What is the Tor Project and Will it Keep You Secure On the Internet

Tor Offers Secrecy and Anonymity Or Maybe Not!

The Tor Project is a package you can download from the Tor Website that offers you a secure encrypted anonymous way of carrying on your Internet business.

As stated from their website:

"Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security."

"Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location."

The Problem With Tor is that it May Work Too Well

Tor, for the average Internet user, means that Microsoft, Face Book, and others that live off the information they mine from users to make their livings won't be looking over the user's shoulders trying to get little bits of personal information to sell to the highest bidder every time the user chats or searches the web.

But Tor is not used very much by your average Internet user. It is mostly used by people that have very real reasons for wanting anonymity. Tor is mostly used by deep cover spies, terrorists, drug dealers, human traffickers, pedophiles, revolutionaries, and cyber criminals just to mention a few. And every country on the planet, has its Intelligence people working on cracking Tor and bringing to light, Who's who, what , and where when it comes to Tor. That's just military 101.

Now if Tor is as good as people think it is, which I doubt, then the average user is in trouble. Why? Because Tor has two weak points, where the user connects to Tor and his destination site. Although what you send over Tor is encrypted and said safe from prying eyes the users computer is most probably not, and probably setup to be easily hackable. Along with that, the user's ISP is probably setup to inform “who ever” that the user has connected to Tor.

Lets put it this way, computers have been hacked. By who? By everyone, and some of the players are really nasty people. Believe me when I say, the NSA is the least of your worries unless you are hiding something of interest.

Also Google Search has a sissy fit when people on Tor try to use them. Google has been known to block people on Tor. Now I know this may compel some to use Tor just to piss Google off.

The way around this is to use sites that employ HTTPS to encrypt their Internet connection, and for chat useCryptocat.

This will keep the big four, MYGF, from saving every word of your chats forever, to some day be used against you.

Computers and the Internet have become very dangerous necessities of modern life, people have lost their lives due to the lack of respect for the very real dangers computers and the Internet pose.

Why is Tor a Threat and HTTPS Not Considered a Threat?

Tor attempts to hide Who you are, where you are, and where you are going, it also encrypts any conversation and transactions you do on-line.

HTTPS and Cryptocat encrypt your data but it doesn't hide who you are, where you are, or where you're going.

Networks such as Tor are considered a military threat. And because Tor is a global network it is a threat to every nation on earth. It is the responsibility of every nation's leaders to know the who, what, and where of threats such as Tor's users.

If Tor can't be broken then the next target will be the user's computers. Most people use Microsoft Windows, the most hackable Operating System known to man. The next is the Mac, then Linux. There is no real data on these systems because everyone is so confident that these systems are not hackable so no one is watching. But I'm sure a Nation State will have no problem hacking into your Mac or Linux box. And there are a lot of Nation States out there.

With all these Nation States loading malicious monitoring software onto your computer you might have to get a bigger hard drive to handle all the malicious software.

Tor Has Been Taken Down

As we have seen in the Headlines, many of Tor's notorious criminals have been brought to justice. How was this done? How was a system designed by the US Military(Hold on, I have to stop laughing.) hacked by the US authorities?

Well first let me say, you don't tug on Super Man's cape, you don't spit in the wind, and you don't mess with anything that starts with the letters US. They will get you.

This is how they might have done it. Tor bounces your encrypted connection between many other computers, called relays, before it connects to where you want to be. Thereby hiding who, what, and where you are and where you're going.

Now if you added up all the cost of all the Tor relays in the world it wouldn't begin to scratch the cost of just one of the NSA's, God knows how many, super computers. What would stop them from creating so many Tor relays that the odds are that at least one of them are mathematical used in one of your connections. Bust em Dano.

Oh, and by the way, the HTTPS used by many on the Internet is easily crackable. I won't mention any names Google.

Tor is a toy compared to the tactics used by some very sophisticated Bad Guys. As an example, your encryption keys used for your HTTPS encryption is sent to you in a manner that is, allegedly, indistinguishable from background noise. In this same manner, full conversations could be carried out, thereby posing a very serous threat to us all.

Protect Yourself, Secure Your Computer

Keep your computer updated!

Set your network connection to public network!

Set your firewall to block all connection even those on the list! Because Windows has a huge hidden list.

Set your computer not to allow remote users!

And never store any personal information on your computer, nothing!!!

There are attempts 24/7 on every Internet connected item out there by creatures from the deep, don't keep anything you value on these stupid machines, you will get bit sooner or later.

Links to Related Sites