Tor has become the emblem of browsers that can more efficiently keep our data hidden while we surf the Internet.
There is a lot of information (some true, others not so much) about this browser, which is closely related to the Deep web. If we need to keep hidden, we will have to meet certain requirements since the browser alone cannot do its job with 100% deficiency.
Tor Browser only works with session cookies, and permanent cookies type “As far as I know” (AFAIK) they are considered session.
In principle our security would not be so in danger according to this system, but since there are other factors that also determine the level of privacy, not only, it is recommended delete cookies and verify that self-destructing cookies do not really exist at the time of closing a session.
If we want to delete session cookies before start again in Tor, we will have to modify the configuration.
To do this, we are going to go to the onion drawing and select “New identity“, this way we can access again as if it were the first time we entered.
- We start the software.
- We select in the address bar the icon “S“, which corresponds to Noscript
- We click on “Option“
- We seek “general“
- Click on “Script“
- We choose “Predetermined“
We will do this procedure:
- We click on “Menu“
- We select “Add-ens“
- We choose the first option
- We click on “Add to Firefox“
- We select “Add“
In order to do this step we are going to carry out the following procedure:
- In the address bar we write “about: config“
- We select “I accept the risk! “
- We write on the bar “enabled“
- And we activate through “False“
List of the best 15 tricks and tips to get the most out of Tor Browser
The following are the best tricks you can find about the browser, with them you will become an expert in hidden navigation:
Anonymity to browse
The main meaning, rather, the essential characteristic that it has the Tor browser it is precisely not expose our data to members of the Internet network through autonomy and security protocols.
For it, We will need to work with different data other than what we frequently use on other Internet sites. We can use temporary emails and any aliases that we do not use on other sites. Nor can we use the alias we have in Tor in other browsers that are not secure.
It is advisable do not use real coins when you want to do operations but this kind of virtual currencies to maintain our anonymity.
Banks or financial entities
Something that is too logical, but necessary to recommend, is that if we want to continue browsing without our data being known, we cannot interact with banks or any official body that have the same characteristics, since they will ask us to identify ourselves and it will lose meaning. to navigate in Tor.
It is said that this browser it is as secure as any VPN, but being a browser it also works with Script, that is, it makes it a reliable tool in terms of its security, but with some limitations if we do not pay attention to some details.
The problem arises when our operating system is not up to date, making it vulnerable to the entry of intruders. When we navigate in a vulnerable operating system, Tor cannot fulfill the function we ask for, which is to maintain our 100% privacy.
Although when we access the browser, our IP change for one that is surely thousands of kilometers from our location, thus obtaining great peace of mind in not identifying our team, we must not abuse ourselves in this situation.
It has been verified that when browsing from the same computer, to the same web pages, or close to the same location with the same device, they have been able to determine the real origin of the computer and the identity of the user.
Justly the point of navigating through Tor is not identifying ourselvesIf we need to enter one of our social networks, Tor cannot do its job because we will have to register.
Use of browsers
Both the Deep web and the traditional Internet provide us with different browsers that keep our real identification hidden. If we use a different kind of browser, whatever, for example, Chrome or Internet Explorer (and we have to redirect to another site), it will not make sense to browse Tor, because these browsers, through their cookies, can easily identify us.
Incorporate Raspberry Pi with Tor Browser
We can install a router, that is, in the Internet access door a “Raspberry Pi“, so that once we have downloaded Tor we can pass all data packets through Raspberry Pi and thus stay hidden.
To configure Raspberry Pi:
- We open the Raspberry Pi command line
- We wrote
sudo apt-get update
- To accept
- Then we write
sudo apt-get install iptables-persistent git
- To accept
- We select “And it is“
- To accept
Once we have Raspberry Pi configured, we would have to make it the gateway for this we will need this Script:
- We wrote
git clone https://github.com/unixabg/RPI-Wireless-Hotspot.git
- To accept
- To accept
- We follow the configuration instructions
We already have Raspberry Pi configured as a. access, what we need now is to install Tor.
We will do these steps:
- We wrote
sudo apt-get install tor
sudo nano /etc/tor/torrc
- And we select
Ctrl + X
Finally, we would have to tell the router what traffic we are going to send to the Internet through the Tor software
Update Tor Browser
It is necessary to keep the browser permanently updated, since this will prevent our real IP from being detected through leaks that can often be caused by vulnerabilities in other computers.
We recommend not using Tor with Windows operating systems, the weaknesses that the operating system presents in the library that is based on the templates to do C ++ (TBB) The biggest points are those that can be hacked.
It is advisable to disable these programs, since they do not maintain a certain level of privacy that we are requiring. If any web page uses one of these programs, we recommend not opening its URL.
To increase the efficiency of Tor, it is advisable to work through the Linux operating system, programming it in such a way that it is compatible with the latest versions of Tor. In addition, we will have to take into account adding Privoxy which will work very well as a proxy and choose Tails or Whonix.
It is advisable to permanently delete all cookies, since there could be a gateway to the vulnerability of our computer through TBB or Tails (with which we recommend working). These types of cookies include not only self-destructive cookies but also session cookies.
We recommend to maintain absolute privacy, not having our mobile phone in the same place where we are accessing through Tor, this simply means that, If we want not to be identified, many times they can identify us through our phone that they have applications for this purpose.
So Tor can do its job efficiently and thus be able to have our privacy highly guarded, we will also need the storage units to be encrypted by configuring them through Linux.
How can I download Tor?
We have already explained the different characteristics of the tor browser, now you just need to download it. Through the following links, You can get it for Windows or MacOS, it depends on your operating system:
If you have any questions, leave them in the comments, we will answer you as soon as possible, and it will also be of great help to more members of the community. Thank you! 😉