Tor network connecting the entire computer. Tor browser - what it is and how Tor allows you to hide your online activities. Anonymous access to the Internet through Tor Browser

We have released a new book, "Social Media Content Marketing: How to get into the head of subscribers and make them fall in love with your brand."

The TOR network is a system designed for network connection in anonymous mode, protected from eavesdropping and without the ability to track user actions.

More videos on our channel - learn internet marketing with SEMANTICA

talking in simple words, TOR is a network where the user completely preserves his anonymity on the Internet. At the same time, it doesn’t really matter what he will do - visit sites, maintain his own blog, send messages.

Anonymity of traffic is possible due to the use of a server network distributed throughout the world with redirection to dozens (and in some cases hundreds) of nodes. Anyone who downloads and installs it on a computer can use the capabilities of such a network.

The screenshot shows the procedure for determining the ip-address of the user's computer (the PC is physically located in Voronezh, Russia at this moment).

Why TOR technologies can be useful

There are several reasons why anonymity may be needed:

  • the ability to access websites
  • blocked by regional providers;
  • unwillingness to disclose data about the computer and its location;
  • hiding personal data and ensuring the security of information on a PC.

Basic principles of the TOR network

To understand what TOR is, you need to understand how the system works. It consists of several main nodes:

  • Input or sentinel - with the help of this node, a direct entry into the network takes place. As a rule, input nodes are stable and high-speed servers.
  • Intermediate - designed to transfer information from the input node to the output node, making it almost impossible to track all the movements of information. The number of intermediate nodes is constantly changing and in some situations can reach several hundred.
  • The exit point is the point used to send traffic to the user.

The anonymous TOR network allows the use of numerous virtual servers of DigitalOcean or EC2 standards, thanks to which, when tracking data, only traffic that has undergone repeated encryption will be displayed.

How to install tor browser

Initially, to use TOR, it was necessary to have a lot of specialized knowledge and skills to connect to the network, but now the procedure is extremely simple - you need to download it (the distribution kit can be found on the site http://tor-browser.ru/ - it is located in open access) and install the application on your computer.

You can download the TOR browser on many other resources, but it is important to remember that many not entirely honest developers hide viruses or spyware under the installation file. Therefore, it is important to download the installation file only from trusted resources, and after downloading the file, it is advisable to check it with an antivirus.

In order to install the TOR network, just open the downloaded file, select the installation language and click "install".

The installation procedure is standard and rarely causes difficulties, but the launch of the program has certain features - each time the program starts, it is necessary to connect to the TOR network, otherwise you can forget about anonymity.

While working with the TOR network, the user can change the chain of servers for a particular site, so that it is almost impossible to track it.

An important feature of the browser and the network is that after closing the window, data about sites and resources visited by the user are automatically deleted. Therefore, the next time you log in to certain sites and resources, you will have to enter the login / password again.

Risks when using TOR

To install the TOR network, you do not need to put in a lot of effort. However, there are several points that can cause a lot of trouble for users.

  • An important aspect is the use of plugins and add-ons that send their developers data about the user - anonymity in such a situation will be zero.
  • Despite visiting sites anonymously, a user's computer with TOR installed is not at all protected from viruses, Trojans, and hacker attacks. Therefore, it is important to use high-quality antiviruses and firewalls, which must be properly configured.
  • You should be prepared for the fact that the page loading speed will drop catastrophically, since the page requested by the user is transmitted for a long time by hundreds of servers located around the world. But this problem does not scare users, since you can completely hide your activity on the network.

Recently, interest in the anonymous network is constantly growing. And there are many reasons for this..

"Democratic reforms" in the world are in full swing. The governments of almost all countries now sincerely believe that they have the right to decide where their citizens go, what to see and what to read. Bundles of laws, “with the best of intentions” stamped by thoughts, councils and parliaments, increasingly sharply define the boundaries of reservations, within which now only the existence of users on the global network is possible.

“You don’t go there, go here. And then the snow will fall on your head - you will be completely dead ”©“ Gentlemen of Fortune ”.

