Browser Security: Tor
The Tor Security Bundle is probably the best-known of the software products we’ll discuss today. The Tor browser is easy to install and set up; it’s based on Firefox 31.5.0, but as the program warns, simply using Tor isn’t enough to secure your Internet browsing. If you want to remain anonymous on the Tor network, you’ll need to also do the following:- No torrenting (at least, not unless you also have a VPN that supports torrenting, and have configured the torrent client of your choice appropriately).
- Don’t install or enable browser plugins.
- Use the HTTPS version of websites whenever possible.
- Don’t download or open downloaded documents while online (more on how to avoid the security risks associated with this behavior later in this story).
- If you want to hide the fact that you’re using Tor, in addition to hiding your Internet traffic, consider the use of bridge relays.
Make your choice, and the system finishes installing what looks like a standard version of Firefox with a few custom scripts and configuration options.
One caveat about using Tor for anonymous browsing is that the performance isn’t going to be what you’re used to from a standard connection. Tor uses multiple levels of encryption to hide destination IPs, and routes the information randomly across its own network to defeat spying. This helps prevent certain kinds of packet tracking, but it also introduces some substantial performance penalties.
The fact that Tor routing is randomized makes it tricky to estimate the performance impact of using it, but we ran a series of webpage loading tests anyway. Treat these as a useful ballpark rather than the final word. Page caches were cleared before the load tests for both standard Firefox (36.0.1) and the Tor Browser’s version (31.5.0).