Here comes the work for this weekend.
Lets learn how we can be total anonymous over Internet and protect our identity.
PS: This post is just for education purpose and by reading this post you agree that you won’t be using TOR for illegal activities.
|| TOR – The Onion Router ||
GEEKS, whenever you visit Internet. You disclose your identity that includes your location, IP etc.
Using TOR you can protect your identity and browse the Internet with total anonymity.
How TOR works?
The Onion Router (TOR) network is intended to help protect the privacy of Internet users and promote greater freedom of expression online. Tor is a system of volunteer servers that acts as a buffer between Internet users and the resources they connect to. If you connect as a Tor client, your online access is channeled through this buffer before it reaches the general Internet.
Think of TOR as a network of proxy servers between you and the Internet. Which can be used to increase bandwidth and also to encrypt your communication sessions.
When you connect to the TOR network, your data packets are relayed multiple times through multiple TOR hosts before being passed off to the ultimate destination, such as the website you want to view.
Simply put, you initially connect to the first TOR node, and then that node connects to the second TOR node, and then the second node connects to the exit node. Because the internal TOR connections are encrypted, each node knows only about the nodes before and after it in the circuit, and no single node can infer both endpoints of an active circuit.
The transmission is encrypted to protect the data in transit. Main advantage of using TOR is that the origin of your traffic is disguised as it gets mixed in with the traffic of other TOR users, and random nodes within TOR forward it along.
How to use TOR?
The only step to utilizing the TOR network is to install the client software that can allow your PC to communicate with TOR servers.
You can use this link to download the TOR client bundle.
For installation instructions, please visit this link.
To be honest, the steps are really simple. You just need to download the TBB, extract it and use it.
You can see after configuring my machine as TOR client, my identity is totally changed.
And the identity of the machine is changed which can be confirmed by using “what is my ip”.