Another tense moment is the incessant revelations of Edward Snowden, from which it is clear that the total surveillance of everyone and everyone by the special services has already acquired a truly worldwide scope. Of course, the vast majority of people have nothing to hide, but it is extremely unpleasant to realize that you are under the constant cap of special forces, your every step is monitored and recorded, and someone regularly tries to pick their naughty little hands in your "dirty linen". And absolutely do not care for what purpose he does it, whether he has good intentions or not.

Why is it needed, this Tor?

More and more people are trying to keep their private lives safe from the long nose of the secret services. More and more people are trying to get rid of the “paternal care” of state officials and want to exercise their constitutional right to independently decide where to go, what to choose, where to look and what to do.

And here the anonymous Tor network comes to the rescue. Since it can provide a significant reduction in obsessive attention to a single individual, simultaneously removing almost all restrictions on movement along World Wide Web. Tor will hide your identity on the Web, hide everything you did on the Internet and where you went.

In addition, the Tor network has another small practical bonus. It quite often allows you to get around such an annoying thing as an IP ban on various sites. A trifle, but nice.

What is Tor and how it works

So, what is the Tor anonymous network. Tor is an abbreviation for The Onion Router (for those who do not know bourgeois, but are curious - see the translation in). If someone is interested in boring technical details, let him stomp on the Tor page on Wikipedia and understand. I would like a bit simpler - to the same page on Lurkomorye. I will try to quickly explain "on the fingers."

Although this network operates on the basis of the regular Internet, all data in it does not go directly from you to the server and back, as in the "big" network, but everything is run through a long chain of special servers and is encrypted many times at each stage. As a result, the final recipient, that is, you, becomes completely anonymous for sites - instead of your real address, an absolutely left IP is displayed that has nothing to do with you. All your movements become impossible to trace, as well as what you did. And intercepting your traffic also becomes completely useless.

It's in theory. In practice, sometimes not everything is so rosy. But we will talk about all the possible problems a little later. You're already tired of the long and boring intro, aren't you? Can't wait to install and try this miracle as soon as possible? Well then, let's go!

Let's start using Tor?

Tor is a rather complicated device in terms of installation and configuration. And in times not so ancient, connecting an ordinary “teapot” to it became a task by no means trivial. However, today everything is much simpler. Smart and kind people took all the necessary modules, put them together in a coherent bunch, set everything up as it should, and stuffed it into a single package. This package is called . And after downloading, all the fuss with it comes down to the usual unpacking and subsequent trampling of the “I want Tor!” button. And Tor appears.

Of course, computer geeks and those who have nothing to do or want to amuse their CSF, as before, can download all the necessary modules separately and gnaw through a multi-page technical “Kama Sutra”, trying to tie it all together, and at least somehow configure and run the resulting structure. We wish them good luck, and we ourselves will do something more rewarding.

I advise on this tab to pay attention to the link " Checking Tor Internet Settings". Clicking on it will help you finally make sure that you are really now in an anonymous network. By the way, there is also a link to a quick guide.

So, you are now invisible. However, until your head is finally spinning from anonymity and imaginary impunity, I hasten to slightly spoil your mood. Just like that, purely out of personal harm.

I just have to tell you about some of the "pitfalls" of the Tor network, so that in search of adventures in your "lower hemispheres" you do not hit them on these rocks.

A bit of security in Tor

So, what Tor cannot protect against. Tor cannot protect a person from their own stupidity. If a person has only sawdust instead of brains in the cervical growth, or he purposefully looks for problems for himself, then he will definitely find these problems. And no Tor will help here. Learn to use your brain and exercise basic caution. Tor will also not be able to protect you from chatty programs on your computer. Any plug-in or add-on in the browser can “multiply by zero” all your anonymity at one moment. Yes, the browser...

That is why the package we are considering uses a specially doped version of Ognelis. By the way, does anyone else need to be reminded that Windows itself is one huge Trojan and a spyware? ( Linuxoids can breathe freely here - they never care about such children's problems of “vents”). Tor will also not be able to protect you from viruses and hackers. Well, it's not meant for that! Get yourself a normal antivirus and firewall, set them up correctly and learn how to use them - and sleep peacefully.

