Custom Search

Cyber Security:

TOR stands for The Onion Router.

The TOR Browser is a web browser designed to maximise the user's security against attacks on the communications between the user and the wider Internet.

Like Chrome, Firefox, or Safari - it is a free software program that you download onto your computer that conceals your IP address every time you go online anonymously. This free process is layered with heavy-duty encryption, which means your data is layered with security and privacy protection.

It is a protocol where the user's traffic is encrypted and routed through three random TOR relays that could be anywhere in the world, and these relays are changed every few minutes.

The third TOR relay then sends the traffic as normal HTTPS traffic without revealing the original source.

TOR can offer security over public wi-fi.

An attacker monitoring wi-fi can detect you are using TOR, but that is all.

You can use the TOR browser to access secure sites over public wi-fi.

In fact, using random public wi-fi sites and the TOR browser is one of the safest ways for a journalist to send communications in a hostile environment.

By using TOR browser to access ProtonMail and send or receive an encrypted email, an attacker won't be able to see that you are using ProtonMail to send and receive messages.

When using TOR, you should keep the following points in mind:

only download the TOR browser from: https://www.torproject.org/

don't add any 'addons' to this browser - they may break the security

don't use a VPN as well as TOR as this may also break some aspects of security.