diff options
author | Nicholas Johnson <nick@nicholasjohnson.ch> | 2023-02-15 00:00:00 +0000 |
---|---|---|
committer | Nicholas Johnson <nick@nicholasjohnson.ch> | 2023-02-15 00:00:00 +0000 |
commit | 53aec0cb4e73cc6bc77a4a5086478b3faaa12eaa28794d55a7a6e0fa1b20ab5a (patch) | |
tree | dd93d9e89fe83589b92222fd478ee0e8e026ac49b48422c699780db5161d7609 | |
parent | 31f582eed10caec843fc31fb65757d66ff7206aba5aa8f93865f02f9ded81c27 (diff) | |
download | journal-53aec0cb4e73cc6bc77a4a5086478b3faaa12eaa28794d55a7a6e0fa1b20ab5a.tar.gz journal-53aec0cb4e73cc6bc77a4a5086478b3faaa12eaa28794d55a7a6e0fa1b20ab5a.zip |
Convert refs: always-use-tor
-rw-r--r-- | content/entry/always-use-tor.md | 22 |
1 files changed, 6 insertions, 16 deletions
diff --git a/content/entry/always-use-tor.md b/content/entry/always-use-tor.md index 6de1b17..009bdac 100644 --- a/content/entry/always-use-tor.md +++ b/content/entry/always-use-tor.md @@ -2,15 +2,14 @@ title: "Always Use Tor" date: 2022-01-16T00:00:00 draft: false -makerefs: false --- # What is Tor? -Tor is an acronym for The Onion Router. Tor is free software that enables anonymous communication. The Tor Project[1], a non-profit 501c3 organization, is primarily responsible for maintaining Tor. It has been funded by human rights organizations, the US government, the national science foundation, NGOs and thousands of individual sponsors. It enables millions to use the internet in privacy, including me. +Tor is an acronym for The Onion Router. Tor is free software that enables anonymous communication. The [Tor Project](https://www.torproject.org/), a non-profit 501c3 organization, is primarily responsible for maintaining Tor. It has been funded by human rights organizations, the US government, the national science foundation, NGOs and thousands of individual sponsors. It enables millions to use the internet in privacy, including me. # Why I Always Use Tor I use Tor for nearly everything. I use it for browsing the Web, sending and retrieving emails and files, SSH, Git, Atom/RSS, and updating system packages. When I'm trying out a new application, I immediately check if it can be used safely over Tor. -Of course the normies are confused why I use Tor. They assume I must have something to hide because they basically have no understanding of the right to privacy at all. I'm not even going to bother addressing them because PRATT[2]. +Of course the normies are confused why I use Tor. They assume I must have something to hide because they basically have no understanding of the right to privacy at all. I'm not even going to bother addressing them because [PRATT](https://rationalwiki.org/wiki/Point_refuted_a_thousand_times). What befuddles me isn't the normies. It's those in the privacy community who are shocked when I say I use Tor for everything. I've found others use it mostly for strictly sensitive transmissions. But I argue that you should always use it, whether or not you're doing anything sensitive. @@ -26,7 +25,7 @@ Personally, I've been using Tor for so long that I don't even mind the slowness # Be Careful When Using Tor With that said, you need to be careful how you use Tor. Tor cannot protect you if you use it wrong. If you use Tor for applications that don't have explicit Tor support, be wary of IP address leakage. Only trust Tor running on machines you control and don't blindly route all traffic on your network or computer over Tor. VPNs are better for that sort of thing. -Be aware that Tor is not a panacea. It has serious drawbacks.[3] To mitigate Tor's drawbacks, at least use it over a trusted VPN or bridge relay. Despite all the drawbacks, it's still the best piece of anonymity software available, for now. +Be aware that [Tor is not a panacea](https://restoreprivacy.com/tor/). It has serious drawbacks. To mitigate Tor's drawbacks, at least use it over a trusted VPN or bridge relay. Despite all the drawbacks, it's still the best piece of anonymity software available, for now. # The Internet is Broken In the future, we don't just need stronger anonymity networks. We need a new network stack. The existing stack was formalized a long time ago when security and privacy were not a concern. @@ -39,18 +38,9 @@ So, predictably, the physical layer, Ethernet, IP/BGP, TCP/UDP, DNS/X.509, and a * IP lacks encryption and there aren't sufficient IPv4 addresses * HTTP leaks metadata, and the web is a bloated privacy disaster -And I'm not even scratching the surface.[4] +And [I'm not even scratching the surface](https://youbroketheinternet.org/). # GNUnet -GNUnet[5] is a modern alternative network stack that seems to address the problems of the piss poor stack we're all forced to use today, although honestly I haven't done enough research on it. It's in heavy development without a stable release, but I'm optimistic. +[GNUnet](https://www.gnunet.org/) is a modern alternative network stack that seems to address the problems of the piss poor stack we're all forced to use today, although honestly I haven't done enough research on it. It's in heavy development without a stable release, but I'm optimistic. -Ideally, something like GNUnet will fully replace the existing network stack so we can have real privacy, by default. But until then, a VPN + Tor is your best chance. So use it! And help out by hosting a relay[6] if you can. - - -Link(s): -[1: Tor Project](https://www.torproject.org/) -[2: PRATT](https://rationalwiki.org/wiki/Point_refuted_a_thousand_times) -[3: Tor Drawbacks](https://restoreprivacy.com/tor/) -[4: You Broke The Internet](https://youbroketheinternet.org/) -[5: GNUnet](https://www.gnunet.org/) -[6: Tor Relays](https://community.torproject.org/relay/) +Ideally, something like GNUnet will fully replace the existing network stack so we can have real privacy, by default. But until then, a VPN + Tor is your best chance. So use it! And help out by [hosting a relay](https://community.torproject.org/relay/) if you can. |