Anonymity, things not to do when using TOR !!

in #tor7 years ago (edited)

Whether you are a contractor or not, you may be required to ensure that no spying on you.
TOR is here for.
Here's how to enjoy.

9b9e8606-ed63-11e1-841d-35b460be454d-493x328.jpg

The benefits of the Internet in all aspects of our lives are well established.
However, cybercriminals proliferation of acts made the Internet a dangerous environments and sometimes ruthless.
So to various online activities, anonymity can be a MUST.
The TOR browser rather help us in this sense.
However, there are things to keep in mind not to undermine your anonymity on the TOR network.
This article aims to make awareness in this direction.

tor-logo-hr.png

As I told you from the beginning, the Internet has enormous advantages ... but the Internet can become a nightmare for those who wish to remain discreet as possible in their online activities in the digital world.
To overcome this situation, one possible solution is to make an anonymous identity thanks to the many existing tools ( VPN vs TOR & VPN vs. Proxy ).

These tools TOR seems to come first if we compare the level of anonymity provided by these many tools.
The draft TOR is seen as the best way to hide his identity on the Internet.

Edward Snowden , who became famous for shooting sound the alarm by exposing abusive monitoring activities of the masses undertaken by the NSA has used digital to do.
He also was accused by federal inciting attacks and massacres of Paris because of the confidential information disclosed.

The digital network has the ability to protect yourself from these trackers and malicious spirits that you continue all over the Internet.
Even if you want to become Edward Snowden well ... you can become thanks to digital browser.

However, we have to keep our eyes open to the fact that one small mistake on your part can help to disclose all or part of your identity on the Internet no matter how you consider safe.
Indeed, TOR does not read your mind like magic to detect not very recommended activity you want to do.
So, there are a few things to keep in mind to ensure a workforce anonymity on the Internet.

Meanwhile, it is completely unnecessary to read the rest of this article if you have no idea about digital and operation. I suggest you read the article below to learn all about digital here .

Now that you are notified on discrete and functioning, you can continue reading this article without problem.
Here are the things not to do when using TOR.

1) Do not use your mobile phone to make a "2-Step verification" on Tor

Many web sites - Facebook, Google, Twitter - provide a verification service known in English as the " 2-Step verification .
" This service usually allows to use your phone number to be sent a password - OTP: One Time Password - allowing you to log in securely to your account.
You should always be careful when using TOR browser to access your account.
If you give your phone number to a website, this will only undermine your online anonymous status because it will be easy to track you from your telephone number.
Also note that even if you use a card SIM - Subscriber Identity Module - registered under a name other than your own, your telecom operator can always trace you from the IMEI of a mobile station that is in their ( s) base (s) of data.

2) Do not use his user accounts out of tor

If you use the TOR browser to log into your Facebook, Twitter or email, so do not use these accounts other than the TOR browser otherwise exposing your identity to the site.

Almost every site on the web keeps your login information such as your login, your location, your IP address and other details. So, use your account on the public network such as the Internet will be enough to disclose your IP address logged and may reveal your identity.

3) Do not post personal information

You must engrave this in your heart and in your mind.
Do not post personal information such as your name, address, date of birth, number of your credit card when you use TOR. This will put you in the open and in this case, discrete not useless.
I hope you understand that!

To remain anonymous, you must use pseudonyms.
What are we to understand by this?
This means that you will take with you a disparate behavior when you use TOR.
You must become a new person with new interests, new phobias and consort.

To do this, create a new user account with a new email address does not reflect your true identity.
You can then use this email to your social network accounts on digital and enjoy the power of digital in terms of anonymity.

In addition, we must not confuse anonymity and " pseudonymity ."
An anonymous connection is one in which the server you want to connect to has no idea of your real IP address - location - and your identity.

A connection alias is one in which the server that is sought has no idea about your real IP address - location - but has an identity that can be associated with said connection.

4) Do not send data unencrypted over the Tor network

When you read the article I suggested to you earlier to learn all about digital , you are surely come to understand that digital does not encrypt your data but your connection apart from the fact that the output nodes - exit nodes - TOR network are vulnerable.

