Tor browser

Brot's Avatar
  • Brot
  • 06-29-2014, 04:52 PM
Wondering if by having multiple browsers open while viewing eccie through a Tor browser what if any information or sharing occurs between browsers?
jframe2's Avatar
Basically, the answer is yes, you can have a Tor Browser and another browser open at the same time.

But keep in mind to....
- have a unique browser per each identity you want to be kept separate, keep anything remotely related to an identity within the right browser.
- don't accidentally copy and paste a URL / search term / email into the wrong browser.

There is lots of tech info on this subject if you want to go full blown techie. A Net search will give you lot of reading.
DangedDragon's Avatar
Brot, If I'm understanding your question correctly, you are asking if when you are using TOR, if it shares information with other browsers like IE, Firefox, Chrome, etc...

The answer to that is no.

What JFrame2 is saying is correct, also. You can have TOR in several different folders and each copy is completely independent of the others, but keeping them separate is tough, unless you are really good at remembering which window is for what purpose.

When I'm trying to keep my footprint to a minimum, I use a VPN, work in an incognito window of Chrome or Firefox, and then cleanup with CCleaner after I'm finished. TOR is more secure and private, but you lose some of the functionality of other browsers.
mike.anthony1983's Avatar
Tor is not safer, nor more private than a good VPN. A good VPN builds an encrypted tunnel between you and the other end; all data being passed through your ISP as well is encrypted so you don't have to worry there either. Your data is secure, your passwords and other pieces of identification are secure. What the website you log into chooses to do with your data is another matter, but you've done your part, you've done what you can.

Tor uses a network of nodes to route and reroute your queries, and it has been said many a times in guides for Tor beginners that no data submitted through Tor is safe from prying eyes. If you just go to say... 4chan and post anonymously it wouldn't be easy to track it to you because it will have gone through a network of tor nodes, but if you use Tor to log into sensitive sites such as web email, ECCIE, P411, heck. You don't know who has access to the nodes your data is being passed through. Keep all personal information off Tor at all times.
I think that TOR does often provide additional security benefits over many VPNs. Many VPNs keep records and logs that TOR does not. Also, VPNs often are not designed for anonymity but instead are often designed to bring in a known user into a trusted computing environment. VPNs often cost and the payment stream creates additional records. VPNs and TOR both have very nice security features but they are not equivalent.
mike.anthony1983's Avatar
Can you vouch for all the integrity of all the relay and exit nodes your data will travel through? And what if said nodes are in control of LE and/or companies that datamine, or criminals wanting to collect personal information such as SSNs, CCs, etc. Lets say your end website requires you to put in your first and last name; if you do it doesn't matter if your data went through 5 nodes or 500, it'll still be your name should any of those nodes be compromised.

Your functional definition of a VPN is correct but outdated, VPNs are now often used by people engaging in multimedia piracy and there are a lot of VPNs now that are tailor made to fit that requirement. In this case, if your ISP is adamant on keeping tabs on you, they might know you've communicated with ECCIE, but they won't know what you did while you were there. The easiest solution is to pay for a VPN that does not maintain logs, for a measly $3 a month. Google and you'll find a good comparison of VPNs out there.

I use TOR frequently as well, but only when I don't want anyone to know who I am, not the end server, not my ISP, not the nodes in between.
I use TOR frequently as well, but only when I don't want anyone to know who I am, not the end server, not my ISP, not the nodes in between.[/QUOTE]

One of my points exactly but much better said!! And not at all like VPNs.
Right now I would be cautious using the Tor network. Sometime back I noticed that when using it I would always go through the same node in Iceland. It didn't matter what I was doing or when, the same IP address would show up. This should not occur using the Tor network.

If you research how Silk Road was rolled up by the Feds, you will see they knew when Dredge Roberts was online even though he was using the Tor network. But no where in the disclosures have they said how.

I have done research on non-public data in which I have access and determined that the Feds do have cooperation from the Icelandic government in a lot of their endeavors.

Use this information as you want, but I don't have the warm & fuzzy about the Tor network.
jframe2's Avatar
I believe that Iceland shows up a lot is that they are the location of several major communication cables that head out toward Europe.

Anyone remember the closet that the NSA took over in California inside the building that serviced the Pacific cable structure? It was frickin' ingenious; installed all their equipment in a maintenance closet inside the building and the owners/companies never even knew until they were found out by an employee with a key to the closet.
mike.anthony1983's Avatar
It's astonishing how complacent the population is in the face of such blatant disregard for civil liberties and privacies. Any outcry is mostly limited to some watchdog groups and mainly people in the tech industry; no one else seems to care. Maybe it's because there aren't many articles explaining all the Snowden leaks in black-and-white layman terms? Either way, it's sickening, and it won't stop.
jframe2's Avatar
.... Maybe it's because there aren't many articles explaining all the Snowden leaks in black-and-white layman terms? Either way, it's sickening, and it won't stop. Originally Posted by mike.anthony1983
I disagree, I think there are many articles that have done a good job of explaining Snowden's exposures in a way that is understood by the layman.

I believe people are Sheeple and lazy. They don't want to do any research or additional reading beyond the 5 sentences on the highlights page of whatever home page they use.