If you downloaded a document and opened it, the PDF or Microsoft Word file could contain resources that are downloaded outside of Tor, which would reveal your IP address.Īnother aspect of using Tor that you should be prepared for is a decrease in performance browsing the Web. If you setup the application to use Tor, it would still send out your IP address as it makes a direct connection to get the file. For example, let’s say you were downloading a movie using a torrent file-sharing application. Unfortunately, some activities with the Tor network can reveal your identity. Any chat or instant messaging application that uses Tor is likewise made anonymous. Because communication between your browser and the site you’re visiting are bounced across different servers, the site can’t see where your request to view a page originated. John Sammons, Michael Cross, in The Basics of Cyber Safety, 2017 TorĪs we discussed in Chapter 7, Finding a job online, using the Tor browser ( you can browse, chat, and send instant messages anonymously.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |