Browsing anonymously and leave no trace

On 30/06/2011, in Security, by Norman Dean


The Tor Browser is a portable version of Firefox that is attached to a portable version of the Tor network traffic routing program. It allows a person with a USB key to walk up to any Windows based computer, plug their device into any available USB port and start the Tor browser without installing anything browse the internet anonymously then walk away afterwards without a trace that He/She was ever there!

“Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others.

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor’s hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.”

“According to CNet, Tor’s anonymity function is “endorsed by the Electronic Frontier Foundation and other civil liberties groups as a method for whistleblowers and human rights workers to communicate with journalists”.[32] Anonymizing systems such as Tor are at times used for matters that are, or may be, illegal in some countries. These include access to censored information, organize political activities[33], and circumvention of laws against the criticism of heads of state, while at the same time, also allows anonymous defamation, unauthorized leaks of sensitive information, distributing copyrighted works, or illegal sexual content”

Download Tor Browser


Comments are closed.