362
Tor’s shadowy reputation will only end if we all use it | Engadget
(www.engadget.com)
A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.
Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.
Subcommunities on Beehaw:
This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.
Are you confusing Tor and something like deep/dark web? Because Tor itself is just a webbrowser, it's basically a Firefox with some modifications for stricter privacy.
There's a TOR browser, but calling tor "just a browser" is really odd and not really correct. The TOR project is the routing protocol that bounces your traffic around. You can do so through the TOR browser, but the browser isn't TOR. It also isn't the only way to use TOR.
Also, while HTTPS is close to universal now, it's still possible to use HTTP and theoretically a malicious exit node could modify any unencrypted traffic.
Thank you for clarification! Of course I meant the TOR browser client itself, should have been more precise.
Possibly, I know Tor is a browser but because it can be used to access deep/dark web I don't trust myself with it. 100% out of acknowledged ignorance yes
I promise you that like 90% of the creepy stories you've heard are people either exaggerating or just straight-up lying to sound cool on the internet. The kind of stuff that actually needs to operate over the TOR network doesn't exactly want to be easily discoverable by normal people.
You're no more likely to accidentally stumble across illegal / dangerous content while using TOR than you are while using any other browser.
Isn't the problem was that back then everyone used to be a node (was it exit node?), but I heard today it's not the case anymore so no one can actually link you to other bad things other people do.
To simply use TOR you do not need to run any kind of guard/middle/exit relay (this has always been the case), but yes there is the risk of being held accountable for other users data while hosting an exit relay.
This hasn't gone away thanks to any legal precedent as far as I'm aware, so I imagine it all depends on the tech literacy of your local jurisdiction & how good of a lawyer you can afford.
Thanks for the correction.
Thanks for the advice! I'll keep in mind.
As long as you stay off of any .onion sites, there won't be any difference w.r.t. dark/deep web access. If a domain doesn't end in .onion, then it can be accessed with a regular web browser anyway.