{"id":131,"date":"2019-10-06T12:37:11","date_gmt":"2019-10-06T12:37:11","guid":{"rendered":"https:\/\/osintme.com\/?p=131"},"modified":"2019-10-20T20:51:51","modified_gmt":"2019-10-20T20:51:51","slug":"the-onion-router-tor-the-truths-and-myths-of-anonymity","status":"publish","type":"post","link":"https:\/\/osintme.com\/index.php\/2019\/10\/06\/the-onion-router-tor-the-truths-and-myths-of-anonymity\/","title":{"rendered":"The Onion Router (TOR) &#8211; the truths and myths of anonymity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"131\" class=\"elementor elementor-131\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d9755c5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d9755c5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d26f957\" data-id=\"d26f957\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b996fd6 elementor-widget elementor-widget-text-editor\" data-id=\"b996fd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the<a href=\"https:\/\/osintme.com\/index.php\/2019\/10\/01\/osint-me-setup-part-1-hardware-operating-system\/\"> last article<\/a> I mentioned using TOR as part of the TAILS operating system.<\/p><p>TOR in its early stages was really a precursor of digital privacy. The concept originated in the 1990s and it was based upon the research initiated by computer experts working with and funded from the US Naval Research Laboratory.<\/p><p>The detailed history of &#8220;onion routing&#8221; and the TOR project can be found <a href=\"https:\/\/www.torproject.org\/about\/history\/\">here<\/a>.<\/p><p>Essentially, TOR started out as free open source software, which at its core embraced the idea of a decentralised network. Any network traffic routed through the TOR network is encrypted and it does not go directly from A to B; instead, it randomly bounces through a network of relays (referred to as TOR nodes), which are run by volunteer users all around the world.<\/p><p>Routing traffic through multiple servers while protecting it each step of the way with layers of encryption brought to mind the &#8220;onion&#8221; parallel.<\/p><p><img decoding=\"async\" data-recalc-dims=\"1\" class=\"aligncenter\" src=\"https:\/\/i0.wp.com\/tr2.cbsistatic.com\/hub\/i\/r\/2019\/05\/09\/4f29d8de-863b-400a-b7a0-81f478112e85\/resize\/1200x\/d06819c55eb62a2abf06ef6da259bae7\/tor-logo-tr.jpg?resize=224%2C137&#038;ssl=1\" alt=\"Image result for tor browser\" width=\"224\" height=\"137\" \/><\/p><p>Any online resources are accessible using TOR (pretty much anything in the &#8220;normal&#8221; Internet, or &#8220;clearnet&#8221;), however there is a number of Internet sites out there with <em><strong>top level domains of .onion<\/strong><\/em>. These resources are only accessible via the TOR protocol and are commonly referred to as &#8220;the dark web&#8221;.<\/p><p>To illustrate it with an example: to access the most popular online encyclopedia, you go to <a href=\"https:\/\/www.wikipedia.org\/\">www.wikipedia.org<\/a> by typing this URL in your browser. In the dark web, to access anything you must first know the exact URL, which is impossible to type out or even remember, because it will typically look like this: zqktlwi4fecvo6ri.onion.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fa00744 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fa00744\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f7aafb6\" data-id=\"f7aafb6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-05f8081 elementor-widget elementor-widget-heading\" data-id=\"05f8081\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The TOR browser<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-01ff71e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"01ff71e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e5d7ee2\" data-id=\"e5d7ee2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5865cf7 elementor-widget elementor-widget-text-editor\" data-id=\"5865cf7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The development of TOR browser initiated in 2008. Anybody who attempted to use this technology in its early stages will remember the hardship associated with correctly configuring the tunnelling protocol connection.<\/p><p>Thankfully, in its current form the TOR browser is a fully configured, ready to go state-of-the-art product that can be used by anybody with bare minimum of effort and expertise. And it&#8217;s based on the free and open source Firefox browser.<\/p><p>Here&#8217;s the TOR browser download link:<\/p><p><a href=\"https:\/\/www.torproject.org\/download\/\">https:\/\/www.torproject.org\/download\/<\/a><\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8bf0b86 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8bf0b86\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cca9911\" data-id=\"cca9911\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c48ec50 elementor-widget elementor-widget-heading\" data-id=\"c48ec50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Demystifying TOR<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-25c68c6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"25c68c6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-53a1c7d\" data-id=\"53a1c7d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-730f3c0 elementor-widget elementor-widget-text-editor\" data-id=\"730f3c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Whether you consider TOR to be part of mainstream digital privacy tools or not, it&#8217;s hard to shake off certain myths and untruths about it, now heavily embedded in the popular imagination.