![]() ![]() do not download torrents on the Tor network, as it will increase the load on the network.This compromise the your real IP address. ![]() In such files can be embedded macros that have requested access to the Internet directly from the program, bypassing the Tor network. do not open the documents (eg, PDF and DOC) while you are online.All the necessary plug-ins are already installed for anonymity. do not install additional plug-ins, as it is likely to install a plugin that will give your actual location.Below is a screenshot from the official website. Do not download Tor Browser on third-party sites.īy the way Tor Browser is made based on the Mozilla Firefox browser, since it is the only browser able to work independently with Socks connection without an operating system.Īfter installing Tor Browser is fully operational. For example, the site (added the letter S at the end) is trying to install on your computer a trojan. You also shouldn't expect to be safe unplugging the computer while you open it unless you're sure that whatever code you executed won't start up again later.If you do not know what is this Tor Browser then read article what is a Tor network.ĭownload Tor Browser only from the official site .īe careful! There are sites that mimic the Tor Project website. Consumer AV software (and honestly most enterprise IDS software) is generally only able to catch simple variations of already logged malware, or very obviously (to a computer) malicious combinations of sys or library calls. More generally, don't trust antivirus scans to be anything except a second line of defense. I wouldn't even be comfortable opening up a regular PDF/DOCX file because it'd be hard to be sure there wasn't some documented feature I'm unaware of where those file formats autoload external content, nevermind a zeroday. Generally you can assume that unless you're using tails or a VM/Router that is proxying all traffic, anything that executes code as your local user is going to be able to "curl and give you up that way. If you're asking if opening the file will compromise your anonymity, then that depends on the filetype and your setup. The fact that a file was downloaded with TOR doesn't really have much relevance to whether or not it's technically safe to open, except maybe that it might be "more likely" to be malware. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |