• Eggyhead@kbin.social
    link
    fedilink
    arrow-up
    55
    ·
    edit-2
    1 year ago

    It’s really worth reading the article.

    Tor can be used for any internet browsing you usually do. The key difference with Tor is that the network hides your IP address and other system information for full anonymity.

    The company behind a VPN can still access your information, sell it or pass it along to law enforcement. With Tor, there’s no link between you and your traffic, according to Jed Crandall, an associate professor at Arizona State University.

    I don’t know if it’s even possible, but it would be cool if I could use the fediverse over TOR just for the sake of supporting TOR. Not sure if there would have to be specific .onion instances, if normal instances could just be mirrored with a .onion address, or if a .onion instance would even be able to federated in the first place. I just don’t know how it works.

    Other use cases may include keeping the identities of sensitive populations like undocumented immigrants anonymous, trying to unionize a workplace without the company shutting it down, victims of domestic violence looking for resources without their abuser finding out or, as Crandall said, wanting to make embarrassing Google searches without related targeted ads following you around forever.

    I’m certain an all-out legislative war would be waged against TOR if it were to become popularized for most of those reasons, under the more convenient guise of “criminals and children!”

    • davehtaylor@beehaw.org
      link
      fedilink
      arrow-up
      40
      ·
      1 year ago

      Tor can be used for any internet browsing you usually do. The key difference with Tor is that the network hides your IP address and other system information for full anonymity

      Also, this isn’t true. MANY sites and services block access from Tor, including major ones that people use everyday.

      • Freeman@lemmy.pub
        link
        fedilink
        arrow-up
        15
        ·
        1 year ago

        Also. Those running an exit node can and do sniff traffic.

        It’s bad practice to login to stuff that’s important (like banking) over tor. Or login to anything over for you have logged into over the clear.

        Also, nation states can track you using a variety of techniques from fingerprinting to straight up working together to associate connection streams. A large number of tor nodes are run by alphabet agencies. Hell the protocol was developed by the us navy.

      • Devi@beehaw.org
        link
        fedilink
        arrow-up
        3
        ·
        1 year ago

        Which ones? I use it quite a lot and never found a site that has blocked me.

        • TheOakTree@beehaw.org
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          I remember hearing that Yelp blocks Tor users, but I’m not sure if that is the case through proxies.

          Also iirc Cloudflare blocks all Tor exits.

          • abclop99@beehaw.org
            link
            fedilink
            English
            arrow-up
            3
            ·
            1 year ago

            I’ve used sites with cloudflare over Tor. They always seem to require pressing a check box, but usually work.

            • kath@kbin.social
              link
              fedilink
              arrow-up
              2
              ·
              1 year ago

              I’ve noticed that just as the most aggressive ad blocker blockers are news media websites, the most aggressive tor-exit-node blockers are retail sites such as lowes.com. My working hypothesis is that they view anonymous transactions (or perhaps even anonymous window shopping) as stealing. When it comes to actionable data for market research, data about actual finalized transactions where actual money changed hands is the holy grail. It’s the data that has skin in the game. As for window shopping online, you know the drill, you do that, you hear about it on Fecebook. Until recently I searched retail sites with the site: filter of a search engine (the one that works on Tor, of course), but until recently, most site searches were even more enshittified than most of the two search engines. Now search engines are out and Tor is out. Perhaps offline shopping is in. BTW, just for shits and giggles, try carrying a clipboard next time you visit a brick and mortar retail establishment and see what happens, or better yet, whip out your cell phone and start photographing not merchandise but shelf tags. Information is power, my friends.

        • tnimkh@rammy.site
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          They’re right. I dont have specific examples but a lot of wikis and some general news sites blocked me when i used it.

          • Devi@beehaw.org
            link
            fedilink
            arrow-up
            4
            ·
            1 year ago

            I mean… I asked for examples and you gave ‘there are examples but I don’t know any’, which is not really supporting the point here.

        • davehtaylor@beehaw.org
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          Last I tried you couldn’t access social media, Google constantly forces you through captchas because it thinks you’re a bot, and anything on a CDN will either constantly force captchas or just doesn’t work. Financial institutions absolutely are all inaccessible.

    • z3bra@lemmy.sdf.org
      link
      fedilink
      arrow-up
      28
      ·
      1 year ago

      You don’t need to access a .onion instance to use Tor. You can simply perform your day-to-day web usage through Tor directly.

      On your phone, you can even use Tor natively with most of your apps.

    • CanadaPlus@lemmy.sdf.org
      link
      fedilink
      arrow-up
      8
      ·
      edit-2
      1 year ago

      I’ve literally always browsed Lemmy over Tor. I even made this account over it, which surprised me when it worked.

      • pemmykins@beehaw.org
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        How do the big CDNs handle Tor traffic? Do you find you get blocked, or is it just a matter of more captchas/challenges?

        • CanadaPlus@lemmy.sdf.org
          link
          fedilink
          arrow-up
          3
          ·
          edit-2
          1 year ago

          CloudFlare puts up a captcha occasionally, everything else just leaves me alone.

          At this point using someone else’s browser with no adblock feels more difficult to navigate.

      • Eggyhead@kbin.social
        link
        fedilink
        arrow-up
        4
        ·
        1 year ago

        What effect would using Tor browser to access a non onion site have over using a different, privacy-focused browser? Honest question. I assumed Tor browser was no different than other browsers in that aspect.

        • ctr1@fl0w.cc
          link
          fedilink
          English
          arrow-up
          3
          ·
          edit-2
          1 year ago

          The difference is that your ISP doesn’t know where your packets are headed, and the destination doesn’t know where your packets came from. The ISP sees you connect to the entrance node and the destination sees you connect from the exit node, and it’s very difficult for anyone to trace the connection back to you (unless they own both the entrance and exit and use traffic coorelation or some other exploit/fingerprint). Regardless, both parties are generally able to tell that you are using TOR if they reference lists of known entrance/exit nodes. Also the anti-fingerprinting measures taken by TB are a bit more strict than other privacy-focused browsers

          • Eggyhead@kbin.social
            link
            fedilink
            arrow-up
            5
            ·
            1 year ago

            Thank you for the detailed answer. I’m surprised more people aren’t talking about using tor browser, considering how privacy-minded the community tends to be.

            • astral_avocado@programming.dev
              link
              fedilink
              arrow-up
              1
              ·
              1 year ago

              It is confusing, Tor is an excellent privacy tool if used properly (don’t log in to stuff), but I guess it’s still a technical hurdle to most. Probably also from a lack of marketing. I think in countries where the government is decidedly more authoritarian it’s more known. On my relay right now I see a ton of russian and a smaller amount of German connections.

            • ctr1@fl0w.cc
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 year ago

              No problem! And yeah, it’s good to see people talking about it over here. I think it’s the best tool for online privacy OOTB (depending on your threat model), and it gets better the more people use it.

    • Mummelpuffin@beehaw.org
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 year ago

      I mean, I’ve used it. It works. But I don’t get why you would bother most of the time. It’s slow as hell and while I’m generally fairly concerned about my privacy there is a point where I can’t be bothered.

    • cultsuperstar@lemmy.mlB
      link
      fedilink
      arrow-up
      5
      ·
      edit-2
      1 year ago

      I’m certain an all-out legislative war would be waged against TOR if it were to become popularized for most of those reasons, under the more convenient guise of “criminals and children!”

      I guess we’ll have to see what happens after that right wing Twitter account posted CSAM, Twitter suspended the account, then Elon said they removed the posts and reinstated the account 🤷🏽‍♂️

    • r00ty@kbin.life
      link
      fedilink
      arrow-up
      5
      ·
      1 year ago

      Well any instance owner could also get an onion link and host the instance over tor.

      Of course the instance itself can’t really hide. Since it needs to federate with others that are not onions. But your accesses would all show as from localhost.

  • zephyrvs@lemmy.ml
    link
    fedilink
    arrow-up
    39
    ·
    1 year ago

    I always have Tor installed and I often use it instead of incognito browser sessions when researching stuff. It’s sometimes slow and Cloudflare made it a lot more annoying to use than ~5-10 years ago, but I’m glad it exists.

