Internet Security and risks

The software, Tor, uses volunteers to smuggle information from one place to another.

You can find a comprehensive guide regarding the reasons for using Tor but thus guide has strategically missed the information related to the potential risks involved.

Why Tor is liked by millions of people around the globe? This is because it helps people in accessing more information than they are legally allowed to access in particular geographical boundaries. The repressive regimes limit access because of censorship issues.

So, what is the risk here? The Tor node can be run by any individual. There are no restrictions imposed. So, with such a wide availability how the Tor management could ensure its positive use only.  It can be easily accessed by bad individuals. In reality, it is not a myth, it actually happens. These nodes through which bad people can access the Tor are known as hostile exit nodes.

An employee at the Tor Project claims that disclosure about this particular risk has been made in one of the blog posts of the company.

Tor claims that privacy and anonymity of the users are kept hidden. No one knows where internet traffic is coming and where it is going. But this is only limited to the protection of internet traffic not the protection of users. They need encryption for this purpose. Once, the last relay of the internet is crossed, the users enter in the open internet again.

If you haven’t understood it properly, then it is not your mistake. The topic is particularly technical. So, here’s an analogy to explain this concept.

Consider it justice the portal service. When writing a postcard to someone you can expect that, the one handling the mail can give it a reading. But if you’ll put that particular postcard in an envelope, someone would have to tamper the envelope before reading it.

Considering an oppressive regime, the governments are not even in doubt while opening the mails or other private correspondences. However, in countries where imperfect democracies are governing the regimes, the press is considered as a potential way to spy on you. In these cases, police have no involvement whatsoever and the newspaper editors are given a handsome salary package for this purpose. With such a scenario in the authoritarian regimes, it is often advised that such countries often have to learn from imperfect democracies like the UK.

So, now coming back to the Tor scenario; if you are just sending a postcard, you can be exposing your message but if you put that letter in the envelope, you are using Tor,

But with all of these aspects, how would you know that particular conversation is online is being treated as the letter or a postcard.

This isn’t complicated at all, especially for the web. To identify the safe URLs, you should look for https. Even the browsers would highlight the security of your connection by changing the color of the address bar.

But with the banking sector, people are getting cautiousness, however, not so much when using social media.

If you’ll access your Twitter account in a web café, there is a particularly high chance that someone would peek over and hijack that session of yours. It actually means that anyone else can send a tweet using your account.

Idiocy tracks people who use Twitter insecurely. They hijack the session, send a tweet from their account, and show the users that they are vulnerable.

As far as the UK is concerned, it can create embarrassing moments for people, but for other countries around the world, it could actually be the cause of killing individuals.

So, when it comes to Tor, it does not save you from these hostile attacks if your message is routed through hostile exit nodes. So, while surfing online whether it is simple internet research, email, or WordPress usage, make sure to establish a secure connection. But if you can’t find a way for securing your connection, then you can just expect everyone to read your conversation.

We’ll advise you not to go for such idiocy.

Leave a Comment