What is the Tor browser - how to use the onion network and why do it


Tails

Tails is a Debian-based Linux distribution. The abbreviation The Amnesiac Incognito Live System indicates that this is a Live version. This means that you can use the operating system without installation and run it from any media (the image is created using the Rufus utility). By running the system, for example, from a flash drive, you can work without leaving any traces on the computer.

What is Tails used for?

The main objective of this system is to provide the user with the highest possible anonymity, confidentiality and security on the network. This is difficult - almost all Internet traffic is recorded. This is why Tails forces everyone online via Tor. If any program wants to access your computer, it will be blocked so as not to reveal you. The system also has many tools that increase security - for example, special browser plugins that provide encrypted connections.

What does the Tails system consist of?

Programs – here you will find a list of all applications divided into categories; in the “Favorites” category there is a secure anonymous browser – Tor.

  • Places – access to the most important directories in the system.
  • Calendar with clock.
  • Virtual keyboard – This is worth using when logging into important websites.
  • OpenPGP Applet – allows you to manage and encrypt keys.
  • Open Circuit Onion – information about available network nodes.
  • Selecting language and keyboard.
  • Network connections, sound and system shutdown.
  • Taskbar with active programs.
  • Selection of work areas.

If you move your cursor to the far left of the screen, a special Debian launcher will open, making it easier to find programs and making the search engine available. It also provides a preview of the active windows in each workspace.

When you turn off the system, Tails will definitely erase all traces of computer use; for this, the RAM is cleared. This information appears on the screen within a few seconds.

On video: TAILS 3.0 – The most secure OS in the WORLD

What is Tor

The abbreviation Tor stands for The Onion Router. This name may seem ridiculous to people who are not familiar with the concept of onion routing. It refers to the technology of anonymous exchange of information using a standard computer network. The operating principle of the system is based on permanent encryption of data during transmission from server to client. Data passes through many network nodes, thereby erasing traces that could lead to the sender and recipient of the information.

Thanks to Tor, users do not have to worry about their anonymity on the Internet. They get the opportunity to view any information they are interested in, secretly leave messages on sites, send each other encrypted personal messages, and do much more secretly from everyone. Using Tor, you can easily bypass all ISP restrictions imposed on sites.

As you can understand, sites on the hidden Tor network are not moderated or checked by anyone. You cannot send a content complaint to them, and if you do, such actions will lead to nothing. Accordingly, in Tor you can find, among other things, information prohibited in all countries. Shocking, illegal, devoid of humanity and meaning, materials and services are contained on the Tor network. This is why it got the name “dark internet”. Sites created exclusively for access via Tor are located in the .onion domain zone. They are not indexed by regular search engines and can only be accessed through the anonymous Tor network.

You can view information on the Tor network through any computer, but this requires a browser of the same name, which is distributed free of charge.

Parrot Home

Parrot Home takes care of the user's anonymity and privacy and provides access to many diagnostic and testing tools, including for the network environment. The system comes in several versions - more or less complex. The Home version is a lightweight Linux that runs smoothly even on weak computers. In it you will find programs for secure communication with friends and encryption of documents. It is also worth mentioning the Security version, intended for advanced users, which contains the most important tools for testing networks and operating systems.

On video: Installing Parrot Home

How to use the Parrot Home system?

After starting the computer from bootable media with the system (you need to burn it using the Rufus utility), the boot menu will appear. Use the arrow keys to select the first option – Live Mode and press Enter.

When the system desktop appears, you will be asked to select a keyboard layout.

The system has two browsers - Mozilla Firefox, which has built-in special add-ons to increase anonymity and security, and Tor, which provides complete anonymity. The TOR network is not always the best solution, for example, if you want to watch videos on YouTube, then you can freely use a regular browser rather than the TOR network, which is much slower and is used for more anonymous tasks. If you want complete anonymity, click in the upper left corner of your desktop in the applications - Anon Surf and Anonsurf Start.

This will activate a special mode that will prevent any app running in the background from revealing your identity and location. All network traffic is routed over secure channels. At the end of your anonymous session, simply select Anonsurf Stop from the menu.

Earning money on the tor network

We put on scuba gear and dive into the deep internet

In this article I will describe how to connect tor browser.
Organize a search on the onion network and get tons of relatively legal content. Read the whole point of TOP in onion routing here. The technology for anonymous exchange of information at a high level provides protection against traffic analysis. This ensures the confidentiality of transactions and partners making money on the tor network. For an inexperienced user, tor technology can be used as an anonymizer. Network links for some reason are not displayed in a regular browser or to which supervisory sanctions have been applied. They will load perfectly in the Tor browser.

Installing the Tor browser

<<<<Click the link and get to the official torproject website. On the main page of the project, you can proceed to download the Tor browser. Both for PC and Android version called orbot for mobile devices. I haven’t used it on mobile phones, I don’t know how it works, I can’t recommend it (As if an opinion appeared and it is not in favor of this program). Use only at your own discretion. There is nothing complicated in the installation itself; just select the distribution for your operating system. So:

With subsequent selection of language and operating system. In my case, the language is Russian, and the axis is Microsoft Windows:

This is for those who decided to get confused; during installation there will be an option to select a language. So you can safely download any language line.

After downloading, we go through the standard installation procedure.

You are now the owner of the Tor Browser folder on your computer. This is quite enough to stroll through an anonymous network.

Navigation on the torus network

From now on, it would be good to go into the folder and open the Start Tor Browser shortcut. Since below there will be links with addresses of sites in the Tor network, their top-level domain looks something like .onion, such links will not work in a regular browser. You can write the address megaze.ru into the address bar of your browser, find this article and continue navigation.