The main problems of the Tor anonymous network

Okay, I’m finishing my digression and moving directly to the problems of the Tor network itself. The first thing that catches your eye is the speed. Page loading speed. Although the words "speed" and "rushes" are clearly inappropriate here. Pages load much slower than usual. This is the price of anonymity. The page you requested, before getting into your browser, hangs for a long time between servers around the world. However, it should be recognized that the situation now is much better than a couple of years ago, and it is quite possible to live with such a speed. If you get used to it a little. Despite everything, the network develops and grows stronger.

special services

Another - and perhaps the main - problem of the Tor network is intelligence agencies. They just can't accept the fact that crowds of users roam freely and uncontrollably on the network without their "all-seeing eye". And they are constantly making every possible attempt to change the situation. Attempts are very different, up to frankly criminal. Before virus, hacker attacks and hacks, targeted infection of software and servers with Trojans. Although infrequently, sometimes their efforts end successfully for them, And entire segments fall out of the “onion” network, and a “pativen” leaves for one of the most unfortunate (or the most stupid, or the most arrogant). But you're not going to do anything criminal in Tor, are you? This is all to ensure that you do not relax too frankly and constantly remember that Tor is not a panacea, and any anonymity is relative. And if you already decided to gamble with the state, then the question of your capture is only a matter of time.

officials

In addition to intelligence agencies representing the interests of states, state officials often represent a problem for the anonymous Tor network. The desire to “keep and not let go” in people who have seized power is indestructible. Occasionally, in relation to some things, this desire is quite justified and just, but most often it is not. And the bit of freedom given by Tor acts like a red rag on them. In some countries, the Tor network is already banned. Legislatively. There was such an attempt in Russia. So far, only in the draft version. Whether this project will become law and when, I do not know. At the moment, the Tor network in Russia operates without restrictions. Forbid - there will be something else instead of it. I will not lay out here verbatim folk wisdom on this subject, but I will say a little softer and more streamlined: "For every action there is its own opposition."

hackers

Another misfortune for Tor is hackers. Some of them are ideological. and some are simply stoned to *** (sorry for the non-parliamentary expression). Periodically, most often during the spring or autumn exacerbation, they arrange "crusades", trying to "cleanse the world of filth." At the same time, the opinion of the world itself does not bother them at all. They think that they have the right to decide for everyone. Not so long ago, there was a "campaign" against, let's say, non-traditional porn, on the Tor network. The case in this case is quite charitable. However, along with the porn, a bunch of completely white sites were also sawn out. Just like that, in passing. And who said that next time they will be limited to only this? So know that if your favorite "onion" site suddenly stopped opening, then it is quite possible that this is the actions of one of these with inflamed brains.

Infected files

The problem with the infected files of the Tor Browser itself is closely adjacent to the hackers. And here the ears of various special services often peek through, trying to plant their Trojan instead of an anonymous network. For example, in App Store still offer to download the infected Tor Browser. Moreover, the administration of the App Store was informed about this repeatedly in the fall. However, the Trojan is still there. Strange situation and strange slowness. True, all the strangeness instantly disappears when you remember that the tender and reverent friendship between Apple Corporation and the US NSA is growing stronger day by day. So download the files of Tor itself exclusively from the official site, or - our engine, in fact, will also give you a file directly from the official site.

Minor disadvantages of Tor

With an overview of more or less serious problems of the Tor network, it's over. Let's move on to minor annoyances. I have already spoken about periodically disappearing sites. Now about Russian sites in this anonymous network. They are few. But they already exist, and there are more and more of them. And even in many non-speaking forums there are sections for Russians. So where to roam and who to talk to you will find. However, the main language in the Tor network is still English, and all the tastiest things in this network are in bourgeois. Although at your service there are always all kinds of dictionaries and.

Further. It should be remembered that the Tor network is fundamentally not moderated or controlled by anyone. Sometimes some control occurs on individual sites when their owners set rules for their visitors. But not more. Therefore, you may well stumble upon things that shock you. Be ready for it. Also in this network there are various scumbags, frank schizoids, maniacs and other freaks. There are plenty of them in the "big" Internet, but in an anonymous network they feel more comfortable and are not particularly shy. Their percentage is much less than government officials are trying to tell us about this, but they exist. And if you have minor children, I recommend keeping them away from Tor.

