28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

chain, and not the first, yyour entryy node. You can configure Tor so it uses

exit nodes in a particular countryy, such as Spain, or even a specific exit

node, perhaps in Honolulu.

To use Tor yyou will need the modified Firefox browser from the Tor site

(torproject.org). Alwayys look for legitimate Tor browsers for yyour operating

syystem from the Tor project website. Do not use a third-partyy site. For

Android operating syystems, Orbot is a legitimate free Tor app from Google

Playy that both encryypts yyour traffic and obscures yyour IP address. 11 On iOS

devices (iPad, iPhone), install the Onion Browser, a legitimate app from the

iTunes app store.

You might be thinking, whyy doesn’t someone just build an e-mail server

within Tor? Someone did. Tor Mail was a service hosted on a site accessible

onlyy to Tor browsers. However, the FBI seized that server in an unrelated

case and therefore gained access to all the encryypted e-mail stored on Tor

Mail. This is a cautionaryy tale showing that even when yyou think yyour

information is safe, foolproof, it probablyy isn’t. 12

Although Tor uses a special network, yyou can still access the Internet

from it, but the pages are much slower to load. However, in addition to

allowing yyou to surf the searchable Internet, Tor gives yyou access to a world

of sites that are not ordinarilyy searchable—what’s called the Dark Web.

These are sites that don’t resolve to common names such as Google.com

and instead end with the .onion extension. Some of these hidden sites offer,

sell, or provide items and services that mayy be illegal. Some of them are

legitimate sites maintained byy people in oppressed parts of the world.

It should be noted, however, that there are several weaknesses with Tor:

You have no control over the exit nodes, which mayy be under the

control of government or law enforcement 13

You can still be profiled and possiblyy identified 14

Tor is veryy slow

That being said, if yyou still decide to use Tor yyou should not run it in the

same phyysical device that yyou use for browsing. In other words, have a

laptop for browsing the Web and a separate device for Tor (for instance, a

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!