The main search engines of the Tor network (remove https):

  • Candle
  • not Evil
  • TORCH
  • Tor66
  • DuckDuckGo is not so simple with this, a search engine for offline sites &!?
  • SearX
  • MultiVac
  • OnionLand
  • Metagear
  • Dark Web Links
  • NeonSearch
  • Torgle
  • Amia

The names of search engines seem to hint that they are guides to the dark depths of the Internet. The search technology is no different from, say, Google. You type a word into the search bar and get relevant links. Oddly enough, on the dark Internet, search engines have their own policies. Based on my animal observations, at best, a third of the onion links are indexed. Everything else can be found on websites by searching for example “Deep Web Links” or “tor links”. The blog also has a page that is high time to be raised from the shadows, a selection of links from Buster007 and a page in the onion, winter is coming. The collection contains a good half of the entire darknet. Using links is completely safe; even with default settings, the Tor browser provides maximum protection for your connection. This does not apply to downloaded content; be careful what you open on your computer.

Working on the tor network

A person is also superior to a machine because he knows how to sell himself. (Stanislav Jerzy Lec)

Trade is booming on the Tor network. They sell everything that has any value online:

But there is one problem: the number of scammers and scammers is simply off the charts. This is facilitated primarily by the anonymity of the network with all that it entails. Using the services of a *noname* seller would be a rash step. The Tor community helps you make your choice. At the moment there are many thematic habitats of anonymous. I'll show you some of them:

  • Runion is the largest Russian-speaking community in Tor;

  • Onion Dir is a voluminous directory of torus links. With a simple rating;
  • Godnotaba is a service for monitoring and evaluating the largest projects of the Torus network;
  • Godnotaba is a clearnet analogue of monitoring Tor network projects;

The obvious disadvantages of the network include its slowness and relative anonymity. In the case of anonymity, I can say that nothing is absolute and the torus is no exception. Remember the Criminal Code)

On this wonderful note, I will end the story about the onion net. If you liked the article and want to dive into the dark web again. Write comments, share on social networks. In general, knock and I will hear you.

2 SHARES

ShareTweetPost WhatsappPinterestDiggLinkedinRedditStumbleuponDeliciousBufferTumblrOdnoklassnikiMailruTelegramHackernews

Kali Linux

Kali Linux is a unique system that contains many ready-to-use tools and is intended for experienced users. Using them correctly requires a lot of practice and experience, but even beginners will be able to use some basic tools. By default, the user in the Live version is root and the password is toor.

ABC Kali Linux

By default, you cannot place program shortcuts on the desktop because Kali's graphical overlay is Gnome. On the left side of the screen there is a quick access panel with programs from the “Favorites” category. After right-clicking on an application, you can remove it from this category. Adding to favorites is similar—all you have to do is right-click on the app icon and select “Add to Favorites.” At the bottom of the quick access panel there is a button that allows you to view almost all programs installed on the system.

Some tools are only available after entering the appropriate command in the terminal. The top bar can be thought of as the taskbar in Windows. After clicking on the “Programs” button, a menu will open in which all applications are divided into appropriate categories. After clicking on the “Locations” button, you can quickly access the most important folders on the system and on the disk. Closing the system is done by clicking on the arrow in the upper right corner, and then on the shutdown icon.

On video: How to configure Kali Linux in terms of security and anonymity

What are the disadvantages of the Tor browser?

Complete anonymity on the Internet is quite a significant advantage for many to completely switch to the Tor browser. Despite this, the number of people who use it on a regular basis is small. The Tor browser has a number of disadvantages that outweigh its advantages for many:


  • Long loading pages. Even when it comes to loading regular sites, it takes longer through Tor than through another browser. It takes time for the encrypted data packet to pass through all nodes, hiding the real address of the sender, and then the requested information is received back;

  • A small number of Russian sites on the “dark internet”. If the browser is used only to visit hidden sites, then it is important to note that there are not many Russian-language resources, especially interesting for a large number of people;
  • Abundance of viruses. The variety of viruses on the dark web is much greater than on the regular web. The Tor browser does not have a built-in virus protection system, and it is very easy to stumble upon a malicious program or website that will automatically download a virus to your computer. Before you go exploring the hidden part of the Internet, you should definitely take care of installing a good antivirus.

In some countries, Tor is prohibited by law. This problem has not yet affected Russia, despite the fact that similar discussions have already been held in the government. At the moment, the use of Thor in Russia is permitted.

( 129 votes, average: 4.46 out of 5)

    Related Posts
  • Setting up the D LINK DIR 300 router: detailed instructions
  • Cannot find run.vbs script file

Tor Browser is not a VPN

The tor Internet browser is not a browser with a built-in VPN, as many people think when remembering Opera, and it is not a VPN server. You can use TOP simultaneously with a VPN - this will allow you to even better protect your Internet visit.

Using a VPN at the same time as Tor guarantees 99% that your data will be better encrypted. What's more, a VPN also hides your IP address by displaying the IP address of the VPN server you are using rather than the "real", static IP address. The ideal scheme looks like this - VPN Tor Browser VPN. Although these two systems help us hide our real IP addresses, they operate and are serviced completely differently.

How to access TOR browser

In fact, everything is very simple, the tor browser is downloaded, like any other, from the company’s official website. The main disadvantage is the very low loading speed of sites and the amateurish interface. Slow traffic is due to the fact that the request ends up in the “onion network”, where the process of deciphering and decrypting the code is constantly going on, with the last address constantly being deleted.

Rating
( 2 ratings, average 4 out of 5 )
Did you like the article? Share with friends:
For any suggestions regarding the site: [email protected]
Для любых предложений по сайту: [email protected]