Tor: The Anonymous Internet, And If It's Right For You

Tor: The Anonymous Internet, and If It's Right for You

Since the revelations about NSA spying came to the surface earlier this year, everybody's paying a little bit more attention to their privacy online. That's good news for Tor, a suite of software and network of computers that enables you to use the internet anonymously. And for anyone who uses it.

Tor includes anonymity software as well as a special browser, but it's the network that stands to benefit most from this spike in interest. In the past few weeks, there's been a 100 per cent rise in the number of Tor clients. Although it's unclear why sudden increase — NSA concerns have to be part of it, but doesn't explain the full bounce — that's an all-time record.

There is a fear, however, that Tor's popularity is attracting more and more attention from spy agencies who are working hard to figure out how to track users. It's not just Tor, either. The use of encrypted email services and other proxy services also attract the attention of the NSA and friends, according to a secret document published last month by The Guardian. This revelation came just a couple of weeks before a scare that the NSA had actually been tracking users on Tor, though that assumption might've actually been a mistake made by a team of cybersecurity researchers investigating an exploit.

So is Tor really the solution to anonymous browsing or just another way to draw attention to yourself? It's complicated. In many ways, Tor is the quickest and easiest ways to browse the web anonymously. It's also not without its drawbacks. To truly gain a better understanding of Tor, and its advantages and disadvantages, it helps to understand exactly how the system works.

What Is Tor?

Tor is short for "The Onion Router". This refers both to the software that you install on your computer to run Tor and the network of computers that manages Tor connections. Put simply, Tor enables you to route web traffic through several other computers in the Tor network so that the party on the other end of the connection can't trace the traffic back to you. That way, the more Tor users there are, the more protected your info. As the name implies, it creates a number of layers that conceal your identity from the rest of the world.

Tor: The Anonymous Internet, and If It's Right for You

The computers that handle the intermediary traffic are known as Tor Relays, and there are three different kinds of them: middle relays, end relays and bridges. Naturally, end relays are the final relays in the chain of connections, while middle handle traffic along the way. Anybody can sign up to be a middle router from the comfort of their own home without fear of being implicated in any illicit activity that might be bouncing off their connection. Those who host exit relays bear a bit more of a burden as they're the ones who are targeted by police and copyright holders if any of that illicit activity is detected. Bridges are simply Tor relays that aren't listed publicly, perhaps to shield them from IP blockers. It should be made clear that you don't have to run a relay to use Tor, but it's a nice thing to do.

Your average Tor user, however, is probably safe. The software is used by everyone from journalists to political dissidents to safeguard their privacy and security, and it really is tough to track someone using Tor. It's even used by a branch of the Navy for intelligence operations. (In fact, it was originally built as part of a Navy project whose purpose was developing ways to protect US government communications.) As we now know, Tor is also certainly something that the NSA is paying attention to. But if it's good enough for the military, it should be good enough for you.

Limitations to Using Tor

The most noticeable drawbacks to using Tor are performance-related. Since internet traffic is being routed through at least three relays, it tends to get held up along the way. This is especially noticeable for heavier elements like audio and video tracks, and based on the number of users signing up to act as relays, it gets worse with more users on the network. Tor is well aware of its speed issues though, and maintains a pretty comprehensive troubleshooting guide.

Where using Tor really gets tricky is when intelligence agencies step in. Obviously, the government's cybersecurity hawks are aware of Tor and its capabilities. As I mentioned a little earlier, they also see its use as cause for concern. As the leaked document signed by Attorney General Eric Holder details, the NSA identifies people using anonymity software like Tor as foreign nationals by default. These users "will not be treated as a United States person, unless such person can be positively identified as such, or the nature or circumstances of the person's communications give rise to a reasonable belief that such person is a United States person." If it's eventually confirmed that the person of interest is in fact an American citizen, though, the records are destroyed.

There are other risks to be considered when using Tor. Those hosting exit relays, for instance, attract attention from law enforcement agencies and may receive copyright takedown notices (among other things). It is also possible that you might have your computer seized by law enforcement if you're running an exit relay, though nobody has never been sued or prosecuted for doing so. Finally, as with any anonymous service, there's always the chance that very smart hackers can connect the dots and figure out who you are. It would be very difficult, but not impossible.

Alternatives to Tor

While Tor has its downsides, it's probably the easiest and best way to use the internet anonymously. Like I said before, though, the growing popularity of the software could signal some changes with how authorities treat it. So it's always nice to have alternatives.

The most popular method for becoming anonymous is the Virtual Private Network (VPN), typically those that are encrypted. As the name implies, a VPN is a private network that's spread across the public internet enabling that can also be used to encrypt data or increase security of individual accounts. Depending on what VPN you use, you'll have access to different levels of security. The good news is that VPNs work well. The bad news is that they cost money. While there are hundreds of choices out there, Hide My Arse, Private Internet Access and IPredator are two established and trusted options. You can learn more about VPNs at Lifehacker.

Similar to accessing the internet through a VPN is using a proxy to connect. An anonymous proxy server is a lot like a Tor relay except you have more control over where you want to connect and when. As with a relay, traffic from your computer will pass through a proxy and come out the other side, sometimes without collecting any data about the origin. However, they might also serve you ads or malware if you're not careful. Private Internet Access and Hide My Arse both offer proxy services, while Privacy Protector offers a services geared towards protecting privacy (duh). LifeHacker also has some more information on proxy servers.

