This article re -edited the "What is TOR browser? How did you produce" published in the "Cyber Security Information Bureau" provided by Canon Marketing Japan?
TOR browser is often taken up as a means of browsing the dark web, but it is not well known that it was developed to ensure the freedom of communication as a source.In this article, we will also explain how the TOR browser was developed and its mechanism, and the danger that could occur during use.
TOR (Toa) browser is an open source software aimed at browsing the website while ensuring anonymity.The company aims to avoid Internet censorship in some countries and regions and to protect privacy.Like a general web browser, it can be installed on a personal computer or on an Android smartphone.
On the other hand, TOR browser is also known as a way to browse the dark web.The dark web refers to a website that does not access from a regular search engine and requires a dedicated tool.Due to its high anonymity, the dark web has been dealing with highly illegal information and goods such as child pornography, drugs, and stolen personal information.In addition, it is said that crypto assets (cryptocurrencies) have been used as criminal payments, which has become more active on the dark web.
Dark Web Basic knowledge What is traded and used for crime?
Tor browsers are often used to access the dark web, but as mentioned earlier, the Tor browser itself was not developed to promote illegal activities.TOR browser's core technology, Onion Routing, was developed in 1995 by the US Navy Research Institute (NRL).
It is said that the initial purpose was to keep the Navy secret of communication with the source.The abbreviation of Tor (The Oonion Router) is said to have been named from the fact that the connection route is anonymized, an anonymization of a layered layer like an onion.The TOR browser is currently supported by the non -profit organization "Tor Project" and is developed as an open source.The project is continuing while receiving donations from individuals and companies.
Looking over the world, in some countries and regions, interiors and censorship of communication contents are actually being carried out to maintain the government, and blocking routes.If journalists and activists communicate in such countries, there is a risk that the activity will be hindered if the source is identified, and the body may be in danger.Under such circumstances, Tor browser is used to ensure safety.
The British public broadcasting BBC has opened a website that can be viewed from the Tor browser so that international information can be obtained from countries where access is restricted.It is said that TOR browser was used for the use of the democratization movement "Arab's Spring" and Edward Snowden's internal information.
In addition to the regular website, "TOR browser is used," ".You will be able to view the website of the ONION domain.TOR browser has secured anonymization by going through the TOR network..The browsing of the "ONION" domain is limited to the TOR network.
If you try to access a specific website from the TOR browser, you will reach the web server that hosts the website via a multiple TOR server called a node.Since communication between servers can only obtain the previous IP address, the original communication source is hidden.The server that makes up the TOR network plays the following three roles, called relays.
1) It is called the guard relay "guard relay" or "entry guard relay" and has a function as the entrance of the TOR network.First, the data is encrypted so that it can be decrypted in the exit relay.Next, repeat encryption so that only the intermediate relay can be deciphered.Then, a multi -layered packet is sent to the Tor network.
2) Relay communication from the intermediate relay access source to the access destination, and conceal the guard relay and exit relay mutually.If you decrypt it with an intermediate relay, you can see the next communication destination to send the packet, but the original communication source is concealed.
3) Exit relay TOR It becomes an exit of the network and communicates with the final access destination.Returned to the original data and receive content from the access destination.
The route of the TOR network is changed every period to ensure safe communication.It is a so -called distributed network consisting of thousands of servers, not managed by companies or governments.
As information about the dark web is featured in various media, some users may try to access them.However, if you use a TOR browser with interest, there is a risk that you will be involved in unnecessary troubles.In the following, the dangers of using the TOR browser are explained.
1) Interix of communication TOR browser protects the IP address and location information of the communication source, but does not protect the communication content.It is easy to mislead from the perception of anonymous tools, but unlike the technology such as SSL and TLS, it does not encrypt communication content.
The server (exit relay) just before the ultimate access destination does not ensure the confidentiality of communication content due to its mechanism.If the server that makes up the TOR network is operated by a malicious administrator, the communication content may be intercepted.
What are a safe connection method "SSL" and "TLS"?
2) TOR browser vulnerabilities, as in all software, there is a risk of vulnerability in the tor browser itself.In 2017, the existence of a vulnerability called Tormoil, which identifies the source IP address, was reported.
3) TOR browser with malware. When using Tor browser for some reason, it should be limited to those downloaded from the official website.Getting software from other websites is dangerous.In the past, there has been a case where fake packages with embedded malware are distributed.In addition, there were cases where Toro browser was discovered from 2017 to 2018.
4) There is a risk that the malicious website Dark Web users released on the dark web may be targeted by the attacker.When browsing the website published on the dark web, it is not denied that some actions may lead to malware infection.
The actual situation of a crime group about the dark web
5) The investigative authority from the investigative authorities is also used by criminal groups, so investigators are monitoring traffic with the aim of identifying fraudulent activities.In fact, it is said that investigative nodes are informed of monitoring nodes in some of the nodes used to connect to the dark web.The user who is using it may be suspected and recognized as a surveillance of investigative authorities.
The existence of the dark web that is leaning behind the evolving cyber crime [Splout Seishun Takano x Canon Marketing Japan Shoichi Nishiura]
Since the TOR network sends and receives data via multiple servers, the communication speed during use tends to be slow.In other words, there is almost no merit of using a TOR browser for ordinary users, and there is no reason to choose an unacceptable means.
If you want to ensure confidentiality when accessing a website, you should check if the communication content is encrypted in SSL or TLS.Also, if you want to keep your communication source in need of it, use a reliable VPN (Virtual Private Network) product.
If you are a privacy concern, you can minimize tracking across the website by setting "Cookie block" with a web browser.Furthermore, by browsing the website in private (secret) mode, search history and browsing history are not saved on the terminal.
Again, you should not easily access the dark web using a Tor browser just because you are interested in the dark web.The use of the dark web recognizes that there is a risk of being involved in crime in an unexpected way, and keeps it dangerous.
What happens if you delete cookies?
Navigation Lists
What is a tor browser? Tor browser development TOR browser mechanism Tor browser danger To use the Internet safelyCategory
Related Articles
Hot Articles