Tor has become the emblem of browsers that can more efficiently keep our hidden data during the time we surf the Internet.
There is a lot of information (some true, others not so much) about this browser , which is closely related to the Deep web . If we need to keep ourselves hidden we will have to meet certain requirements since the browser cannot do its job with 100% deficiency.
In this report we will bring you all the data and truths that you need to know about Tor, we will show you the best tricks with which you can navigate without any inconvenience keeping you hidden at all times for others . We will also talk about Javascript and why we have to disable it.
Index:
Tor Browser only works with session cookies , and permanent cookies type “ As far as I know ” (AFAIK) are considered session.
In principle our security would not be so compromised according to this system, but as there are other factors that also determine the level of privacy, not only, it is advisable to delete cookies and verify that self-destructive cookies really do not exist at the moment to close a session.
If we want to delete session cookies before starting again in Tor, we will have to modify the configuration.
To do this, we will go to the onion drawing and select « New identity «, so we can access again as if it were the first time we entered.
In order to disable JavaScript, we will have to follow these steps:
- We start the software.
- In the address bar, select the icon « S «, which corresponds to Noscript
- Click in « Option «
- We search for « General «
- Click on « Script «
- We choose « Default «
There is another way to use the tool « JavaScript Switcher » which will be added to the browser and will help us to enable or disable JavaScript.
We will do this procedure:
- We install « JavaScript Switcher «
- We click on « Menu «
- Select « Add-ens «
- We type in the search bar« JavaScript Switcher «
- We choose the first option
- We click on « Add to Firefox «
- Select « Add «
There is a third way to disable JavaScript and it is through a manual procedure directly in Tor.
In order to do this step we will perform the following procedure :
- In the address bar we write « about: config «
- Select « I accept the risk !»
- We write in the bar « enabled «
- And we activate through « False «
List of the best 15 tricks and tips to get the most out of it to Tor Browser
The following are the best tricks you can find about the browser, with them you will become an expert in hidden navigation:
The main meaning, rather, the essential feature of the Tor browser is precisely not to expose our data to the members of the Internet network through autonomy and security protocols.
To do this, we will need to work with different data than those we use frequently on other Internet sites. We can use temporary emails and any aliases that we don’t use on other sites . Nor can we use the alias we have in Tor in other browsers that are not secure.
Cryptocurrencies
It is advisable not to use real currencies when you want to make operations but this kind of virtual currencies to maintain our anonymity.
Banks or financial institutions
Something that is too logical, but necessary to recommend, is that if we want to continue browsing without our data being known, we cannot interact with banks or any official body that has the same characteristics, since they will ask us to identify ourselves and You will lose your sense of sailing in Tor.
Tor security
It is said that this browser is as secure as any VPN , but being a browser also works with Script, that is, it makes it a reliable tool in terms of security, but with some limitations if we don’t pay attention to some details.
The problem arises when our operating system is not updated , so it becomes vulnerable to the entry of intruders. When we navigate a vulnerable operating system, Tor cannot fulfill the function we request, which is to keep our privacy 100%.
Although when we access the browser, our IP changes to one that is surely thousands of kilometers from our location, thus obtaining great peace of mind in the non-identification of our equipment, we should not abuse this situation .
It has been verified that when browsing from the same computer, to the same web pages, or close to the same location with the same device, they have been able to determine the real origin of the computer and the identity of the user.
Social networks
Just the sense of navigating through Tor is not identifying ourselves , if we need to enter one of our social networks, Tor cannot do his job because yes or yes we will have to register.
Browser use
Both the Deep web and the traditional Internet provide us with different browsers that keep our real identification hidden. If we use a different kind of browser, for example, Chrome or Internet Explorer (and we have to redirect to another site) , it will not make sense to browse Tor, because these browsers through their cookies They can easily identify us.
Enter Raspberry Pi with Tor Browser
We can install a router, that is, a “Raspberry Pi” on the Internet access door, so that once we have downloaded Tor we can pass all the data packets through Raspberry Pi and thus keep ourselves hidden.
To configure Raspberry Pi :
- Open the Raspberry Pi command line
- Type “ sudo apt-get update ”
- Accept
- Then we write “ sudo apt-get install iptables-persistent git ”
- Accept
- Select “ Yes ”
- Accept
Once we have configured Raspberry Pi, we would have to make it the gateway for this we will need this Script :
- We write « git clone https://github.com/unixabg/RPI-Wireless-Hotspot.git given
- Accept
- Then « sudo ./install represented
- Accept
- We follow the configuration instructions
We already have Raspberry Pi configured as a. of access, what we need now is to install Tor.
We will do these steps :
- We write « sudo apt-get install tor «
- Game « sudo nano / etc / tor / torrc «
- And we select « Ctrl + X «
We would lastly tell the router what traffic we are going to send to the Internet through Tor software
Update Tor Browser
It is necessary to have the browser permanently updated, as this will prevent our real IP from being detected through leaks that can often be caused by vulnerabilities in other computers.
Windows
We recommend not using Tor with Windows operating systems, the weaknesses that the operating system presents in the library that is based on the templates to make C ++ (TBB) present the highest points that can be hacked.
Remove JavaScript, Java and Flash
It is advisable to disable these programs, since they do not maintain a certain level of privacy that we are requiring. If any web page uses any of these programs, we recommend not opening your URL.
Use Linux
To increase the efficiency of Tor it is advisable to work through the Linux operating system, program it in a way that is compatible with the latest versions of Tor.
In addition, we will have to consider adding Privoxy that will work very well as a proxy and choose Tails or Whonix .
Delete cookies
It is advisable to delete all cookies permanently, as there could be a gateway to the vulnerability of our computer through TBB or Tails (with which we recommend working). These types of cookies are included not only for self-destructive but also for session.
Mobile phone
We recommend to maintain absolute privacy, not having our mobile phone in the same place that we are accessing through Tor, this simply means that, if we do not want to be identified, many times we can identify through our phone that have applications for that purpose.
Storage units
In order for Tor to be able to fulfill his work efficiently and thus be able to have our privacy highly guarded, we will also need the storage units to be encrypted by configuring them through Linux.
How can I download Tor?
We have already explained the different features of the Tor browser, now you just need to download it. Through the following links, you can get it for Windows or MacOS, it depends on your operating system: