Learn about what the Tor browser bundle is and how you can use it to browse the Internet safely.
Henry and Grace are journalists in a Kampala suburb who mantain a blog on which they anonymously publicise corruption practices and campaign for political change.
The authorities in Uganda have not been able to shut down their website, because it is hosted in another country, but they have often tried to learn the identity of the blog's administrators from other journalists.
Henry and Grace are concerned that the authorities may be able to monitor their updates and learn who they are.
In addition,they want to prepare for when the government eventually filters their website so that they can continue updating it and also provide good circumvention advice to readers all over the country who would otherwise lose access to the blog.
Your government and hackers around the world are increasingly interested in knowing exactly what you’re up to when you browse the web. This may present a serious risk to journalists and human rights defenders looking to access information, protect their sources, and communicate securely.
The Tor Browser is a service that provides both privacy and anonymity online by masking who you are and where you are connecting. The service also protects you from the Tor network itself.
For people who might need occasional anonymity and privacy when accessing websites, Tor Browser provides a quick and easy way to use the Tor network.
Tor can also be useful as a secure means of circumventing electronic restrictions so that you may access or publish blogs and news reports.
Tor protects your anonymity by routing communications through a distributed network of servers run by volunteers from all over the world.
Using Tor hides the sites you visit from potential onlookers, and hides your location/identity from those sites.
Tor also takes steps to encrypt the communication to and through its network, but this measure can not extend all the way to a website which is sending or receiving content over non-encrypted channels (i.e. not providing https access).
Nevertheless, the advantage of using Tor when accessing such sites is that Tor can secure your communication up to the step between the last of the Tor servers and the non-secure site. This confines the chance to intercept the content to that last step.
The Tor Browser Bundle consists of the Tor software and a modified version of the Firefox web browser, which is designed to provide extra protection while using it. The browser bundle also includes NoScript and HTTPS-Everywhere add-ons.
For instructions on installing the Tor Browser Bundle, refer to the detailed guide Tactical Tech has put together
Note: There is a trade-off between anonymity and speed. Because Tor facilitates anonymous browsing by bouncing your traffic through volunteers' computers and servers in various parts of the world, it will definitely be slower than using other web browsers on your computer.
- Bridge Relay: A Bridge Relay is a Tor server that is not publicly announced. If you choose to use a bridge, the server can provide you with access to the Tor network even if Tor is blocked in your country.
- Port: In this chapter, a port is an access point through which software communicates with services running on other networked computers. If a URL, such as www.google.com, gives you the 'street address' of a service, then the port tells you which 'door' to use once you reach the correct destination.
http://mail.google.com) and port 443 for secured ones (https://mail.google.com).
- Proxy: A proxy is a software intermediary that runs on your computer, on your local network, or somewhere else on the Internet, that helps to relay your communication toward its final destination.
- Route: A route is the communication path on the Internet between your computer and the destination server.
What is gitbook used for?
Is it quiz?
- en/topics/understand-2-security/0-getting-started/1-1-intro.md: Getting started with your Security -/en/topics/understand-4-digisec/0-getting-started/1-1-intro.md: Getting started with Digital Security -/en/topics/practice-6-managing-website/1-down-site/1-1-intro.md: Reasons your website might be down