Tor As Fast As Possible
Techquickie
·Techquickie
·2016-05-06
·
1,068 words · ~5 min read
0:00
Who would have thought that one of the best ways to preserve your privacy would
0:04
be to hide behind an onion? And no, I'm
0:08
of course not talking about growing a literal massive onion and standing
0:11
behind it hoping that the smell will keep everyone else at bay. Today's
0:16
episode is all about the onion router, better known as tour. used by dissident,
0:22
uh, cyber criminals, and even ordinary folks the world over to keep their
0:27
online activities away from the prying eyes of governments, advertisers,
0:33
stalkers, or maybe even me. Dang it. But
0:36
how does it work? Why is it considered so secure? And does it have any
0:41
weaknesses? We touched on tour in our
0:44
video about the deep web and the dark web, which you can check out here, but
0:49
we're going to dive into it in a little bit more detail. Tour tries to anonymize
0:54
your online activity by encasing your
0:58
traffic in multiple layers of encryption, then sending it through a
1:02
number of nodes that peel back those layers one at a time, hence the onion
1:08
nickname. Each node only decrypts enough
1:11
information in the packet to know where to send it next. So none of the nodes
1:16
know both your identity and the identity
1:19
of whatever website or server you are trying to connect to. This high level of
1:24
encryption and repeated bouncing of network traffic makes tour quite secure,
1:30
but it isn't entirely foolproof. At some
1:33
point, your data has to leave the tour
1:36
network to get to wherever it's going through something called an exit node.
1:41
The very last tour node that your data travels through. And when your data
1:45
leaves an exit node and is sent to its destination, it is no longer necessarily
1:50
encrypted. While it's very difficult still for the recipient to tell that
1:55
it's you connecting, any unencrypted
1:58
personal information can be read by both the operator of the exit node and
2:03
whatever site it is that you're connecting to. In fact, a team of
2:07
researchers several years ago harvested a bunch of unencrypted email addresses
2:12
and passwords in this manner even though they were sent over tour. The fact that
2:17
anyone can run an exit node also means that you don't know who could be looking
2:22
at your information on the other end. To alleviate this problem somewhat, the Tor
2:27
Foundation provides the tour browser for free, which is a modified version of
2:32
Firefox that, among other things, attempts to use the encrypted HTTPS
2:38
standard instead of regular HTTP for as
2:42
much web activity as possible and also
2:45
disable certain plugins that can leak your IP address. Many plugins and other
2:51
applications for that matter won't run over the tour network by default and can
2:57
thereby give away your identity even if
3:00
your other traffic your normal web browsing traffic is going through tour.
3:04
It is possible to force other applications to use the tour network
3:10
either by manually configuring them or using programs like tallow that do it
3:14
for you. But since any unencrypted information that you send or receive can
3:19
still be seen by exit nodes, some users have tried using virtual private
3:24
networks or VPNs, which you can learn more about here, by the way, in
3:28
conjunction with Torah to create an encrypted tunnel at every point of the
3:33
connection. Not a bad solution as long as you can trust your VPN provider not
3:37
to keep tabs on you. Of course though, the best idea is not to send anything
3:43
personally identifying over tour or anywhere if you can help it. Tour also
3:49
has the limitation of being a rather slow network. So it might not be too
3:54
useful for downloading large amounts of
3:57
you know stuff uh streaming in 4K or using Bit Torrent especially the latter
4:02
as the Bit Torrent protocol can broadcast your IP address if you aren't
4:06
careful. Nevertheless though, tour is still a great help to activists, uh,
4:12
victims of crime and people who are just plain concerned about preserving
4:17
personal privacy in an age where it feels like we can always be watched. Tor
4:23
may not be perfect, but it is a good first line of defense against aggressive
4:28
advertisers, shady government shenanigans, or, you know, Skynet.
4:33
Speaking of online security, Tunnel BearVPN lets you tunnel to 20 different
4:39
countries, allowing you to browse the internet and use online services as
4:43
though you were in that different country. And of course, if you clicked
4:47
on the explanation of VPNs that I referred to earlier in this video, you
4:51
would already know that. Aha. They have easy to use apps for iOS, Android, PC,
4:56
and Mac. They also have a Chrome extension. You just choose the country
5:00
that you want. You click the little virtual button and boom, your little
5:04
bear tunnels over to wherever it happens that you want to be tunneling through.
5:09
When you turn on tunnel bear, your connection gets encrypted and your public IP address gets switched so that
5:14
you can show up as though you were in a different country, letting you bypass
5:19
stupid things like geographical region
5:22
restrictions. Super thumbs up. It's also easy to use. You don't have to do any of
5:26
that, you know, port configuration and DNS or blah blah, etc. nonsense. It's so
5:31
easy that your mom could use it and they have a top-rated privacy policy and do
5:35
not log their users's activity. So, you can actually try out Tunnel Bear for
5:39
free with 500 megs of data included. And
5:42
you can save 10% on your unlimited package, which only costs a few bucks a
5:46
month by heading over to tunnelbear.com/Linus linked in the video description. So,
5:51
thanks for watching, guys. If you like this video, hit the like button. If you
5:55
disliked it, hit the dislike button. If you want to check out our other
5:58
channels, hey, go ahead and do that. We've got Channel Super Fun, which we've
6:01
had some pretty rocking videos on lately. Maybe we've got one over there to show you. If you have suggestions for
6:05
future fastest possibles, leave them in a comment below the video. And as always, don't forget to subscribe and
6:09
follow and all that good stuff so you don't miss any other tech quickies.