

Tor Browser is completely free and is officially usable on both computer that of smartphones and tablets, on the following operating systems: Windows, MacOS, Linux e Android. It also blocks technologies such as Adobe Flash and JavaScript, which in some cases can pose a risk to the user's privacy This, however, does not interest us at the moment!Īlso keep in mind that the easiest way to access the Tor network is to use Tor Browser, a modified version of the browser Mozilla Firefox which includes instructions to connect to the Tor network and all the tools necessary to maintain anonymity on the Net. (the "deep" Web hidden from search engines) in which many activities are carried out, even those of dubious legality. Note, then, that Tor is also used to access the Dark Web, a portion of the Deep web. This means that it should not be regarded as an invulnerable or flawless system.

In this regard, however, it should be noted that, however reliable, the Tor network in the past has been subject of vulnerability which exposed users' public IP addresses to remote servers. To give a very simple example, using Tor is a bit like transferring an object from one point to another in a room by passing it through the hands of people who cannot see each other: the object will reach its destination, a little 'slowly maybe, but no one, in the end, will be able to know how and through whom it got there. When it comes to the end point of the communication, the data leaves no traces behind and therefore allows anonymous browsing to the user. a series of computers, scattered around the world, each of which removes a layer of encryption revealing the next layer and instructions on how to route it all. The data passes through a series of nodes, i.e. Before getting to the heart of the tutorial, let's explain in detail how to use Tor, it seems only right to provide you with some preliminary information regarding the system in question.Īs I told you at the beginning of the tutorial, the mechanism on which the functioning of Tor is based is called onion routing and provides for data encapsulation in various encryption levels.
