When I explained the myths surrounding Tor in my last post, I realized that in addition to outright myths about the protocol, inaccurate suggestions about how to use Tor properly are everywhere. This often includes worrying advice on connecting to Tor via VPN services, proxies, or other anonymity systems. So in this part of the “Slicing onions” series, I will attempt to clarify why you should not combine Tor with such networks and techniques and highlight the negative consequences if you do.
The Tor network is an anonymity system designed to protect the privacy and anonymity of its users.
Unlike a VPN service, Tor is both free to use and decentralized. Sadly, there is plenty of misinformation around about Tor. This post aims to clearly explain Tor and to debunk various myths surrounding it.
Yesterday, a user on our forum opened a thread asking about the differences between secure messengers. Rather than listing a bunch of different messengers and their features, I thought I should start off by defining “secure”, and other key terms in the context of instant messaging. This is because a messenger that is “secure” for me, does not automatically mean it is “secure” for someone else.
First of all we need to deconstruct the meaning of security, let’s start with the acronym CIA: confidentiality, integrity, and availability. Confidentiality means that only the intended parties were able to read the message. Integrity means being sure that your message is not modified before it arrives, this is something most people take for granted. Lastly comes availability, which means to ensure that all parties receive proper access to your messages. You can read more about this here if you are interested.