In this second part we will be seeing how to configure the TOR browser so that we can maximise the security to the fullest. Further on we will also have a look at how we can integrate VPN’s to enhance our aim. So, without further adieu, let’s dive straight into it.
To bend the settings to our will we will be heading towards the much deeper configurations. To do so, in the search bar type : about:config , and click on the Accept the Risk and Continue button.
You will be redirected to a page with numerous configurations. One by one we will change the notable few to improve our experience.
In the search bar type : javascript.enabled, and by double clicking on the configuration change it from True to False.
Next search for : network.http.send, and by double clicking on the network.http.sendRefererHeader change the value from 2 to 0.
(Referer is the page you are coming from)
Now your TOR is configured with the new settings, making your browsing experience even more safer than before!
To check the results of our steps, search for anything, in this case I have searched - OWASP:
Due to our settings, our I.P address is now unavailable to anyone who might be wanna tracking us.
We have now configured TOR individually as we preferred. Now integrating our configured TOR with a VPN ensures much secure conditions:
VPN:
TOR in itself does a very good job of providing anonymity to the user. But combining it with a Virtual Private Network increases the results ten-fold!
Adding a VPN has many advantages namely:
It has multiple layers of encryption.
Even if the TOR network is compromised, your real IP will remain hidden.
Some sites can only be accessed via VPN. Also the ISP won't be able to track your movements.
At the same time, keep in mind the few disadvantages of using VPN:
Some VPN’s, especially the free ones, keep logs of your activity, making you anonymous to the outside world, but at the same time defenceless against the VPN service providers.
Using VPN over an already maximised security wise TOR browser will slow your browsing experience significantly.
There are two methods of using VPN with TOR:
VPN over TOR:
Via this method, your device first connects to a VPN server, which encrypts your movements. Then, this encrypted traffic goes through the TOR network, before it reaches the internet. This method provides better security.
TOR over VPN:
Via this method, the device enters the TOR network first, and the data is encrypted by VPN after you enter and before you leave TOR. This method provides better anonymity.
In summary, using VPN or TOR individually has some demerits. But the combined usage of both defies expectations! This is how we scale the TOR experience to the fullest. But wait! There’s one more thing to this - One last method to ensure the BEST secure connection ever. In the next and final part, we’ll be looking at how to use TOR with an entirely different Operating System, raising the anonymity to a mind-boggling level!
1 Comments
TOR over VPN over ORBOT ?
ReplyDelete