370
158 shares, 370 points

Nowadays, when we are talking about our virtual privacy, we have started to talk about services such as Tor Browser that make the user almost invisible. If you are one of those who care about your privacy in the digital world, you may be more comfortable connecting to the internet with Tor Browser, even if not completely.

When much more hidden points of the internet world, called Deep Web, are mentioned, the Tor Browser internet browser is also mentioned with it. In fact, Tor Browser is not a web browser specifically designed for any illegal business. It has such a reputation only because it offers extremely high privacy and is often used by malicious people for privacy purposes.

So what does this Tor Browser do, if you’re lucky, you can go online like a ghost from even North Korea? In fact, the logic of the powerful privacy features offered by this internet browser is quite simple; hiding the source. There are privacy features that all internet browsers can do if they want to, but for now you can only access Tor Browser without using any additional applications.

Tor Browser

In short, what is Tor Browser?

Tor Browser is an internet browser that stands for The Onion Routing and claims to offer complete privacy to its users. It is known that the browser used by users in countries with strict prohibitions to connect to the Internet is also used for many illegal online businesses.

Privacy features you won’t find outside of Tor Browser:
  • Even if it is slow from time to time, almost all websites are opened,
  • No past record is ever kept,
  • Cookies are not cached.
  • Since you connect to each site with a different route, it becomes difficult to get hacked,
  • No website will recognize you.
Almost all websites open, even if it is slow at times:

sunucu

Whenever you want to connect to any website through any internet browser, your DNS server sends a request to the server of the website you want to connect to via your IP address. When this request is accepted, the information “The user registered to the IP address … has connected to the … website through the DNS server” information is clearly recorded and the website is opened.

Whenever you want to connect to any website through Tor Browser, this request is sent by at least 5 of the more than 4,000 servers working voluntarily with Tor Browser. These servers may be located in different parts of the world. The request is transferred between servers before it reaches its destination. Thus, the source is completely hidden, but the speed of the website loading will slow down due to such long traffic. For this reason, Tor Browser users are recommended at least 20 Mbps internet speed.

Your history is not recorded:

internet geçmişi

All internet browsers save browsing history. You can stop or limit this recording for a period of time, but you still cannot avoid the past browsing recording altogether. Tor Browser certainly does not keep such a record. You can think of it as constantly connecting to the internet via an enhanced Incognito Tab. This is a simple but effective method in terms of privacy.

Your cookies are not cached:

internet çerezi

Internet browsers save cookies as well as past browsing log. Cookies are data saved for the next time you browse websites easier and faster to open. This data can sometimes include your password, username, or even payment information.

On the Settings page of a normal internet browser, you can choose the cookie data to be cached or stop it temporarily. However, the browser will still display this data for a short time. Tor Browser ignores this data completely. The fact that cookies are not saved is also a reason that slows down the opening of websites.

Since you connect to each site with a different route, it becomes difficult to get hacked:

Tor Browser

You can change the IP address and DNS servers. However, the route is determined by a hacker who has a little understanding of these things and the source can be found. Tor Browser is already routing a connection through at least 5 different servers. As if this was not enough, it determines a different route with different servers for each target. In other words, the connection route you use for website X and website Y is never the same during any connection.

No website will recognize you:

Tor Browser

You can think of the internet as a single pool divided into different sections. Although there are separate sections, there is only one pool, so a drop of blood at one point of the pool can attract the shark from the farthest point of the pool. Tor Browser is exactly what makes that drop of blood disappear without attracting anyone.

In other words, you will not see information about a purchase you make with Tor Browser in the ad that appears later on another website. Because Tor Browser does not save any data, you become a new user for every website you connect to. Thus, the possibility of internet sites to recognize you and introduce you to each other is almost eliminated.

Things to watch out for Tor Browser:

Tor Browser

We can say that it is almost unique for the privacy features offered by Tor Browser. Because in order to achieve such privacy in other internet browsers, you must either make changes on dozens of settings or strengthen your own privacy with different add-ons and applications.

No matter how hard Tor Browser tries to hide your data, the internet world is never a completely safe place. For this reason, do not rely on Tor Browser and do not log in to sites unintentionally or share any personal data in places you do not trust. Because a successful hacker will surely get the data he wants.

So, is Tor Browser itself safe? Tor Browser is an open-source Mozilla Firefox clone. It can even be used with an add-on to be added to Mozilla Firefox. At this point, we need to start questioning. It protects our data from third parties, but does it keep it from itself, or does it separate it into little by little?

The fact that it is open source gives us some relief in this regard. In other words, experts who want to take a look and see what is happening, but still one cannot hesitate to say that we have seen open-source software. As a user, never let go of your guard and neither visit unsafe sites nor share data on unsafe sites.

We have explained the privacy features that you cannot easily find in other internet browsers except Tor Browser and the points you need to pay attention to about the browser. The internet has never been a completely safe place, so the more attention you pay, the better.


Like it? Share with your friends!

370
158 shares, 370 points

What's Your Reaction?

hate hate
368
hate
confused confused
1104
confused
fail fail
736
fail
fun fun
613
fun
geeky geeky
490
geeky
love love
122
love
lol lol
245
lol
omg omg
1105
omg
win win
736
win

0 Comments

Your email address will not be published. Required fields are marked *

Choose A Format
Personality quiz
Series of questions that intends to reveal something about the personality
Trivia quiz
Series of questions with right and wrong answers that intends to check knowledge
Poll
Voting to make decisions or determine opinions
Story
Formatted Text with Embeds and Visuals
List
The Classic Internet Listicles
Countdown
The Classic Internet Countdowns
Open List
Submit your own item and vote up for the best submission
Ranked List
Upvote or downvote to decide the best list item
Meme
Upload your own images to make custom memes
Video
Youtube, Vimeo or Vine Embeds
Audio
Soundcloud or Mixcloud Embeds
Image
Photo or GIF
Gif
GIF format