Skip to main content

Darknet and TOR (Part-II)

As I explained in the previous post, dark web is a deep ocean of webpages and resources containing all sorts of information and stuff. You can nearly find anything and everything there, but sometimes people come across stuff they shouldn't be seeing or using and that's what makes it imperative to use the dark web in a safe manner so that you don't harm yourself and your computer network.

As I already explained that dark web is a place of resources but along with that you have to be very careful while using it and one should definitely follow some of the recommended security measures so as to ensure data safety and integrity.

Normally people are way too careless while using the darkweb and don't keep in mind certain things that they are not supposed to do and end up compromising their computers. One has to keep in mind that along with normal and good people there are always hackers and hacker groups sitting on darkweb trying to exploit any vulnerable machine they can find, you just cannot let yourself become another victim of darkweb crime.

People with no knowledge and experience try to use TOR and end up becoming victims of some serious crimes and hacks, so follow these measures to stay safe on TOR.


So here are some security measures you must follow in order to stay safe while surfing darkweb:-




  1. Don't use your phone for two-factor authentication on darknet.

Doing this will hamper your anonymity online and there is literally no point in using TOR because you already gave your details through your phone number. So I highly recommend to not do this stupidity.

2.  Do not post your personal information anywhere on any forum on darknet.


This is a very stupid mistake which most of the noobs make, remember not to do this because again you will be hampering your anonymity online thus defeating the whole purpose of using TOR in the first place.

3.  Do not send unencrypted data over TOR.

TOR encrypts your connection not your data and TOR's exit nodes are vulnerable. So it's highly recommended not to send your data uncrypted over TOR as data flowing through the last node is still accessible by it's controller.

4. Don't use TOR on windows.


Microsoft Windows is the most widely used operating system and as much as it is famous, it's just bagged with vulnerabilities, so there is still a high probability of revealing your identity if you use TOR on windows.


5.  Always delete cookies and browing history after last session.


Whenever you visit a website, the website always sends some small information and cookies. Always delete these at the end of session as it may allow the website to track your location and ip address.

Though latest version of TOR automatically deletes all these files after you end the session.

6. Never ever use Google search while on TOR.


If you want to be anonymous while using TOR, don’t use Google to search. Though it sounds weird, this is because Google collects information like your search requests, stores cookie files on your computer and tracks your browsing habits to power its advertisement services.

You don't want to do that. So use duckduckgo.com instead, they don't log your IP address or any other activity.

7.  Do not use HTTP sites on TOR.

By now you understand that TOR can be exploited using the vulnerabilities that exists at exit nodes.
So if you access HTTP sites on TOR there is a possibility that someone snoops on your data while it is on endpoints.


8.  Do not use torrent on TOR.


As Torrent is a Peer-to-Peer network it's not at all advisable to download torrents while on TOR as it will immediately reveal your IP address and thus revealing your identity.

9.  Disable javascript.


Always disable javascript on TOR browser as javascript sometimes records data or otherwise make you vulnerable to an attack.

10. Do not use other background apps while on TOR.

Avoid using any other application while using TOR because any other data sent by a background app while using TOR can compromise your real IP address.

11. Use the default screen resolution of TOR browser.


Do not use the TOR browser on full screen. Using the TOR browser on full screen mode can reveal your resolution and display settings which can be further exploited to gain more relevant knowledge about your computer thus compromising your anonymity.

Comments

Popular posts from this blog

What is a VPN? Why you should use one? What are the best VPN options out there?

What is a VPN? A Virtual Private Network (VPN) allows the user to extend a private network over a public network thus allowing the users to send and receive data securely even on unsecured public connections. VPN basically creates a tunnel between the user and the internet through which all the data is sent and received, thereby encrypting the data. Why you should start using one? It secures your computer’s internet connection to guarantee that all of the data you are sending and receiving is encrypted and secured from prying eyes.       2. It gives the user complete privacy by hiding their real IP address.      3. Some VPN services also provide DNS leakage protection which is actually one very good security feature to go for.     4. It helps the user to  bypass Regional Restrictions on data, for example the user can watch netflix content of some other nation or he/she can open a website which he/she earlier was unable to.    5. It keeps the use