<\/p><p>Here are some common misconceptions regarding TOR:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e791d91 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e791d91\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9d7d46e\" data-id=\"9d7d46e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e57f8a elementor-widget elementor-widget-heading\" data-id=\"2e57f8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">1. TOR is illegal<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-598589a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"598589a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-da21be4\" data-id=\"da21be4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-76c57fe elementor-widget elementor-widget-text-editor\" data-id=\"76c57fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Generally speaking, this is <strong>not true.<\/strong> It&#8217;s not illegal to rout and encrypt Internet traffic, it&#8217;s not illegal to safeguard your privacy, it&#8217;s not illegal to access the dark web.<\/p><p><em>[Unless you live in a country whose authoritarian regime regularly breaches the privacy of their citizens and bans the use of such services &#8211; like China, Iran, Russia and so on].<\/em><\/p><p>In any other normal jurisdiction, the question of legality should be asked in respect of actions of specific users, who might use TOR to access services that allow them to purchase drugs or stolen goods, access child abuse material, etc.<\/p><p>It is worth noting that more that half of all content available on the dark web is not illegal.<\/p><p>Remember &#8211; anonymity does not equal criminality!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9342dd2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9342dd2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ca0551b\" data-id=\"ca0551b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fe6e954 elementor-widget elementor-widget-heading\" data-id=\"fe6e954\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">2. TOR is completely secure<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a1408e2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a1408e2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d80d5d4\" data-id=\"d80d5d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-350a569 elementor-widget elementor-widget-text-editor\" data-id=\"350a569\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This is also <strong>not true<\/strong>. Because TOR operates as a decentralised network, it is possible to attack it by controlling a substantial number of TOR nodes.<\/p><p>If a single party was to control enough relay points, it could disrupt the network&#8217;s anonymity by observing Internet traffic and analysing its metadata in order to link specific users to specific activities.<\/p><p>Moreover, the encryption of TOR traffic works only if its destination also offers encryption. Connecting to a website that utilises the unsecured HTTP protocol carries a big risk of dropping encryption upon arrival at the website and could lead to exposing sensitive information.<\/p><p>Likewise, if accessing any website where you have to log in, even if it uses HTTPS, you identify yourself with your login credentials.\u00a0<\/p><p>Opening downloaded files while still browsing within TOR can also de-anonymise the user. These files can be designed to link to certain Internet resources while by-passing the TOR network and can leads to revealing the real IP address of the user.<\/p><p>Remember &#8211; the safest option is to combine TOR usage with a trusted VPN!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-802a2f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"802a2f9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ae31d9d\" data-id=\"ae31d9d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7d00faa elementor-widget elementor-widget-heading\" data-id=\"7d00faa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">3. TOR was created by US government - so it can't be secure<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9853484 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9853484\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a0c1fc1\" data-id=\"a0c1fc1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-322b4e1 elementor-widget elementor-widget-text-editor\" data-id=\"322b4e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This claim is the exact opposite of the previous one. And like the previous claim, this is also <strong>not true<\/strong>.<\/p><p>TOR was not exactly created by the US government, it was created by individual researchers who received funding from the US Naval Research Laboratory.<\/p><p>It is also a known fact that:<\/p><p>a) the US government also uses TOR for their own purposes<\/p><p>b) the US government funds the researchers at the TOR Project to allow them to continue their work.<\/p><p>It is illogical to think that the US government would develop a technology like TOR for its own use, then make it public and then weaken it by implementing a backdoor in it, thus crippling everybody&#8217;s potential to use it, including their own.<\/p><p>The people behind the TOR Project themselves addressed the &#8220;backdoor concern&#8221; in the following way:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1fa409b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1fa409b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-566b0d7\" data-id=\"566b0d7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3329470 elementor-widget elementor-widget-testimonial\" data-id=\"3329470\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"testimonial.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-wrapper\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial-content\">\"There is absolutely no backdoor in Tor. We know some smart lawyers who say that it's unlikely that anybody will try to make us add one in our jurisdiction (U.S.). If they do ask us, we will fight them, and (the lawyers say) probably win.\n\nWe will never put a backdoor in Tor. We think that putting a backdoor in Tor would be tremendously irresponsible to our users, and a bad precedent for security software in general. If we ever put a deliberate backdoor in our security software, it would ruin our professional reputations. Nobody would trust our software ever again \u2014 for excellent reason.\"<\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3b1bd42 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3b1bd42\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8eed585\" data-id=\"8eed585\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-84b0f06 elementor-widget elementor-widget-text-editor\" data-id=\"84b0f06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>source:<\/strong> <\/em><a href=\"https:\/\/2019.www.torproject.org\/docs\/faq.html.en#Backdoor\">https:\/\/2019.www.torproject.org\/docs\/faq.html.en#Backdoor<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-265226a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"265226a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f77619b\" data-id=\"f77619b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0db645b elementor-widget elementor-widget-heading\" data-id=\"0db645b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">4. TOR is slow and inefficient<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e1420fc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e1420fc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f92d4c2\" data-id=\"f92d4c2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-da41618 elementor-widget elementor-widget-text-editor\" data-id=\"da41618\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Answering this question can be tricky as the above metrics are subjective, depending on each individual user. Trying to be objective, I&#8217;ll settle on <strong>partially true<\/strong>.<\/p><p>The process of routing Internet traffic through various nodes around the world will certainly impact your connection speed. TOR is definitely slower than any clearnet browser.<\/p><p>Moreover, when using clearnet search engines such as Google, your searches within the TOR browser will be hampered by alerts on &#8220;unusual activity&#8221; and by captcha.<\/p><p>On top of that, TOR is sometimes being used for illegal activities like DDOS attacks or for downloading files via peer-to-peer software, which negatively affects connection speed for every TOR user who is currently online.<\/p><p>However, one has to understand that the slower connection is the price we pay for increased security and privacy. TOR is still an efficient tool and it still gets the job done; the difference is that when security and privacy take precedence, speed and performance become a secondary concern.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-077fcd9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"077fcd9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e120028\" data-id=\"e120028\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ce1a0a5 elementor-widget elementor-widget-image\" data-id=\"ce1a0a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"423\" height=\"415\" src=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2019\/10\/TOR-circuit.png?fit=423%2C415&amp;ssl=1\" class=\"attachment-large size-large wp-image-145\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2019\/10\/TOR-circuit.png?w=423&amp;ssl=1 423w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2019\/10\/TOR-circuit.png?resize=300%2C294&amp;ssl=1 300w\" sizes=\"(max-width: 423px) 100vw, 423px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Explaining certain misconceptions and untruths about TOR.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":70,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[18],"tags":[16,19,14,15,9,17],"class_list":["post-131","post","type-post","status-publish","format-standard","hentry","category-digital-privacy-security","tag-anonymity","tag-dark-web","tag-privacy","tag-security","tag-tor","tag-vpn"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/comments?post=131"}],"version-history":[{"count":14,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/131\/revisions"}],"predecessor-version":[{"id":186,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/131\/revisions\/186"}],"wp:attachment":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/media?parent=131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/categories?post=131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/tags?post=131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}