In the wake of the press stories about government surveillance, many, including me, have pointed to tools such as Tor to protect anonymity.
But I wanted to add a note of caution for those seeking a truly private way to access the Internet without anyone being able to monitor your browsing and trace it back to you.
Tor has several important limitations. You should be aware of them before you rely too heavily upon it.
If you are unfamiliar with Tor you can find a good explanation of how it works here. Basically when you use the Tor network your data is routed via several randomly selected relays until it exits and one of a few thousand exit nodes. From the point at which your data emerges onto the open Internet (from an exit node) it can be traced. Theoretically tracing back to you via the intervening relays should be impossible. But, implementation can affect what is theoretically secure.
SOURCE: profwoodward.org
Most Commented Posts
2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Experts Insight On US Pipeline Shut After Cyberattack
Most Active Commenters
Recent Comments
“Cybersecurity Awareness Month’s new evergreen theme "Secure Our World” is…
“Avoid storing data on personal devices: A crucial but often overlooked…
“I recommend a new nuance to passwords that isn’t often…
“In my role overseeing cloud environments and incident response, I'm…
“Cybersecurity Awareness Month serves as a reminder to confront the…