And in general, I strongly demand to protect the Internet from children! It will only benefit the Internet. It will make him much safer.

Well, in general, he told all the horror stories. I will only remind you about viruses that Tor will not protect you from - protect yourself. Well, about anonymity again - it never happens one hundred percent, use your gray matter more often.

And for dessert, a small list of "onion" sites, so to speak, for overclocking.

Goodies and bonuses - a small list of "onion" sites

By the way, if you haven’t understood yet, then in Tor Browser you can open both ordinary sites of the “big” Internet, bypassing some inconveniences, and special sites of the anonymous “onion” network. These sites are located in a special pseudo-domain zone .onion(look carefully at the address). From the usual Internet, they do not open. At all. Only from Tor Browser running and connected to the network.

  • Tor Wiki(http://torwikignoueupfm.onion/) - Directory of Tor links.
  • The Hidden Wiki(http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page) is the first site every new user of the Tor network should look at. Contains links to almost all the resources of the "onion" network. Often unavailable due to the huge influx of visitors.
  • The Uncensored Hidden Wiki(http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page) - mirror of The Hidden Wiki. Moderation is minimal.
  • TORDIR(http://dppmfxaacucguzpc.onion/) - a large directory of "onion" sites.
  • Tor Search(http://kbhpodhnfxl3clb4.onion/), Torgle(http://zw3crggtadila2sg.onion/torgle), TORCH(http://xmh57jrzrnw6insl.onion/) and The Abyss(http://nstmo7lvh4l32epo.onion/) - search engines on the Tor network, at least one of them works.
  • Flibusta(http://flibustahezeous3.onion/) - a mirror of the famous library in the onion network (RU language).
  • OnionNet(http://onionnetrtpkrc4f.onion/) - IRC network. The main language of communication is English. Different channels for discussion, up to an illegal immigrant. Additional servers: ftwircdwyhghzw4i.onion, renko743grixe7ob.onion, nissehqau52b5kuo.onion.
  • vTOR"e(http://da36c4h6gxbckn32.onion/) - social network. interest clubs, blogs, forum.
  • RAMP(http://ramp2bombkadwvgz.onion/) is currently the largest trading platform in the Russian segment of the Tor network. Recently, there have been a lot of complaints about the actions of the administration and the increasing cases of scammers. (So ​​don't click your beak and keep your eyes and ears open) With the biggest selection on the web. And the highest prices.
  • RUForum(http://ruforumqewhlrqvi.onion/) - a Russian-language forum with communication and sale of everything that is impossible. Recently closed to outsiders. Registration is paid - $10.
  • Amberoad(http://amberoadychffmyw.onion/) is one of the largest shadow trading platforms.
  • Assassination Market(http://assmkedzgorodn7o.onion/) - betting on guessing the date of death of any bad people. Anyone can add a person to the list or raise the bid for existing positions. At the moment Barack Obama and Ben Bernanke are in the lead.
  • Hack IT(http://tuwrg72tjmay47uv.onion/) - a live service for hiring hackers.
  • Wikileaks(http://zbnnr7qzaxlk5tms.onion/) - I hope I don't need to explain what it is? Mirror in the "onion" network (ENG).
  • Onion Portal(http://ximqy45aat273ha5.onion/) - guide to the "onion" network (RU).
  • http://k4bmdpobhqdguh2y.onion/ - blog about new hidden network services (ENG).
  • Lukochan(http://562tqunvqdece76h.onion/Lukochan/) - large board (ENG, RU).
  • silk road(http://silkroadvb5piz3r.onion) is another large anonymous marketplace (ENG).
  • Keys open doors(http://wdnqg3ehh3hvalpe.onion/) - a site about hacking game consoles and various gadgets (ENG).
  • http://n2wrix623bp7vvdc.onion/hackingservices.html - resource about hacking social networks etc. (ENG).

All sorts of political-revolutionary-partisan resources are not cited here intentionally. Whoever needs it will find it.

TOR browser is perhaps the easiest and most affordable way to connect anonymously to the Internet. Now we will talk about how to set up the TOR browser on a computer, as well as where to download it and how to install it.

Step number 1. Download the TOR browser.