    I’m sure it’s still more useful to US interests though, or it wouldn’t be funded anymore.

    • kent_eh@lemmy.ca
      link
      fedilink
      English
      arrow-up
      13
      ·
      1 year ago

      Any time I’ve tried to use Tor in the past I gave up because it was frustratingly slow.

      • astral_avocado@programming.dev
        link
        fedilink
        arrow-up
        16
        ·
        1 year ago

        Those onion layers don’t add up to nothing… also I’ve heard it’s under constant attack. Plus not enough people running relays and exit nodes.

            • davehtaylor@beehaw.org
              link
              fedilink
              arrow-up
              1
              ·
              1 year ago

              And I absolutely believe it. If anyone can run an exit node, then there’s absolutely no way the NSA isn’t running one and sniffing all the traffic

              • ErgodicTangle@feddit.de
                link
                fedilink
                arrow-up
                2
                ·
                edit-2
                1 year ago

                If they don’t control most of the nodes in-between they can control all the exit nodes they want. If you connect though 3 Tor nodes, as soon as one of them is not controlled by them they likely can’t identify you.

                That’s not to say that they don’t control most of the nodes, and your traffic likely goes through NSA nodes exclusively

              • jarfil@beehaw.org
                link
                fedilink
                arrow-up
                1
                ·
                1 year ago

                The CIA, not the NSA. Tor is a great way for agents deployed abroad to phone home with plausible deniability: “I’m sorry Mr. Chinese Officer, I got homesick and really wanted to watch some BBW porn…”

      • ErgodicTangle@feddit.de
        link
        fedilink
        arrow-up
        24
        ·
        1 year ago

        I am not sure what he’s hinting at. Just using Tor doesn’t bear any legal risks. Hosting an exit node is different, as depending on the country you might get into serious trouble if certain traffic goes through it.

        • TWeaK@lemm.ee
          link
          fedilink
          English
          arrow-up
          11
          ·
          1 year ago

          Yes exactly, and I think there have been stories recently where the exit node host has been held liable for content that’s gone through it.Which is complete bullshit, but the unfortunate reality is that the legal system doesn’t need to understand technology to regulate it.

          • jarfil@beehaw.org
            link
            fedilink
            English
            arrow-up
            3
            ·
            edit-2
            1 year ago

            It’s not bullshit. If A has proof your system launched an attack, or sent CSAM, to another system, but your only defense is “I let anyone use my system in that way”, then at the very least you’re an accomplice.

        • J Lou@mastodon.social
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          1 year ago

          Would it be possible to allow exit nodes to blacklist specific kinds of traffic and somehow privately verify that the traffic is not one of the blacklisted kinds (zero knowledge proof perhaps sorry not a CS person)?

          • jarfil@beehaw.org
            link
            fedilink
            arrow-up
            2
            ·
            edit-2
            1 year ago

            An exit nodes can put in place any filters, blacklists, mitm, exploit injection, logging, and anything else it wants… on unencrypted traffic. Using HTTPS through an exit node, limits all of that to the destination of the traffic, there is no way to get a ZK proof of all the kinds of possible traffic and contents that can exist.

            • J Lou@mastodon.social
              link
              fedilink
              arrow-up
              1
              ·
              edit-2
              1 year ago

              What I meant was blacklisting certain destinations. It obviously wouldn’t prevent all malicious traffic

      • Quexotic@beehaw.org
        link
        fedilink
        arrow-up
        5
        ·
        1 year ago

        To give you an idea, last time I used Tor, I suddenly started to get a bunch of connection attempts from the FBI. Was I doing anything illegal? Nope. Was TOR a legal liability? You betcha.

        • xvlc@feddit.de
          link
          fedilink
          English
          arrow-up
          18
          ·
          1 year ago

          Connection attempts from the FBI? Could you specify that a bit further?

        • Eggyhead@kbin.social
          link
          fedilink
          arrow-up
          11
          ·
          edit-2
          1 year ago

          I suddenly started to get a bunch of connection attempts from the FBI.

