RE: The Tor browser
June 17, 2019 at 2:47 am
(This post was last modified: June 17, 2019 at 2:50 am by FlatAssembler.)
(June 16, 2019 at 5:50 pm)Aegon Wrote:(June 16, 2019 at 8:29 am)FlatAssembler Wrote: You think you have nothing to hide. So had the people who had their identity stolen been thinking... until that happened. "If you have nothing to hide, you have nothing to worry about." is one of the most dangerous ways of thinking. And, by the way, I am not much interested in the pornography on the Internet.
What I care about most is, for example, what if mainstream search engines stop indexing HRCAK (the biggest Croatian on-line archive of the academic journals) in response to the Article 11? Or what if HRCAK itself becomes illegal due to Article 13, along with all the similar services? Then circumventing the censorship becomes a necessity in order to do any kind of research on-line. And what if all the large blogging services decide to censor all the anti-government content (as they are pretty much doing already), and the small blogging services can't afford to operate in the European Union due to Article 13? Then, in order to get any kind of unbiased picture about current events, you need to circumvent the censorship. And so on...
Until banks and other companies that house sensitive info start securing their shit better, I doubt using Tor can protect you from identity theft.
Tor makes it more safe to browse HTTPS websites. Somewhat counter-intuitively, browsing HTTP websites using TOR is less secure because the exit nodes are required by the laws to log their data in some countries. So, unless your bank doesn't use HTTPS, using TOR is more secure.
(June 16, 2019 at 11:10 pm)Abaddon_ire Wrote: Simply using Tor puts you on a list.
A wise man told me many years ago "Do not raise your head above the parapet, do not attract attention. You don't want it."
Using Tor is exactly raising your head above the parapet. It is writing a number on your own back and a target on your chest.
Assuming your ISP knows you are using TOR, yes. That's extraordinarily unlikely to happen if you set it up properly for suspicious ISPs, making Tor use meek-azure or obfs4 protocol is enough (and usually more than enough).