this post was submitted on 04 Dec 2021
3 points (63.6% liked)
Privacy Guides
1511 readers
1 users here now
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
The original post
Well Tor has its limits but given the resourcefulness of this attacker, they're probably someone who has/wants access to a lot of traffic even if it does not go through the tor network :)
If you use TOR in the OpenWeb, go to browserleaks and you'll see, that it isn't more private as any othher privacy focused browser with some extensions, only slower. The only proposit of TOR is the capability to access the .onion, but even this don't protect you, when you use TOR there without a VPN.
I don't understand your point. TBB is specifically hardened against leaks (that's why WebRTC is entirely disabled for example) and fingerprinting. What kind of leaks exactly are you suggesting?
If you mean that using any random browser (eg. Chrome/Firefox) over Tor is insecure, we agree. That's why we have Tor Browser in the first place, and that's literally one of the first things taught in privacy workshops.
Have you tested it in Browserleaks? There you will see, how private is the browser. Apart it don't serve me if the browser blocks trackers and fingerprints, when the Browser itself do it, also Firefox, which send data to Alphabet.Inc, NEST and Google.