themselves over Tor. Turn static throttling on in the live network.Research problem: adaptive throttling of Tor clients by entry guards.

using tor safely

We've even been exploring mechanisms for throttling "loud" users, to make it even less worthwhile to try to BitTorrent over Tor: And since it's zero-sum, every person trying to BitTorrent over Tor means many more people in Syria who can't get to their Facebook pages.

using tor safely

It isn't designed to handle such things - the Tor network has much less capacity than it has users wanting to use it. Sending your BitTorrent traffic through the Tor network would overload it even more.






Using tor safely