Tor is an effective censorship circumvention tool allowing its users to reach blocked destinations or content. People use Tor to work online on sites if they are blocked by their local Internet provider.
It’s hidden service helps users to post or work on the internet without leaking their real address.
Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGO) use Tor to allow their workers to connect to their home website, while they’re in a foreign country without notifying everybody nearby that they’re working with that organization.
Most of the applications of Tor are the same as that of VPN or Proxy. But still we need Tor for more vast and advance reasons. The mechanism of Tor is that it helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you. And then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it’s going.
So Android users can use orbot which has the ability to torify the traffic on your Android device.
Other Flaws- The WebRTC Leak:
The things we have learned until now won’t help you in your target. So you should know about the security flaws and side-effects of it. At least you should achieve the result of what you have cared about. I think you people got to know that the main thing to achieve is to successfully hide your address (or the IP address). But if you find that after using those VPN and proxy servers, websites are still getting your real address. And thus they are able to locate you.
It happens when all of your network traffic is not going through your VPN/proxy server. They are actually getting leaked by your browser and ultimately to the website. This thing is done by one famous project, known as WebRTC. And the flaw is known as WebRTC leak. You can also check that if your browser is leaking your Local And Public IP address by visiting this link (ipleak.net).
After using VPN/Proxy server if you find that your IP address is different from that in WebRTC detection, then get to know that your Browser is leaking your IP.
Most browsers having built-in WebRTC (Chrome, Opera and Firefox) cannot directly block WebRTC (and the IP leak). So, in such cases VPN and VPN extensions won’t work.
But such browsers also have an extension to block/control WebRTC from leaking your Address. For Chrome, it is WebRTC leak Prevent, and for Opera Mini you can also use WebRTC leak Prevent and for Mozilla use Disable WebRTC.
For Tor browser, I don’t think you need to do that. There are few other Browsers with greater privacy and security. Though such browsers are based on Chrome and Mozilla environment, but are much more secure and light. One such example to Mozzila alternative is CometBird, and for Chrome alternative, you can get an Epic Privacy browser or SRWare Iron browser.
You can see how it shows on “CometBird“, when you check for your IP leak.
If you liked the article, don’t forget to share it with your friends and leave a comment below!