          How can I observe connection attempts like this?

    • Sam@lemmy.ca
      link
      fedilink
      arrow-up
      14
      ·
      edit-2
      1 year ago

      The reason is privacy, everybody has a reason to use it.

      • WorseDoughnut@kbin.social
        link
        fedilink
        arrow-up
        32
        ·
        1 year ago

        In theory yes, but practically speaking trying to access a lot of the modern web over TOR would be at best painfully slow and at worst almost impossible thanks to DDoS protection providers like cloudflare.

        • davehtaylor@beehaw.org
          link
          fedilink
          arrow-up
          18
          ·
          1 year ago

          This right here. A very large part of the web is inaccessible from TOR. Last I tried you couldn’t access social media, Google constantly forces you through captchas because it thinks you’re a bot, and anything on a CDN will either forces captchas or just doesn’t work. Financial institutions absolutely are all inaccessible.

          Privacy is important, but most of the places you want to go with TOR to stay private won’t let you in because malicious actors want to use it for the same reasons.

          • nickiam2@aussie.zone
            link
            fedilink
            arrow-up
            7
            ·
            1 year ago

            Facebook has an official.onion domain and it’s the only way I access it, as it’s required for my employer.

      • NaoPb@beehaw.org
        link
        fedilink
        arrow-up
        6
        ·
        1 year ago

        While I agree with you, I’m wondering what the benefit is of watching youtube and posting/reading lemmy/mastodon through a tor network. Because those are the main things I do. While I do understand that in some countries and also in public wifi networks the chances of traffic being intercepted and man in the middle attacks are higher, I do not expect that to happen to my fibre connection in my western country.

        • _MusicJunkie@beehaw.org
          link
          fedilink
          arrow-up
          7
          ·
          1 year ago

          Unless you browse Geocities sites from 1998, intercepting and MITMing is simply not an issue. Everything built nowadays uses https, which fully protects you against those.

      • NaoPb@beehaw.org
        link
        fedilink
        English
        arrow-up
        6
        ·
        edit-2
        1 year ago

        I’d rather not waste my time reading an article about a program I’m not currently using to find out if I should use it our not. I’d rather see a post that has bulletpoints with pre’s and cons. My time is limited enough as it is.

        [edit] I realise that my comment will probably come across as unfriendly so I will add some explaining to it.

        I am currently in a western country using a fibre landline and I trust my internet provider to not intercept my data or use things like a man in the middle attack. Am I right for assuming that and if so, would tor prevent that? Will tor slow down my internet? I mostly watch youtube videos and read/post on lemmy/mastodon. I am not against using tor at all, but my energy and time are limited so I don’t feel like reading a whole article just for an app I do not feel the need to use. I am currently very happy with my firefox browser and all the add-ons I use. And with all the modifications I have put into it to make it work just the way I like. Would I loose all that by switching to tor? I am prepared to change to tor but I am not in the camp of “protect privacy at all costs, even if it greatly inconveniences me”. Especially if the risks of not using tor seem quite low in my situation.

        • zeus ⁧ ⁧ ∽↯∼@lemm.ee
          link
          fedilink
          English
          arrow-up
          5
          ·
          1 year ago

          okay. perhaps instead of wasting your time writing an entire paragraph, you should read the article and you’ll find out that that entire paragraph was irrelevant

          it’s actually not an article about the pros and cons of tor. it could not be summed up in bullet points about the pros and cons of tor

          i’ll admit to being a little facetious before, but i implore you to read articles before commenting on them

          • NaoPb@beehaw.org
            link
            fedilink
            English
            arrow-up
            3
            ·
            1 year ago

            Thing is… if I have to do that for every time someone linkdrops an article, I’ll have no time left in my day.

            And it seems I was right that I have no real reason to use tor.

            • zeus ⁧ ⁧ ∽↯∼@lemm.ee
              link
              fedilink
              English
              arrow-up
              2
              ·
              edit-2
              1 year ago

              Thing is… if I have to do that for every time someone linkdrops an article, I’ll have no time left in my day.

              if you spent less time writing comments about articles you haven’t read, you might have more time. do you do this in other walks of life? wander into restaurants you’ve never eaten at and announce “i don’t think there’s really any reason to order the fish”?

              And it seems I was right that I have no real reason to use tor.

              okay, i’ll sum the article up for you. the more people that use tor, the more it protects vulnerable people. journalists writing exposés about corrupt governments, refugees trying to flee, etc. the more normal people using tor, the more they get lost in the crowd. it’s nothing to do with whether you have any reason to use tor, that’s irrelevant. by using it, you’re helping those in vulnerable positions. happy? no go write something inciteful

  • sznio@beehaw.org
    link
    fedilink
    arrow-up
    23
    ·
    1 year ago

    I heard of a guy who went to prison because he bought something from Allegro (Polish Amazon) over TOR. Someone used the same exit node for hacking, so they pinned it on him.

      • sznio@beehaw.org
        link
        fedilink
        arrow-up
        5
        ·
        1 year ago

        Poland.

        He could’ve easily got it solved but he didn’t have money and the public defender just told him confessing was the best option.

        It might be a legend, it’s just a thing that supposedly happened to someone in a community I participate in.

      • ErgodicTangle@feddit.de
        link
        fedilink
        arrow-up
        14
        ·
        edit-2
        1 year ago

        “Czesc, I am Mister Anonymous. I would like to buy this Book. Please send it to Jan Pawel at this address, dziekuje.”

      • lloram239@feddit.de
        link
        fedilink
        arrow-up
        6
        ·
        1 year ago

        It provides anonymity in much the same sense as going into the bank while wearing a skimask does. Every form of anonymity service always puts you in close range to be grabbed by the authorities, as while your traffic might be anonymized, the fact that you are running the service is not.

  • lloram239@feddit.de
    link
    fedilink
    arrow-up
    23
    ·
    1 year ago

    It would help if Tor would be more useful for regular use. The few times I used it, it was for VPN-style geolocation circumvention. Tor supports it by changing ExitNodes, but the setting is hidden deep down in a config file and required a restart. Not exactly a great user experience for a setting that you might wanna flip pretty frequently.

    • emberwit@feddit.de
      link
      fedilink
      English
      arrow-up
      16
      ·
      edit-2
      1 year ago

      It’s a web browser. Slower than others and some pages won’t work but other than that, it does just that.

      • Mummelpuffin@beehaw.org
        link
        fedilink
        English
        arrow-up
        5
        ·
        1 year ago

        …I mean, it’s more like the web browser makes it easy to use the Tor network. The network is the slow part. Your requests are getting ping-ponged all over the world intentionally taking the long way around.

    • ctr1@fl0w.cc
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 year ago

      It’s great for anything low bandwidth that isn’t tied to your identity, and helps for peace of mind, despite its issues. You do run into captcha or DDOS protection issues occasionally, but the new tor circuit for this site button sometimes works. Also it uses letterboxing to prevent resolution-based fingerprinting, which isn’t very pretty, but leaving it at its default size (or locking the size using the WM) works well and is good for privacy.

    • I use it sometimes. Startup takes a few seconds longer than normal Firefox and some websites take a bit longer to load.

      On the other hand, there’s no way to track you. Useful for looking up medical info in a way that search engines and such can’t relate back to you. Often I’ll keep browsing in it once I’ve opened it because it’s just basically Firefox.

      Running a Tor server is useful if you want to host a server on the internet but don’t want to deal with port forwarding and firewalls and such, but most people wouldn’t have a need for that.

      • interolivary@beehaw.org
        link
        fedilink
        arrow-up
        9
        ·
        1 year ago

        On the other hand, there’s no way to track you. Useful for looking up medical info in a way that search engines and such can’t relate back to you. Often I’ll keep browsing in it once I’ve opened it because it’s just basically Firefox.

        This is only true if you have the most “paranoid” security level selected, and at that point anything that relies on Javascript (or any of the other features that get blocked) will break. Enabling Javascript or the other blocked Web features will make it fairly trivial to track you especially the more you browse, so at that point you might as well just be using a regular VPN.

        Tor itself isn’t the problem in this equation, it’s the browser, and they tend to leak information like a sieve

        • Even on standard settings, tracking companies like fingerprint.com fail to correlate your visits. The EFF’s (quite extensive) CoverYourTracks also fails to fingerprint the standard configuration. It helps a lot that <canvas> and WebGL access is denied by default and that the browser hides your screen resolution.

          You can go ultra paranoid if you want to, but you don’t need to for normal trackers.

          • interolivary@beehaw.org
            link
            fedilink
            arrow-up
            5
            ·
            1 year ago

            Sure, it all depends on how paranoid you are, my point was more that saying someone is untrackable if they use Tor has a lot of caveats.

            For the average pleb it’s probably fine, if all they’re doing is just trying to dodge regular trackers and not the authorities

    • Audalin@beehaw.org
      link
      fedilink
      arrow-up
      3
      ·
      1 year ago

      It’s great when you want to connect two devices behind NAT without relying on any specific third-party server or service. I ssh to my laptop from my phone with it when away from it.

      It’s also useful to circumvent censorship, though it depends on the country. Also, websites employing wide-range IP blocks, in my experience, more often than not still allow Tor.

        • Audalin@beehaw.org
          link
          fedilink
          arrow-up
          3
          ·
          1 year ago

          You run a Tor Hidden Service with sshd on one device. Knowing the .onion address, the correct port and having the corresponding private key on the other device (all of that not really subject to change), you can run the Tor daemon on it (for Android, you can use Termux) and connect with ssh, using torify nc %h %p as ProxyCommand.

  • Lexam@lemmy.ca
    link
    fedilink
    English
    arrow-up
    9
    ·
    1 year ago

    But that’s part of its appeal. How else do I know I’m one of the cool kids?

    • Chadus_Maximus@lemm.ee
      link
      fedilink
      arrow-up
      3
      ·
      edit-2
      1 year ago

      People treat this as a suggestion. It’s actually a warning. A warning of what will happen if we overuse TOR.

  • A2PKXG@feddit.de
    link
    fedilink
    arrow-up
    8
    ·
    1 year ago

    Someone correct me if I’m wrong.

    Operating nodes is expensive, offers no reward, and comes with a serious legal risk.

    This won’t stop the NSA from operating a few. I assume that a significant portion of Tor nodes is run by intelligence agencies. If they control all nodes used for a connection(i believe three are used), they can probably piece together what connections a user is having.

  • wxboss@lemmy.sdf.org
    link
    fedilink
    arrow-up
    6
    ·
    edit-2
    1 year ago

    On the desktop, I use Whonix which does utilize the Tor Network. That being said, I rarely use the Tor browser outside of it.

  • A2PKXG@feddit.de
    link
    fedilink
    arrow-up
    5
    ·
    1 year ago

    I’m under the impression that my use will only make it slower for people who really need it.

  • fearout@kbin.social
    link
    fedilink
    arrow-up
    5
    ·
    1 year ago

    Are there any good iOS Tor browsers? All that I’ve seen are either shit or require some insane subscription.

    • Haakon@lemmy.sdfeu.org
      link
      fedilink
      arrow-up
      16
      ·
      1 year ago

      Due to Apple’s policies, there are no good ones. The least bad one is called Onion Browser and is recommended by the Tor Project.

      • jcg@halubilo.social
        link
        fedilink
        arrow-up
        5
        ·
        1 year ago

        Interesting, is this due to all browsers being required to use Safari or something? I always figured since there are VPNs on iPhone that TOR would be no problem.

        • jarfil@beehaw.org
          link
          fedilink
          arrow-up
          1
          ·
          1 year ago

          You can use any browser you want with Tor, the issue is that browsers are the main source of tracking and de-anonymization, so by being forced to use Safari there is only so much that Tor can do to keep you anonymous.

      • fearout@kbin.social
        link
        fedilink
        arrow-up
        1
        ·
        1 year ago

        Both are broken as far as I know. First one hasn’t updated for years, and recent reviews for the second one claim it crashes on startup.