To Tor or Not to Tor

So what's the verdict? Before you decide, think hard about what you're doing online and why you want to remain anonymous. If you're just trying to cover your tracks after looking at porn or something, a private browsing mode like Chrome's Incognito feature will probably suffice. But if you're someone who's trying to evade the authorities for piracy or whatever reason — we're not here to judge — or are generally spooked by the NSA and friends, a more heavy duty solution is in order.

So if you do really want to be almost completely anonymous, use Tor. Any alternative is going to present more drawbacks, whether it's a paid subscription or unwanted ads, and it's hard to argue with Tor's convenience. Plus, there's a good reason why Tor's become so popular: It usually works great. While that record might be challenged soon and it's not 100 per cent flawless, Tor is good enough for you if it's good enough for the million plus people in the network. And it's always getting better.


Comments

    If you're important enough, and if some government spook wants to track you down online, he can and will. Nothing you can do about it....except maybe carrier pigeons.

    Last edited 31/08/13 3:15 pm

      You can at the very least make it harder. Hopefully hard enough that the difficulty is beyond your worth as a target for government agencies.

        If the US wants you dead badly enough, they will find you. Even if you are in a supposedly friendly country, never use the internet yourself, stay hidden in a house, they can infer your presence by the absence of normal signal.

          Such a signal would be exactly the same as if I hid in a shack in the middle of a sheep station.

          Furthermore, it is not just about the government knowing where you are, it is them knowing what you are doing. If I am doing [insert highly illegal thing here] over the internet, but I'm using Tor to do it, the only thing the government will know is that I'm using Tor. And using Tor is not illegal, so they have to either assume the worst of every Tor user, or assume innocence until there is at least evidence of guilt.

          Last edited 02/09/13 12:47 am

      You provide no evidence for your sweeping claims!

      Provide evidence or leave this discussion.

    Pedophile's love TOR, and for that one reason, it should be shut down. We need to weed out any and all avenues of child pornography. Every site and every file should be inspected and any people involved in this disgusting act should be incarcerated for life. There are even web cam sites that pedo's use to order sick vile treatment of young children for their viewing pleasure. An ex politician of Australia was recently busted for using such site. It's time we all give up or freedom to wipe this shit out

      Sounds good but technically meaningless... Suck people were unfortunately around long before the internet.. That's like saying people might mail thumb drives to each other, so ban the mail and ban thumb drives

      Do you have any proof ?

      it would make more sense for them to use a peer to peer network as it has been studied and proven that you can pick up and record ip addresses by monitoring the nodes that the tor network connects to.

      A professor in America did this and recorded over 50 thousand unique ip addresses from memory.

      Just because someone values their privacy doesn't mean they have something to hide.

      right, coz that will stop pedos. maybe we should ban the use of the internet since that's what the pedos use. or maybe we should destroy all web cams and cameras. or we should stop having children all together so there will be no children for the pedos to film.

      I have absolutely no problem with you giving up your freedom, but you are not going to mess with mine - is that understood?

      "Pedophile's love TOR, and for that one reason, it should be shut down."

      Pedophile's love INTERNET, and for that one reason, it should be shut down.

      Pedophile's love CHILDREN, and for that one reason, pregnancy should be shut down.

        Your an idiot if you don't understand what I mean. Get rid of the anonymity and have every internet site and postings regularly checked. Maybe you don't give a damn if children get raped, but maybe you eventually do have children and suddenly realized the value of what I am saying

          i like where you're coming from and would love to be able to get rid of paedophilia, but the reality is that your proposal is impossible. there's no way to check each one of the (more than) 633 million* websites, let alone every post on every forum. shutting down TOR wouldn't fix the problem, at best it might make it slightly harder to access the porn - but this crap can be shared through other means online than uploading/downloading from a website.

          *http://news.netcraft.com/archives/2012/12/04/december-2012-web-server-survey.html

          "Get rid of the anonymity and have every internet site and postings regularly checked"

          Ha, I'd love to see this Bureau , maybe we could even have our own special login to a government authorised search engine , Your search for " Big booty babes" has been denied,
          you have had 5 points removed fromy our Net License and a 250 dollar fine.

            That internet license is a terrible but quite possible vision of the future. :(

    The best alternative is cackle-it.net which is launching in September 2013 with state of the art end-to-end encryption rendering safe, secure, private and confidential chatting, emailing, voice calls and browsing. Note that the servers are located in the Netherlands thereby rendering the NSA spying impossible.

      umm sounds like VPN cloud storage, who will provide their own private client software. I'd rather stick with alternate services that use well tested software.

      Also, why would it be impossible for the NSA to spy on a server located in the Netherlands?

    Worth noting that using TOR for torrenting etc is generally a) regarded as poor form by the TOR community and b) too damn slow to be useful anyway! But agree strongly with the above comments - while TOR ostensibly allows people who value their privacy to keep some control over, I strongly suspect the reality is that the ones hiding their activity are hiding it because it's 'very' illegal... (as opposed to torrenting which is only a little bit illegal?!). On the whole, it pains me say that I'm in the "shut it down" camp...

      As I said above just because someone wishes to remain anonymous doesn't mean that they have something to hide or are doing something illegal.

      People have the right to privacy without being judged guilty of anything.

    hmmmmmmm

    http://www.theregister.co.uk/2013/09/01/tor_correlation_follows_the_breadcrumbs_back_to_the_users/

    Why is a 2013 article being reposted?

      Data retention laws kick in today

        Yep cheers, realized that after I kept reading down the new articles list.

          Switch that VPN on hahaha!

            The only point of having a VPN at this point (for me atleast) is to hide torrenting activity. Since I have no interest in hiding it, I don't see the point in getting one right now.

            Last edited 14/10/15 11:46 am

Join the discussion!

Trending Stories Right Now