TOR Anonymity: Things Not To Do While Using TOR

TOR Anonymity: Things Not To Do While Using TOR

Privacy Matters 🛡️

Is Tor safe? Is it really anonymous?

It depends. Tor browser is designed to minimize the chances of spying and eavesdropping. But nothing is fool-proof nowadays. The Tor network also has its weaknesses, mostly present at its endpoints where the traffic leaves the network.

Being optimistic, Tor the best option we currently have. But it’s advised that you shouldn’t mess with Tor’s default settings unless you know what you’re doing. That’s because enabling Javascript and other plugins could contribute to leaking your IP address.

Moreover, you just can’t turn a blind eye to the fact that a little of your mistake will contribute to divulging your identity on the internet, no matter how secure do you consider yourself. TOR doesn’t magically read your mind and prevent any of the foolish activities that you may perform. So, there are a few things you need to keep in mind, and it will help you to be anonymous online.

Things you shouldn’t do while using Tor

1. Don’t use your SMS based 2-Step verification (2FA) on Tor

Most websites provide a 2-Step verification using a mobile number in which an OTP (One Time Password) is sent to your mobile number, allowing you to safely login to your account. You need to be careful when you are using TOR browser for accessing your account.

If you provide your mobile number to a website, it will only hamper your anonymity status online as it will be easier to track you down using your number. Note that even if you are using a SIM card registered in some other person’s name, your telecom operator can easily track you down as they also keep your device’s IMEI number in their database and can be used to track you.

2. Don’t operate user accounts outside TOR

If you use TOR browser for checking your Facebook, Twitter or email accounts, don’t ever use those accounts outside the TOR browser as it will expose your online identity to the website. Almost every site on the web now logs information like your login and logout time, your location, your IP address, and other details. Using your account on the open internet even once will be enough to get your IP address logged and eventually reveal your identity.

3. Don’t post your personal information

You must embed this point in your heart, do not post any personal information like name, address, birthday, credit card number while using TOR. It will uncover your identity, and there will no point using the TOR, hope you can understand.

To keep yourself completely hidden, you need to be pseudonymous. Now, what’s that? It means you need to present yourself as a person with disparate behavior while using TOR.

For that purpose, create a new user account with a new email address that doesn’t reflect even a bit of your real identity. You can use that email for your social accounts and enjoy your anonymity and praise the power of TOR.

Also, don’t confuse between anonymity and pseudonymity.

An anonymous connection is the one in which the server to which you want to connect has no idea about your real IP address/location and your identity.

A pseudonymous connection is the one in which the server which is being requested has no idea about your actual IP address/location, but does have an identity it can associate with the connection.

4. Don’t send unencrypted data over TOR

While you were reading the article about TOR, you came across the fact that TOR encrypts your connection, not your data, and TOR’s exit nodes are vulnerable. So, it is highly advisable not to send unencrypted data over the TOR network, as someone might access your information while the data is on the last node.

5. Don’t forget to delete cookies and local website data

When you access a website, it sends a small file to your computer which keeps the record of your browsing habits and other data so that the website can recognize you on your next visit, the file is called a cookie. Some website may also store data locally on your hard drive.

You should delete those cookie files and local website data after every browsing session you perform on TOR. These things may allow the website to gather information about you and track your location and IP address.

6. Don’t use HTTP website on TOR

You very well know that TOR can be exploited using the vulnerabilities that exist at its exit nodes. So, if you access HTTP sites using TOR, there are chances someone might access your information while it is on the endpoints. The data transferred to and from an HTTP site is unencrypted and can be viewed at the endpoints as TOR only encrypts the connection inside its network.

You can prevent such situations by the use of HTTPS websites. They use end-to-end encryption protocols like SSL (Secure Socket Layer) and TLS (Transport Layer Security). So, all your data remains safe even if it is outside the TOR network.

7. Don’t use TOR for Google Search

If you want to be anonymous while using TOR, don’t use Google to search your queries. Though it sounds weird, this is because Google collects information like your search requests, stores cookie files on your computer and tracks your browsing habits to power its advertisement services.

You don’t want to reveal that, do you? So, you can use other search engines like DuckDuckGo, Qwant, Searx, MetaGer, Mojeek etc as they don’t log your IP address or any other activity. In fact, there are full chances that on google you are welcomed with "solve a captcha" message. That’s because people reaching Google through Tor becomes seem suspicious.

Final Words

For the purpose of being anonymous on the internet, TOR is a great option, even if the federal agencies criticize it for acting as a shed for unlawful activities. Let me assure you; it wasn’t created for that purpose. You only need to take some precautions, so you don’t bust yourself on the network.

Being anonymous is the need sometimes. Maybe because you just want to be a Pseudonymous for a while, or you are an activist who wants to spread some information, or you’re being followed on the internet. TOR is there for you, you only have to learn how to use it efficiently, and you’ll start loving the digital world.

Source: FossBytes

Report Page