Welcome to Mobilarian Forum - Official Symbianize.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Here Are 11 Do's And Don'ts Of Tor Network!

OP
jughead3716 50

jughead3716

Alpha and Omega
Contributor
Ardent
Access
Joined
Jun 28, 2014
Messages
5,182
Reaction score
11,622
Points
113
grants
₲14,287
11 years of service
Scotty said:
Eto faps oh, http://www.lucidire.com/showthread.php?1455-Here-Are-11-Dos-And-Donts-Of-Tor-Network!

idedelete ko na ito punkz kasi ako na ang moderator ng Techno Zone.. hehe.. salamat sa pag remind... :cute:

iamjohn said:
ok to. takot na takot pa naman ako s paggamit ng tor. dagdag knowledge <3
tnx

youre welcome punkz... :cute:
actually, di na masyado reliable ang tor network pagdating sa anonymity sa ngayon dahil sa mga government agencies na nag aabang dito.. pero marami pang mga alternatives sa tor at magpopost ako ng thread tungkol dito... :D


tokong said:
nice share, keep sharing (Y) :yea:

thanks punkz... sana makatulong ito sayo... :D
 
K 0

kingkong228

Transcendent
Member
Access
Joined
Mar 9, 2025
Messages
36
Reaction score
0
Points
6
grants
₲64
4 months of service
Here Are 11 Do's And Don'ts Of Tor Network!

Alam nyo na naman siguro kung ano ang TOR at gumagamit din kayo nito kung minsan... kaya eto ang share kong tips para magamit ng mabuti ang TOR Network...


These tips and tricks will bring out the best of Tor for you!

dJjy124550PM3132014.jpg


There is nothing better than The Onion Router aka TOR for those genuinly concerned about the privacy of their digital communications. The free software secretly routes your system's Internet traffic over several places on the Internet, thereby hiding the actual source of communication improving your privacy and security on the Internet.

We bring you a list of tips and tricks for using Tor to protect you better when online:

1. Do Use Tor

Tor is widely known for providing online anonymity, having gained quite a lot of reputation at what it does. It can be used for:

-sensitive browsing

-reporting abuse or corruption

-serious business activities

-inter-state or inter-country communications

-publishing anonymous posts

-sharing personal secrets with family and friends

and more.

2. Don't Use Windows

Refrain from browsing websites through Tor on Windows systems if you're looking to improve your Internet privacy. On Windows systems, security bugs and vulnerabilities present in the system may
compromise your privacy rendering Tor quite literally worthless. It's best to run Tor-configured Linux systems such as Tails and Whonix, Further, you can also set up Tor on any of your favorite Linux distro.

3. Do Update Your System

Remember, Tor is only as safe and secure as the system running the Tor client. Therefore, it is highly advisable to regularly update the Tor client, Tor-secured applications (browsers, instant messaging clients, email clients, etc.), and the operating system of your computer.

4. Don’t Use HTTP Websites

Tor is a traffic router and not a tool to encrypt the network traffic throughout the Internet, therefore, its exit nodes can read your Internet traffic when in the form of plain unencrypted data.

It's only obvious you use end-to-end encryption such as SSL or TLS when doing sensitive online communications that requires HTTPS websites. Further, add-ons like 'HTTPS Everywhere' automatically switch to HTTPS-mode browsing for supported websites. It's preferred you use these.

5. Do Encrypt Your Data Storage

Tor cannot secure the digital data on your computer. Complete security can only be achieved through encryption of data using strong cryptographic algorithms. LUKS or TrueCrypt can be used for the same.

6. Don’t Use Tor Browser Bundle

Tor Browser Bundle contains critical vulnerabilities and therefore should not be used for browsing websites anonymously through Tor.

7. Do Disable JavaScript, Flash And Java

Binary applications like JavaScript, Adobe Flash, Java, QuickTime, ActiveX controls, VBScripts etc run with user account's privileges. These might access and share your data leaving Tor rendered useless. Websites can use to track you using JavaScript. Meanwhile, Java and Adobe Flash run in virtual machines. These might ignore your system’s configured proxy settings, and share your data directly with the websites.

8. Don’t Use P2P

Tor network is not built for peer-to-peer file sharing. If you're into downloading torrents, remember you're simply busing Tor. Another downside is, it slows down other user's browsing on the network.

9. Do Delete Cookies And Site’s Local Data

Tor uses network packets to hide your real identity from the websites. However, it can't stop websites from using workarounds such as cookies and local data storage to detect your real identity.