TOR Browser is a free browser based on Firefox. You can download it from the official website of the developer. To do this, go to the site, select the language and click on the "Download" button. After that, the installation files will start downloading.

By default, the site will offer to download the version of the TOR browser that is suitable for your operating system. If you want to download a version for another OS, then this can be done.

Step number 2. Installing the TOR browser.

At the TOR installation stage, the browser does not require any additional configuration. Everything happens automatically, you just need to follow the instructions that will appear on the screen. So first you need to select the language of the browser.

And then the folder where the TOR browser will be installed.

After that, it remains only to wait until the installation is completed.

Step number 3. Launch and configure the Tor browser.

After launching the TOR browser, a window called "TOR Network Settings" will appear in front of you.

Two buttons are available here: Connect and Configure. If you click on the "Connect" button, then the TOR browser will start working with standard settings. This option is suitable for most cases.

The "Configure" button will start the manual configuration of the TOR browser. This option can be useful if you are connecting to the Internet through a proxy server or if your ISP is blocking the TOR network. First of all, the TOR browser will first ask if your ISP is blocking the TOR network. If there are no problems connecting to the TOR network or you do not know for sure, then select the "NO" option.

If you select "Yes", then the TOR browser will offer to configure bridges. A bridge is a point in the TOR network whose address is not published in the TOR documentation. You can download the list of bridges on the website.

After setting up the TOR bridges, the browser will offer to set up an Internet connection through a proxy server. If you connect to the Internet directly (without using a proxy server), then you need to select the "NO" option here.

If a proxy server is used to connect to the Internet, then you need to select the “YES” option and configure connections. The TOR browser will ask you to select the type of proxy server, its IP address, as well as other settings related to the proxy.

After setting up the proxy server, you just need to click on the connect button and the TOR browser will connect to the Internet through the TOR network.

Step number 4. Checking the settings of the TOR browser.

If you have correctly configured the TOR browser, then the following message should appear on the screen: “Congratulations! This browser is configured to use TOR."

If the inscription appeared on the screen: “Alas. You are not currently using TOR", this means that something is wrong with the browser's TOR settings and it was not possible to connect to the TOR network. In this case, you can click on the button in the form of an onion and select "Tor network settings" or simply press the S key on your keyboard.

After that, it will be possible to reconfigure the TOR browser.

Step number 5. Change the IP address in the TOR browser.

Immediately after connecting to the Internet through the TOR network, you get a new IP address. But, if necessary, this address can be changed. To do this, click on the button in the form of an onion and select the menu item "New TOR chain for this site".

The page will then refresh and you will get a new IP address. You can check how it works on any site to check the IP address, for example, you can use the site.

In the last 3-4 years, news has regularly appeared in the feed with the headline: "The government wants to block Tor." But, this idea is somewhat utopian.

The darknet can be used in all the fears of the world except North Korea, where access to a computer with the Internet requires special permission from Kim Jong-un. Even China failed to ban it. The Golden Shield automatically blocks all new Tor entry node addresses, but people who need to bypass this barrier with VPNs and proxy servers.

News about the “ban on the underground Internet” only fuels interest in it among the population. More and more Russians are joining the darknet, which is fraught with many dangers and temptations. You should be aware of the consequences of misusing Tor in advance.

This article will talk about the main types of shops and forums in Tor that should be avoided and the possible responsibility for their use / creation.

Fragments of the article have been removed at the request of Roskomnadzor. The material has been edited.

2. Sites with job advertisements

A huge number of ads for the sale of *** contains a postscript: “We are looking for ***. It requires activity, adequacy, professionalism. The pay is high." For one ***, an employee receives an average of 500-3000 rubles. They write on the forums that an intelligent employee gets up to 80-120 thousand rubles a month with a free schedule. And this is in the province. In the capitals, the ceiling is much higher.

But this work is not as simple as it seems at first glance. Making a good "***" and hiding it is a whole science and experienced people write entire textbooks. There are many non-obvious problems that are difficult for a beginner to guess.

For example, how to protect yourself from "seagulls"? So called ***, who are looking for and successfully find strangers *** in typical places (flower beds, holes in the asphalt, peaks of entrances). Or how to disguise a ziplock bag inside an acorn or a nut so that rain and wind do not damage the goods?

Criminals from Tor require not only ***, but also parcel receivers, stencilers (to make announcements on asphalt), growers (grow plants at home), people to withdraw illegally received money from bank cards. Less often they look for strong guys to intimidate enemies. And each profession has non-obvious subtleties that need to be learned in order not to have problems with the law.

In the criminal sphere, there is a terrible turnover of personnel and new employees are constantly required. A really adequate and accurate person can work for a couple of years, and a simple ***/carrier/drop walks free for only a few months. Most people get caught by the police sooner or later. Raising the dough, stopping and leaving in time is rare for people.

Possible problems: According to article 228 of the Criminal Code of the Russian Federation, if a person is involved in the distribution or production of ***, then he can be imprisoned for a period of 8 years. We will talk about the penalties for parcel receivers and cashers below.

3. Shops of goods for the commission of crimes

With the help of Tor, weapons, fake documents, fake sims, phones, ATM skimmers and a bunch of other interesting items are traded. As with ***, bitcoins are used for anonymous payment. Surprisingly, there are no special problems with the delivery of goods.

Sometimes it is done by regular mail. To receive and send parcels, they hire "drops" who go to receive / send parcels, show their faces and passport details. Goods are also sent with the help of taxi drivers or private transport companies. Here is a quote from the RuOnion forum:

Somehow I sent an optical sight through a transport company, naturally not a branded one. They asked what was inside, answered - a sniper scope, They: we’ll write it down - an optical device :-)))) They generally don’t care what to carry ...

But the sellers still take a lot of precautions: they dismantle weapons into parts, which they distribute in several boxes, disguise them as other items, make parcels with a double bottom, and so on. They have no less tricks than ***.

Possible problems: According to article 222 of the Criminal Code of the Russian Federation, the illegal acquisition or transfer of weapons can be punished by a decision of liberty for up to four years. It is written about forged documents in article 327 of the Criminal Code of the Russian Federation, it says about a period of up to two years.

4. Pedophile forums

There are also a lot of people on the Tor network who are sexually attracted to children. Here for them there is a lot of "interesting". First, huge archives of underage porn videos. Secondly, these are forums where people share their personal experience of seducing children and hiding this process from others.

Some pedophiles consider sex with children absolutely unacceptable and sit on the "conservative" sections of the forums, where they post just slightly erotic photos of little girls and boys with their genitals covered.

But there are people for whom just watching a video is not enough and they strive to make their fantasies come true. The main shock in preparing this article for me was familiarization with a book for pedophiles in Russian.

200 pages on where to find a potentially available child and how to recognize him, how to ingratiate himself with him, how not to leave traces and how to make sure that the child will never tell anyone about what the pervert or pervert did to him.

And judging by the forums, a lot of pedophiles really manage to turn things around so that parents never know what happened to their child. Indeed, most often children are seduced not by maniacs on the streets, but by neighbors, relatives or family friends who have been entering the house for many years.

Do not leave your child alone with anyone and never without video surveillance. There are many more pedophiles among us than you might think.

Possible punishment: It is forbidden to store porn videos with minors on your computer. You can read more about this in the article:

5. Websites of extremist organizations

Terrorists, skinheads and radical oppositionists also create sites in the onion network, publish articles there and discuss plans for pogroms or seizing power on forums. Also, sect sites are gradually moving to Tor.

Since 2002, the Russian authorities have maintained a list Federal extremist materials. It includes almost 4,000 books, articles, paintings and musical works. Rospotrebnadzor forces the removal of such materials from sites on the clearnet, but they are distributed freely in Tor libraries.

Possible punishment: According to article 282.2 of the Criminal Code of the Russian Federation, participation in an extremist organization can be imprisoned for up to six years. Also, you can not copy materials from such sites in Tor and post them on social networks and blogs. There is also a separate article on this topic:

6. "Hacker" marketplaces and forums

International dark markets often have a Digital Goods section next to *** and weapons. It sells Trojans, Wi-Fi hacking tools, software hacking tools, DDOS attack tools, and many other varieties of "tools for illegal access to digital information."

