Should I download other stuff for it like a vpn? I’m not planning on going super deep into the dark web or anything. But if I were to. What would I do?
I know nothing about TOR except that you shouldn’t use a VPN with it.
Should I just download TOR and start using it.
Not what you want to hear friend, but you really need to lean the process of verifying downloads before heading into this space. I know that 95% of TOR users never do the verify step, but honestly these downloads and stuff on the DW are some of the most radioactive binaries imaginable. How so few people seem to run GPG checks on this stuff is beyond me.
Yes. You can just use it.
So many people are saying so many different things lol who do we believe
Don’t download tor on your machine, download it on a remote server (linux) then do a ssh tunneling from your machine to remote server leave the session open
Switch your network proxy to socks5 on your machine and browse locally via a ssh tunnel
Tor is designed to be safe to use as it is, so you can just download it and use it. It’s just another browser. If you already use a VPN in any case, you don’t have to disable it when you use Tor, but Tor does not require a VPN to be safe. Once you get more familiar with things and understand your own threat model, you can start adapting your setup, driven by actual individual need.
Rules!
1, - Dont use VPN services with tor because every VPN Provider collect your data!
2,- Set everything to the safest! DISABLE JAVASCRIPT ( Type in the searchbar about:config then type javascript) A lot of people dont know this, but even when you set to the safest the javascript is still enabled.
3., Type in the searchbar about:config then search mp4 and set disable.
4., Never ever open the browser fullscreen it tells a lot of information about your device!
5, Dont visit Underage content and never ever download/upload stuff and dont click suspicious links it can be a malware etc )
-
Never ever give information about you or your closest. Like age, location, name, nationality. AND DONT say good night good morning etc.
-
Dont use google, bing, etc searchengines because every stuff that you search is automaticly send to their servers.
-
I recommended to use VirtualMachine and install Linux. Because Microsoft still collect information about you!
THATS IT
That’s overhyped. You can use Tor with a VPN, but it’s unnecessary.
If the government had a way to hack Tor that involved your ISP, such as a timing correlation, it would be easier for them to hack Tor VPN users because there are less VPNs than ISPs.
Without any added security?
It’s because there isn’t one correct answer to what every person should do. The frustrating advice is that you shouldn’t look for strangers on the internet to “believe”, you need to do your own research and understand your own requirements, which are not the same as everyone else’s. It’s frustrating advice because it’s not as easy for everyone. Good luck.
Nonsense. That does not give you any additional security as it wouldn’t even hide your Tor usage from your ISP (as this can be done with bridges). Tor on the machine is enough and this is definitely about the Tor Browser, not the unix software.
Worst advice ive seen on this sub in a long time
If you’d do it like that every single browser tab would use the same 3 relays and you would be trackable with your browser data
Also MUCH easier to tie a VPN session to a particular user than to back-solve and predict what ISP or hotspot they will be on at any point in time. Gov’t is unlikely to get a warrant to all public hotspots in Seattle, but could easily get a warrant for your VPN records. Once they have your ISP/VPN records they can prove when you were on TOR.
Most jurors are dumb enough to think that if something happened on TOR at 3:00pm and you happened to be on TOR at 3:00pm, then that must be proof that you did that thing.
Use Tor Browser, don’t connect your normal browser to Tor unless you know what you’re doing.
What’s your worry?
Most people in developed countries do not need to hide Tor from their ISPs.
Sadly, this is the best i know, though I never claimed that ISP wouldn’t know shit if you use this method. If you know any other means/methods do share.
can tails help though
If that’s the case how does each tab uses a different relay if you use tor browser directly on the pc instead of a remote one, wouldn’tthe whole tor browser session use a single relay? Could you please elaborate?