What’s Tor?

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.
Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.
Tails - Live CD/USB OS to use Tor

What’s Tails?

No doubt, Tails is the best and most secure supplement to Tor. It’s a Linux based live operating system that can work on any computer. The Tails OS can be booted from pretty much any removable device like a DVD, USB or SD card. The main benefit of Tails is that it has built-in pre-configured applications that provide a web browser, IM client, email client, office suite, image and sound editor and other applications. Tails do use the Tor network by routing all internet connections through Tor, but Tails provides excellent additional security and may serve to keep you anonymous where Tor might otherwise have been compromised. The main benefit is the fact that even if you are caught, it leaves no evidence: Use anywhere but leave no trace.

Using Tails on a computer doesn’t alter or depend on the operating system installed on it. So you can use it in the same way on your computer, a friend’s or one at your local library. After shutting down Tails, the computer can start again on its usual operating system.

Read:  How To Freeze Your Last Seen On WhatsApp

Tails is configured with special care to not use the computer’s hard-disks, even if there is some swap space on them. The only storage space used by Tails is the RAM, which is automatically erased when the computer shuts down. So you won’t leave any trace neither of the Tails system nor of what you did on the computer. That’s why it is called “amnesic“.

This allows you to work on sensitive documents on any computer and protect you from data recovery after shutdown. Of course, you can still explicitly save some documents to another USB or external hard-disk and take them away for future use.

Tor Alternatives

I2P

I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate.

Read:  How To Easily Turn Off Apps Notifications In Android

Psiphon

Psiphon is committed to an open and accessible Internet. Psiphon Open Source is a stand-alone version of Psiphon software.

TunnelBear

Really simple VPN to browse the web privately & anonymously. Unblock websites around the world with applications for Mac, PC, iOS, etc.

Freenet

Freenet is free software which lets you anonymously share files, browse and publish “free sites”

Subgraph OS

Subgraph OS is fairly similar to Tails, meaning that it utilizes Tor but with a focus on security and usability, “Subgraph OS is designed to be difficult to attack. This is accomplished through system hardening and a proactive, ongoing focus on security and attack resistance. Subgraph OS also places emphasis on the integrity of installable software packages.” There are several layers between Subgraph OS and Tor such as a Metaproxy, firewall and hardened kernel.

Hola VPN

Hola gives you the freedom to browse the web without censorship and to watch videos with less buffering and faster start time.

Add comment

Your email address will not be published. Required fields are marked *

Newsletter

Enter your email address to subscribe to Brainslodge and receive notifications of new posts by email
Don't worry, no SPAM!