tor browser

Discussion in 'privacy technology' started by iii, Mar 19, 2010.

Thread Status:
Not open for further replies.
  1. iii

    iii Registered Member

    Oct 24, 2009
    Does it slow down you browsing speed substantially? and is it effective against isp or is nothing effective against isp
    Last edited: Mar 19, 2010
  2. tobacco

    tobacco Frequent Poster

    Nov 7, 2005
    British Columbia
    Yes it's effective but it's sooooooooo slooooooooooooooow, my hair turns grey waiting for pages to load :rolleyes:
  3. Carver

    Carver Registered Member

    Feb 5, 2006
    I think the tor people are in the middle of a program that is suppose to speed up tor if you can believe that.
  4. chronomatic

    chronomatic Registered Member

    Apr 9, 2009
    The ISP can only see that you are connected to a Tor node. It cannot see what you are doing beyond the Tor node.

    Here's how it works:

    You ----> ISP ---- > Entry Tor Node -----> Middle Tor Node -----> Exit Tor Node -----> Website

    All the entries in bold are encrypted. Anything not in bold is not encrypted (unless you are using SSL independently of Tor). So, unless the website you are visiting is using SSL, you should assume that either the ISP or the Tor Exit Node can see what you type. This means Tor is great for anonymity but not for privacy (unless the website is using SSL, and then it would be private). Remember, there is a difference in privacy and anonymity. Tor can only encrypt what travels through its network. It has no control over anything outside of its network, which is why you should always visit SSL sites or use SSL IRC channels when possible.
  5. lotuseclat79

    lotuseclat79 Registered Member

    Jun 16, 2005
    Hi chronomatic,

    I think if you look at Tor documentation on how Tor works at their website, you will find that the traffic from You using a browser's tor client and browser with torbutton enabled, the traffic is encrypted from your browser (tor client) through your ISP (whom cannot discern your encrypted request), and then decrypted on the way back in your browser's tor client.

    See the web page: where encrypted links are in green from/to the client from the Tor network, and the only decrypted part is from the exit node to the destination website and back to the exit node.

    -- Tom
  6. ha14

    ha14 Registered Member

    Sep 6, 2009
    It will only perform in the fashion it was designed. #1 it bounces off a lot of proxies. Given that as a fact the performance will be related to the number of proxies and how far the data must travel. Also keep in mind that while you are using the program there is another monitoring your usage and preparing and on the fly list of the proxies, so that the next time you use it the delay time will be even longer. Eventually it will not work at all.

    Diagnosize with The Message Log

    Some network or computer settings may restrict access to certain ports. If you can browse websites normally, then you can rely on at least two ports (80 and 443) being accessible. You can set Tor to work exclusively through these ports
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.