Along with the programs, you can also buy instructions for their use and training books. They also sell digital goods that were stolen using the tools described above: upgraded characters in games, paid accounts for various services, hacked programs, access to infected computers.

There are also many hacker forums on the dark web. There, people share their experience among themselves, looking for performers and accomplices for various cyber-crimes.

Possible punishment: If it is proved that a person used any of the programs described above, then according to Article 272 of the Criminal Code of the Russian Federation, he can be imprisoned for up to two years.

7. "Black" cryptocurrency exchanges

The sites and organizations described above make financial settlements in bitcoins (less often in another cryptocurrency). And of course they don't pay any taxes. With the help of cryptocurrencies, money obtained illegally is cashed out.

Tor has exchanges for withdrawing bitcoins to regular e-wallets or bank cards. Also, there are a lot of ads of people who withdraw money from cryptocurrency wallets to offshore accounts or transfer money to the account of a one-day company. From the latter, money can be withdrawn using ordinary "cashers".

There you can also order bank cards issued to nominees or "virtuals". And hire drops who will go to the ATM, shine their face in front of the cameras, withdraw cash from the cards and deliver it to you.

Possible punishment: According to article 159 of the Criminal Code of the Russian Federation, participation in group fraudulent schemes can entail up to 10 years in prison.

Also, the State Duma is talking about the adoption of a bill that provides for punishment of up to four years in prison simply for using bitcoins or other cryptocurrencies.

conclusions

Not all types of content that can be found on the Tor network are described above. Not mentioned are sites with erotica for animal lovers, stolen goods stores, sites for ordering killers and much more.

But what has been described is enough to understand why governments around the world seek to control the Internet. Personal freedom and privacy is good. But how to deal with criminals on the Internet without blocking sites and traffic control?

P.S. Is Tor Anonymous

There are a lot of tutorials on the dark web about online anonymity. Some of the authors consider a sufficient scheme virtual machine with Tails -> vpn -> vpn -> Tor. And someone recommends buying a computer from a flea market in the neighboring region and using the modem through the "left" SIM card. But one thing is for sure - if you just run the Tor browser, then your level of anonymity is quite low.

Intelligence agencies around the world are actively working to identify criminals who use the "underground Internet". For example, in the fall of 2016, as part of the international Operation Titan, the Swedish police identified 3,000 buyers of *** in Tor. And there are more and more reports of such investigations every year.

Full name: Tor Browser Bundle. Built on the Mozilla Firefox platform, it is one of the most anonymous browsers in the world. Changes your IP address to a random IP address when using the Internet. Uses IP of different countries: Romania, Luxembourg, Switzerland, Germany. Does not store cookies and a log of visited sites, does not remember logins and passwords. Uses a special secure network of anonymous proxy servers.

Installing Tor

You can download this browser from the official website: https://www.torproject.org/download/download-easy.html.en

Choose a language and click Download Tor Browser Bundle:

Run the downloaded file:

Click OK:

Install:

Ready:

Using Tor Browser

Run the program. If you haven't unchecked Launch Tor Browser Bundle After the installation is complete, it will start automatically.

When you first start you will see a window Tor network settings. Here you need to select the connection type. Nowadays, in most cases, the first option is suitable - the button connect:

After that, the browser connects to the Tor network, which will hide your real IP address, ensuring your anonymity. Wait for network connection:

For greater privacy, you can request English versions of pages. But this is not a key indicator of anonymity. Can be pressed Not:

Tor browser is not installed in the system in the traditional way, because. is a portable application. The program can be carried with you on a flash drive. By default, when unpacking, it is placed in the folder Tor browser on desktop:

You can move the browser folder to any location. When you want to run TOR to anonymously visit a site, go to the folder with the program and run the file Start Tor Browser.exe:

After pressing the button New identity and before using a new IP address, go to 2ip.ru and see what has changed.


To imitate another person, it is desirable to change not only the IP, but also the country. If necessary, press the button Tor, select an item New identity (New Identity) until the country changes:

Attention! Due to the fact that while working through the Tor browser, traffic goes through many proxy servers, the page loading speed is much lower than through a regular browser.

Share with friends or save for yourself:

Loading...