Tor Browser
History of tor
Tor is based on the principle of ‘onion routing’ which was developed by Paul Syverson, Michael G. Reed and David Goldschlag at the United States Naval Research Laboratory in the 1990’s. The alpha version of Tor, named ‘The Onion Routing Project’ or simply TOR Project, was developed by Roger Dingledine and Nick Mathewson. It was launched on September 20, 2002. Further development was carried under the financial roof of the Electronic Frontier Foundation (EFF).
The Tor Project Inc. is a non-profit organization that currently maintains Tor and is responsible for its development. The United States Government mainly funds it, and further aid is provided by Swedish Government and different NGOs & individual sponsors.
How Tor Works?
Tor works on the concept of ‘onion routing’ method in which the user data is first encrypted and then transferred through different relays present in the Tor network, thus creating a multi-layered encryption (layers like an onion), thereby keeping the identity of the user safe.
One encryption layer is decrypted at each successive Tor relay, and the remaining data is forwarded to any random relay until it reaches its destination server. For the destination server, the last Tor node/exit relay appears as the origin of the data. It is thus tough to trace the identity of the user or the server by any surveillance system acting in the mid-way.
Other than providing anonymity to standalone users, Tor can also provide anonymity to websites and servers in the form of Tor Hidden Services. Also, P2P applications like BitTorrent can be configured to use the Tor network and download torrent files.
levels of security
Depending on individual user needs, Tor browser offers three levels of security located under the Security Level (the small gray shield at the top-right of the screen) icon > Advanced Security Settings. In addition to encrypting the data, including constantly changing an IP address through a virtual circuit comprising successive, randomly selected Tor relays, several other layers of security are at a user's disposal:
- Standard (default) – at this security level,
- all browser features are enabled.This level provides the most usable experience, and the lowest level of security.
- Safer – at this security level, the following changes apply:
- JavaScript is disabled on non-HTTPS sites.On sites where JavaScript is enabled, performance optimizations are disabled Scripts on some sites may run slower.Some mechanisms of displaying math equations are disabled. Audio and video (HTML5 media), and WebGL are click-to-play
- Safest – at this security level, these additional changes apply:
- JavaScript is disabled by default on all sitesSome fonts, icons, math symbols, and images are disabled.Audio and video (HTML5 media), and WebGL are click-to-play.
HERE THE LINK FOR TOR TO DOWNLOAD
https://www.torproject.org/download/
Here Video for Tamil Language
subscribe our YouTube channel
Comments
Post a Comment