So, it is highly recommended not to send via the TOR network, unencrypted data.
That is to say, in the clear.
This is because a third party can access your unencrypted information to the output of the digital network at the exit nodes .

5) Do not use tor with windows

Microsoft Windows is the operating system most used in the world speaking computer desktops .
However, the operation of Tor does not seem optimal in this system.
Microsoft Windows contains vulnerabilities that can help to disclose your identity even if you use digital to access the Internet.

To avoid this, GNU / Linux will be most useful.
GNU / Linux distributions such as Tails and Whonix are preconfigured to work with Tor.

6) Do not forget to delete cookies and local data of the visited website

When you access a website, a small file is sent to your computer.
This file holds a / information about your browsing habits and other data.
Such so the website is able to recognize you on your next visit.

This file is called a " cookie ". Some websites may also directly store data locally on your hard drive.
You must delete these cookies and local data of the website after each session you operate on discrete.
This information may allow the website to collect information about you.
And track your location and IP address.

The latest versions of the TOR browser automatically delete web cookies every time you complete a session.
Alternatively, you can click the button in the form of onion before the address bar - New Identity option - to do the same thing without closing the browser.

7) Do not use TOR to search on Google

If you wish to remain anonymous when using TOR, do not use Google to search.
Google collects information about your online activity.
The keywords you enter your search query, stores cookies on your computer and tracks / track your activity to refine its advertising services.

I guess you do not want to reveal that information.
Are not they? So instead of using Google, you can use search engines like DuckDuckGo and StartPage because they do not spy on you.
Here also for the most curious of you, 10 search engines that do not spy on you

8) Do not use HTTP websites on the TOR network

You know that vulnerabilities to exit nodes of TOR can be exploited.
So if you go to sites operated by HTTP via digital, there is likely someone accesses your information at the ends of the TOR network.

Data sent to or from an HTTP web site are not encrypted.
They can therefore be seen / intercepted knowing that digital figure that the internal connection to the TOR network.

You can prevent such situations you using sites over HTTPS.
To find the difference between HTTP and HTTPS, I recommend the following article.
For those who want to, here is the difference between HTTP / HTTPS .

9) Do not connect on a single server with and without Tor simultaneously

This is a key point to keep in mind. If you are trying to access a particular remote server via TOR (anonymously), do not try to access the same server outside the Tor network (short, no anonymous) because doing so may reveal your identity .

This is because, if your Internet connection is interrupted, both connections will stop at the same time and it will not be so difficult for a spy to complete the puzzle.

In addition, a web server might attempt to correlate the two connections by increasing / decreasing the speed of your Tor connection or non-Tor to see if the rate fluctuates over the other connection and consistently track your real IP address.

Conclusion

To guarantee a certain anonymity on the Internet, Tor still a great option.
Although the TOR network is criticized by federal for supporting illegal activities.
However, I want to remember that tor was not created to encourage such acts.

Being anonymous on the network is a need that can be expressed by each of us for different reasons.
Whether you're an entrepreneur, activist, or otherwise.
Perhaps also because we just want to be "fashion pseudonym ".

You just need to learn to use it much more effectively.
We have seen that certain precautions are needed to ensure a good level of anonymity.

Link : https://www.torproject.org/

VPN: https://windscribe.com/?affid=kpgsqcuy ( i made a video in french on my youtube channel how you can get this vpn for free using temporary disposable email)

Sort:  

Nice info. Really well written. In the world of big brother a little privacy would be nice :)

Congratulations @tutogratuit! You have completed some achievement on Steemit and have been rewarded with new badge(s) :

Award for the number of posts published
Award for the number of upvotes

Click on any badge to view your own Board of Honor on SteemitBoard.
For more information about SteemitBoard, click here

If you no longer want to receive notifications, reply to this comment with the word STOP

By upvoting this notification, you can help all Steemit users. Learn how here!

Coin Marketplace

STEEM 0.16
TRX 0.15
JST 0.028
BTC 58106.16
ETH 2286.45
USDT 1.00
SBD 2.56