With gate you can largely secure and anonymous surfing the Internet. Basically it is a proxy service with endless participants and applications &# 8211; but what a proxy actually is and how the Tor Browser works on the Android smartphone that we show you in this guide.
Gate, which stands for &# 8220; The Onion Router&# 8221; and is in development since of 2002. As a research project from the United States, it is the ultimate tool today to remain anonymous on the Internet. The goal of Tor is that the absolute beyond recognition of oneself is maintained on the Internet. The idea is that you go with gate over so many rough edges that no one knows where data originates. Is there a free Tor Browser also mobile on the go, and as Android APK?
Buy Samsung Galaxy S7 Amazon*
- 1 use with Orbot Tor on Android - Here&# 8217; s
- 2 Tor Browser as an Android app or desktop version: How encryption
- 3 Tor Browser version sandbox feature
- 4 guaranteed anonymity? Advantages and disadvantages of the Tor Browser
- 5 Advantages and disadvantages of the Tor network Android
use with Orbot Tor on Android - Here&# 8217; s
Those who want their TCP connections and other services such as SSH, IRC and instant messaging encrypted and transmitted as anonymous as possible, may go the way through the Tor network. In order to use Tor on Android, there is already a free Tor Browser Android app that can connect to the large network. Without root you can obliterate your tracks with Tor on Android. Practically this is that you can anonymize all its traffic on the smartphone as superuser same. The application Orbot is available for free in the Google Play Store to download. You use Tor to encrypt Internet traffic.
downloadQR codeOrbot: Mediation with gateDeveloper: The Tor ProjectPrice: Free
Gallery TOR on Android
- (Figure 1.5):After Orbot from the Google Play Store is loaded, the language must be selected - after Orbot from the Google Play Store is loaded, the language must be selected
- (Figure 5.2):- The warning already shows that all traffic is not anonymous, especially not if you have not rooted your device.
- (Figure 5.3):- The following list shows apps now work with Orbot.
- (Figure 4.5):- Then you go already: Long draufhalten the finger and ...
- (Figure 5.5):- ... have to Orbot has joined and you're part of the TOR network.
After downloading the Orbot, steps by the English-language wizard are pretty simple. By clicking on the Orbot-Enabled Apps, these can be downloaded directly from the Google Play Market, the &# 8211; if the device is not rooted &# 8211; also work with the Tor network and the Orbot client. After the installation is complete, you must press the power button only long, the Orbot connects to the Tor network &# 8211; and you're secure browsing.
Tor Browser as an Android app or desktop version: How encryption
Normally, the connection works to a server on a fixed and simple scheme. If you give the address www.giga.de into a browser, the name is converted to a number, the IP address. With this IP address to connect from your own PC over many servers is made to the destination using routing tables. So two computers communicate &# 8211; one's PC and server GIGA here together. The own IP address will also be announced at GIGA so that the requested data can be answered accordingly and sent back to the right place.
A proxy is an intermediate server, however, the first one controls. If one calls the website on www.giga.de, we see this request to the proxy &# 8211; connects to the target server, is on behalf the request receives a response and sends back an answer. The problem with the anonymity of this is that even the proxy maintains a register of all connections. Thus, if the proxy is compromised, then was&# 8217; s the same with their own anonymity.
Now comes gate into the game. With gate to your own computer connects to a gate Exitnode. This exit node connects farther &# 8211; and this second node reconnects on, and this computer will connect to the server. So all traffic is sent to three corners and each time re-encrypted. Thus, the data in the Tor network is secure. Why three corners? That's according to the researchers, the best balance between speed and anonymity.
Anonymous on the Internet with gate and Trails - book on Amazon*
Tor Browser version sandbox feature
One criticism on Tor Browser has so far been that you could not use it in a sandbox - this means that the browser is working shielded from your rest of the system and so the improving security and anonymity. Since mid-December 2016 is now the sandbox feature for the Tor browser that works without your IP or MAC address, and is designed to prevent malware attacks. These &# 8220; sandbox Tor Browser 0.0.2&# 8220; version is available as a trial for users of a Linux-64-bit kernel-Systems are available. However, this requires bubblewrap 0.1.3 - one reason why the port version does not run on Ubuntu. Other requirements are:
- A C compiler with developer libraries GTK + 3, libnotify, and X11
- gb *
- Go (tested with 1.7.x)
The documentation about the new version is also on the official website of the Tor Project you are available.
guaranteed anonymity? Advantages and disadvantages of the Tor Browser
That sounds like a wonderful and anonymous world, but also has its weaknesses. here there quite many participants want both anonymity and contribute their part to anonymize other users, here is any part of a large, ever-changing network. The connections of the three other Tor nodes are constantly changing it. Thus, the exact route can be traced only with difficulty. While thus the probability of an attack is reduced to one's own personality, but once you get enough data to monitor connections from exit nodes, one can read some unencrypted passwords and data connections.
Since Tor nodes not book directly with a central system, but the entire infrastructure works decentralized, there is no definitive number of users &# 8211; the official goal Metrics Portal calculates the amount of direct users to more than 1.5 million high (as of 30/09/2016).Source: Screenshot 09.30.2016 metrics.torproject.org
Tip: uninstall Tor Browser completely
Advantages and disadvantages of the Tor network Android
The Tor Browser is currently available in 16 languages each in a 32- and 64-bit version for free download. The modified version of Firefox obscures your Internet traffic on Windows machines, Macs and Linux systems and can also be of a removable storage device such as a USB flash drive * be started.
A big advantage of the Tor network is the anonymity and ensuring its own security. Without such a service with dynamic router election Wikileaks could never have been operated and realistic reports from crisis countries would probably never have seen the light of day. However, the overall speed of the Internet connection is rather slow, though users surf now getting faster by the increased usable bandwidth despite detours in the Tor network. But even with the anonymity service Tor are you from viruses and malware not entirely sure. In addition, certain programs and plug-ins can no longer use as they build their own connections &# 8211; without using the Orbot.
A tech-savvy person can constantly read along new exit nodes and tap into their data connections in theory. When you reach the monitoring of a large workload, over 80% of Tor users can trace back within a few months. To a US study, the content of which is available to the public recently appeared.
Meanwhile Orbot can also connect with .onion pages. These are hidden websites such as Wikileaks, which completely encrypts here can be called in the Tor network. This includes, for example, the Internet-mystery Cicada 3301. Those who wish to move into open can terern parts of the Internet, should take a look at our articles Deep Web: So you come into the secret part of the Internet and darknet: throw access to the underworld of the Internet.
On the subject
- Android: Set up a proxy server
- Proxy server is not responding
Image Sources: The Tor Project, Inc., Android via Google / Alphabet Inc., gualtiero boffi via Shutterstock