Tor Browser: user feedback on the practical use of the browser
Anonymity on the Internet when visiting someforbidden or blocked resources has long become a talk of the town. To do this, quite a lot of completely different tools can be used (VPN clients, anonymous proxy servers, etc.). However, for a complete understanding of the picture, consider an interesting browser called Tor Browser. Feedback on the program in most cases are very flattering. But in order to fully appreciate the merits and demerits of this software product, we will consider what it is and how it works.
What is Tor Browser?
This browser is based on the principle of work built onthe so-called "bulbous" technology, which allows you to completely hide the traces of the user's stay on the Internet, using multi-level encryption. In this case, only the path of access to some resource (routing) is encrypted, and the transmitted and received packets (information traffic) remain in their initial form.
It works like this.The Tor network uses three basic arbitrary nodes. Which ones? Nobody knows this. When a user request is received, the browser sends the data packet to the first node, which contains the access key to the second (encrypted host address). On the second - the key to the third. Thus, it is absolutely impossible to track the movement of transmitted packets over the network (there can be a lot of nodes themselves, and three of them are chosen from them).
Tor Browser Bundle: reviews of the versions of the program
Now let's move on to whatexperts and ordinary users talk about this browser. First and foremost is that the application, regardless of the version used, allows you to access any sites with at least three limited access. This is somewhat similar to the work of anonymous proxy servers, which initially modify the external IP of the user's machine and its location.
Tor Browser is similarly functioning.The experts' feedback indicates that the latest modifications to the program allow anonymity even for large server systems, changing their location, which can undoubtedly please system administrators of the most diverse hosts. Ordinary users do not need server-side program functions. Download to install the latest version they can from the official site tor-browser.ru. User feedback indicates that new versions of the application are constantly posted there (although in the browser when it becomes obsolete, an appropriate warning will be issued, and you can update it directly in the program).
As for the basics of working with the browser, there istheir nuances. After the start in the program, it is necessary to first check the network and, only after receiving the message of its successful completion, start work.
But reviews about Tor Browser say that whenthe start of the latest modifications, the initial start (connection to the Tor network) is slow enough, then the configurator is triggered, where you can configure the parameters yourself or use the connection immediately. As practice shows, it is better to choose the second option.
But the first one is suitable for circumventingblocking the provider if it blocks the use of this software (unfortunately, the provider can really easily determine that Tor Browser is used to access resources that are blocked from it).
But we assume that there is no problem with the provider.We press the connection button and get to the main window of the Tor Browser. Feedback from experts in most cases suggests that it is better to first use the hyperlink of the network status check located at the top of the window, and only then enter the addresses of the desired sites. This is what guarantees that Internet surfing will be completely anonymous.
Pros and Cons of the Program
As for the positive and negative sidesbrowser, it can be noted that the program is working quite slowly only because of the use of the same "bulbous" technology. But with the help of this application you can open any site, no matter how powerful the lock is on it.
Another disadvantage is that the browser does notwhat conditions it does not remember passwords, and cleans temporary files and cookies on exit, which somewhat disappoints users. But in fact it is just created to ensure complete anonymity, which many simply forget. In addition, some complain about the warning that the browser is not recommended for use in full-screen mode (this is just the moment when a provider or even an attacker can determine that a user is logging into the site using this program).
However, when installing a connection, manySurfers even manage to watch movies, despite the rather low speed of the application. But the search is actually done using Google services. The user can choose the language of search and display results independently, as well as set the main language for the browser itself. Separately, you can note the ability to import bookmarks from other browsers.
Tor Browser for Windows: feedback on the application in terms of downloading content
The main complaints fall to the share of those users who are not satisfied with the speed of work. And what did you want to do when setting up a connection with the traffic passing through several servers?
In some cases, experts recommend using the program settings and installing the obfs4 repeater there.
It is noted that downloading content fromthe same "Yandex-disk" is practically not reduced. But, judging by the feedback, the download speed even with the weakest connection never drops below the limit of 100 kbit / s.
If you give this browser an objective assessment,Despite a slightly reduced speed of work, it looks just fine. This is not only in terms of ensuring anonymity, but also in terms of visiting any resource blocked even at the state level. If in some other browsers the built-in VPN or additional extensions do not work, this application will become the tool that will bypass any locks and remain unrecognized. Of course, even the developers themselves do not call the program a panacea for all the ills, nevertheless, there is a certain amount of truth (and a very big one) in this.