Linux - SoftwareThis forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
I have used Firefox web browser for quite a while and believed it was the most secure browser available.
I hardened the browser with NoScript and HTTPS Everywhere add-ons.
However recently I've installed Opera web browser.
Now I'm browsing on a free vpn with uBlock Origin, Privacy Badger and Disconnect browser extensions.
Due to the vpn - the browsing experience is smoother and uncomplicated.
Is Opera not the most secure way of browsing the net?
Well, the most secure I know about is the TOR browser running on a live-cd version of a TOR distribution. When properly set up, your traffic is obfuscated and appearing to not only not come from you IP address, but may not appear to be arriving consistently from ANY single IP address!
TOR may be overkill for most users. IT is a better answer for when security is of greater importance and failure may be fatal.
For MOST users it is enough to run a less secure browser in the most secure mode to which it may be set, and then only allow secure operations. (do not browse to insecure domains.)
Well a lot of TOR exit nodes are actually set up by intelligence agencies. Infact i could set up an exit node and sniff the traffic. Of course if you only browse ssl encrypted sites you might not be exposed. But then why take the risk anyway. If you not a whistle-blower or aren't trying to buy drugs i don't recommend tor for general browsing. Afaik it is pretty easy to tell that you using tor
"Free" always means there's a catch, be it paying by "sharing" information, bandwidth caps or limited functionality. "Free" also says nothing about a VPN providers' security or quality, no matter what opinions people post. Nothing against Opera (or Vivaldi) but while based on Google Open Source Chromium it isn't Open Source Software, and that makes it hard to assess anything.
Distribution: Slackware/Salix while testing others
Posts: 1,718
Rep:
Quote:
Originally Posted by ugjka
Well a lot of TOR exit nodes are actually set up by intelligence agencies. Infact i could set up an exit node and sniff the traffic. Of course if you only browse ssl encrypted sites you might not be exposed. But then why take the risk anyway. If you not a whistle-blower or aren't trying to buy drugs i don't recommend tor for general browsing. Afaik it is pretty easy to tell that you using tor
OMG, better unplug that computer now! Because "they" also work on your kernel, and other levels of your OS, especially seeing that you might be running CentOS. Run for the hills man.
I think Chromium is just fine with recommended settings and good extensions. You can even use it inside AppArmor if you're really concerned about the security of your web browser itself. If the traffic is your concern instead, Tor might be a better idea.
Well, the most secure I know about is the TOR browser running on a live-cd version of a TOR distribution. When properly set up, your traffic is obfuscated and appearing to not only not come from you IP address, but may not appear to be arriving consistently from ANY single IP address!
TOR may be overkill for most users. IT is a better answer for when security is of greater importance and failure may be fatal.
For MOST users it is enough to run a less secure browser in the most secure mode to which it may be set, and then only allow secure operations. (do not browse to insecure domains.)
I think 'properly set up' is a key point here.
The cleanest setup is Tails OS on a usb. And then boot from usb.
I used TOR for 6 months and found myself under police surveillance.
Police cars and taxis start following you and unmarked cars park outside your house. The vehicles TELL you of their presence - surveillance costs money.
I haven't used TOR since.
It is best to use TOR as little as possible, IMO.
A separate browser should be used for ordinary browsing.
TOR shouldn't be used for anonymity - it gets you noticed when you use it.
A trusted VPN is a safer method for gaining anonymity.
"Free" always means there's a catch, be it paying by "sharing" information, bandwidth caps or limited functionality. "Free" also says nothing about a VPN providers' security or quality, no matter what opinions people post. Nothing against Opera (or Vivaldi) but while based on Google Open Source Chromium it isn't Open Source Software, and that makes it hard to assess anything.
Yep, I think a paid vpn will offer the most reliable anonymity.
Of course you'll also need to choose the right vpn supplier.
Choosing a vpn operating from a country with known mass surveillance and compromised privacy laws may not be a good idea.
List those nodes here please? (If you can't then you don't know and ergo shouldn't say such things.)
Whilst using TOR I found that Yandex search engine could always identify me.
They told me my citizenship and financial status.
They could still identify me if I changed OS.
And these guys were kind enough to let me know.
You think Prism will let you know anything?
With Quant search engine the search results indicate it knows my geolocation even if the IP is from a different country.
I haven't tried this with Tails OS though.
Also maybe others may have a different experience.
Google search engine doesn't work with TOR. So everyone will be using DDG.
This makes you wonder if DDG is the first place to look to find TOR-users?
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.