10. Don’t Use Your Real Email

Tor protects online privacy and hides real identity. However if you’re giving out your real email on the websites, how is Tor to secure you? Ideally, you must consider a virtual identity while using Tor.

11. Don’t Use Google

Warning: Google periodically collects information on users’ browsing and search data to facilitate the growth of its revenue. Rather, go for alternatives such as Startpage and DuckDuckGo. These anonymity-compliant services offer search results without logging your IP address and storing cookies on your computer.

Source: Hongkiat

Saurabh Singh, EFYTIMES News Network
thanks for sharing. problem is all I have is windows
 
A 0

adi.11

Transcendent
Member
Access
Joined
Mar 16, 2025
Messages
37
Reaction score
0
Points
6
grants
₲55
4 months of service
Here Are 11 Do's And Don'ts Of Tor Network!

Alam nyo na naman siguro kung ano ang TOR at gumagamit din kayo nito kung minsan... kaya eto ang share kong tips para magamit ng mabuti ang TOR Network...


These tips and tricks will bring out the best of Tor for you!

dJjy124550PM3132014.jpg


There is nothing better than The Onion Router aka TOR for those genuinly concerned about the privacy of their digital communications. The free software secretly routes your system's Internet traffic over several places on the Internet, thereby hiding the actual source of communication improving your privacy and security on the Internet.

We bring you a list of tips and tricks for using Tor to protect you better when online:

1. Do Use Tor

Tor is widely known for providing online anonymity, having gained quite a lot of reputation at what it does. It can be used for:

-sensitive browsing

-reporting abuse or corruption

-serious business activities

-inter-state or inter-country communications

-publishing anonymous posts

-sharing personal secrets with family and friends

and more.

2. Don't Use Windows

Refrain from browsing websites through Tor on Windows systems if you're looking to improve your Internet privacy. On Windows systems, security bugs and vulnerabilities present in the system may
compromise your privacy rendering Tor quite literally worthless. It's best to run Tor-configured Linux systems such as Tails and Whonix, Further, you can also set up Tor on any of your favorite Linux distro.

3. Do Update Your System

Remember, Tor is only as safe and secure as the system running the Tor client. Therefore, it is highly advisable to regularly update the Tor client, Tor-secured applications (browsers, instant messaging clients, email clients, etc.), and the operating system of your computer.

4. Don’t Use HTTP Websites

Tor is a traffic router and not a tool to encrypt the network traffic throughout the Internet, therefore, its exit nodes can read your Internet traffic when in the form of plain unencrypted data.

It's only obvious you use end-to-end encryption such as SSL or TLS when doing sensitive online communications that requires HTTPS websites. Further, add-ons like 'HTTPS Everywhere' automatically switch to HTTPS-mode browsing for supported websites. It's preferred you use these.

5. Do Encrypt Your Data Storage

Tor cannot secure the digital data on your computer. Complete security can only be achieved through encryption of data using strong cryptographic algorithms. LUKS or TrueCrypt can be used for the same.

6. Don’t Use Tor Browser Bundle

Tor Browser Bundle contains critical vulnerabilities and therefore should not be used for browsing websites anonymously through Tor.

7. Do Disable JavaScript, Flash And Java

Binary applications like JavaScript, Adobe Flash, Java, QuickTime, ActiveX controls, VBScripts etc run with user account's privileges. These might access and share your data leaving Tor rendered useless. Websites can use to track you using JavaScript. Meanwhile, Java and Adobe Flash run in virtual machines. These might ignore your system’s configured proxy settings, and share your data directly with the websites.

8. Don’t Use P2P

Tor network is not built for peer-to-peer file sharing. If you're into downloading torrents, remember you're simply busing Tor. Another downside is, it slows down other user's browsing on the network.

9. Do Delete Cookies And Site’s Local Data

Tor uses network packets to hide your real identity from the websites. However, it can't stop websites from using workarounds such as cookies and local data storage to detect your real identity.

10. Don’t Use Your Real Email

Tor protects online privacy and hides real identity. However if you’re giving out your real email on the websites, how is Tor to secure you? Ideally, you must consider a virtual identity while using Tor.

11. Don’t Use Google

Warning: Google periodically collects information on users’ browsing and search data to facilitate the growth of its revenue. Rather, go for alternatives such as Startpage and DuckDuckGo. These anonymity-compliant services offer search results without logging your IP address and storing cookies on your computer.

Source: Hongkiat

Saurabh Singh, EFYTIMES News Network
Thank you for the info
 
Top Bottom