The Tor Network: Tools for private and secure browsing
The Tails Distribution
Used as described, Tor will generally allow for anonymous browsing. However, Tor is tightly focused on its stated purpose and does not audit the system it is installed on. Should the system have privacy or security weaknesses, Tor will not protect you from them. For this reason, if you want a greater guarantee of privacy or security, consider using the Tails (The Amnesic Incognito Live System) distribution, one of the Tor's projects major sub-projects, and the only one endorsed by Edward Snowden. As the full name suggests, Tails allows you to browse anonymously and without storing any permanent information.
Tails is a distribution designed to run the Tor Browser from an exterior drive. Because Tails is a separate operating system that is secure in itself, it is unaffected by vulnerabilities of any installed operating system. Once shut down, it also leaves no trace. Moreover, because it is portable, Tails can be used on any computer simply by adjusting the BIOS to boot from an exterior drive. In addition, Tail's detailed documentation is an ideal place to learn privacy and security issues.
Relays
As you can tell from the design of the Tor network, the relay nodes are a precious commodity that are at the heart of the system. The more relay nodes you have available for forwarding traffic, the lower the system load and thus the faster the traffic. More nodes also makes the system more resilient to outage and makes it harder to compromise.
You can operate the Tor Browser without being part of the relay system. However, the Tor network is always looking for volunteer relay operators. The Tor project has a web page with resources for relay operators. You'll need some basic system administration skills to run a relay, as well as sufficient bandwidth. According to the Tor project, a non-exit relay should be able to handle at least 7,000 concurrent connections, which is too much for most consumer-grade routers. According to the Tor website, "Fast exit relays (>=100 Mbit/s) usually have to handle a lot more concurrent connections (>100k)."
Hidden Services
The Tor network allows Tor clients and relays to offer hidden services that are visible only through Tor. In other words, you can run your own web server, SSH server, or other service without revealing your IP address. Tor hidden services have the pseudo top-level domain .onion
.
The dark web is actually a collection of web servers using Tor's hidden service feature. Dissidents in repressive countries use hidden web servers to operate blogs and information sources free of government surveillance. See the Tor project website for more on configuring and launching a hidden service.
« Previous 1 2 3 Next »
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Thousands of Linux Servers Infected with Stealth Malware Since 2021
Perfctl is capable of remaining undetected, which makes it dangerous and hard to mitigate.
-
Halcyon Creates Anti-Ransomware Protection for Linux
As more Linux systems are targeted by ransomware, Halcyon is stepping up its protection.
-
Valve and Arch Linux Announce Collaboration
Valve and Arch have come together for two projects that will have a serious impact on the Linux distribution.
-
Hacker Successfully Runs Linux on a CPU from the Early ‘70s
From the office of "Look what I can do," Dmitry Grinberg was able to get Linux running on a processor that was created in 1971.
-
OSI and LPI Form Strategic Alliance
With a goal of strengthening Linux and open source communities, this new alliance aims to nurture the growth of more highly skilled professionals.
-
Fedora 41 Beta Available with Some Interesting Additions
If you're a Fedora fan, you'll be excited to hear the beta version of the latest release is now available for testing and includes plenty of updates.
-
AlmaLinux Unveils New Hardware Certification Process
The AlmaLinux Hardware Certification Program run by the Certification Special Interest Group (SIG) aims to ensure seamless compatibility between AlmaLinux and a wide range of hardware configurations.
-
Wind River Introduces eLxr Pro Linux Solution
eLxr Pro offers an end-to-end Linux solution backed by expert commercial support.
-
Juno Tab 3 Launches with Ubuntu 24.04
Anyone looking for a full-blown Linux tablet need look no further. Juno has released the Tab 3.
-
New KDE Slimbook Plasma Available for Preorder
Powered by an AMD Ryzen CPU, the latest KDE Slimbook laptop is powerful enough for local AI tasks.