{"id":52549,"date":"2024-11-07T04:14:46","date_gmt":"2024-11-07T09:14:46","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=52549"},"modified":"2024-11-07T04:35:13","modified_gmt":"2024-11-07T09:35:13","slug":"what-you-need-to-know-about-tor-browser-and-anonymity","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/52549\/","title":{"rendered":"Tor Browser and anonymity: what you need to know"},"content":{"rendered":"<p>The desire to remain anonymous online is as old as the internet itself. In the past, users believed hiding behind a nickname meant they could badmouth their neighbors on local forums with impunity. Now, such trolls can be identified in seconds. Since those early days, technology has taken a quantum leap: distributed networks, anonymous browsers, and other privacy tools have emerged. One of these tools, which was heavily <a href=\"https:\/\/blog.torproject.org\/tor-in-2023\/\" target=\"_blank\" rel=\"nofollow noopener\">promoted<\/a> a decade ago by former <a href=\"https:\/\/en.wikipedia.org\/wiki\/National_Security_Agency\" target=\"_blank\" rel=\"nofollow noopener\">NSA<\/a> contractor Edward Snowden, is the <a href=\"https:\/\/www.torproject.org\/\" target=\"_blank\" rel=\"nofollow noopener\">Tor Browser<\/a>, where \u201cTOR\u201d is an acronym for \u201cThe Onion Router\u201d.<\/p>\n<p>But in today\u2019s world, can Tor truly provide complete anonymity? And if it doesn\u2019t, should we just forget all about anonymity and rely on a regular browser like Google Chrome?<\/p>\n<h2>How Tor users are deanonymized<\/h2>\n<p>If Tor is new to you, check out our <a href=\"https:\/\/www.kaspersky.com\/blog\/tor-faq\/3987\/\" target=\"_blank\" rel=\"noopener nofollow\">vintage article<\/a> from way back when. There, we answered some common questions: how the browser ensures anonymity, who needs it, and what people usually do on the dark web. In brief, Tor anonymizes user traffic through a distributed network of servers, called nodes. All network traffic is repeatedly encrypted as it passes through a number of nodes between two communicating computers. No single node knows both the origin and destination addresses of a data packet, nor can it access the packet\u2019s content.\u00a0OK, short digression over \u2014 now let\u2019s turn to the real security threats facing anonymity enthusiasts.<\/p>\n<p>In September, <a href=\"https:\/\/www.ndr.de\/fernsehen\/sendungen\/panorama\/aktuell\/Investigations-in-the-so-called-darknet-Law-enforcement-agencies-undermine-Tor-anonymisation,toreng100.html\" target=\"_blank\" rel=\"nofollow noopener\">German intelligence services identified<\/a> a Tor user. How did they do it? The key to their success was data obtained through what\u2019s called \u201ctiming analysis\u201d.<\/p>\n<p>How does this analysis work? Law enforcement agencies monitor Tor exit nodes (the final nodes in the chains that send traffic to its destination). The more Tor nodes the authorities monitor, the greater the chance a user hiding their connection will use one of those monitored nodes. Then, by timing individual data packets and correlating this information with ISP data, law enforcement can trace anonymous connections back to the end Tor user \u2014 even though all Tor traffic is encrypted multiple times.<\/p>\n<p>The operation described above, which led to the arrest of the administrator of a child sexual abuse platform, was possible partly because Germany hosts the <a href=\"https:\/\/tormap.org\/\" target=\"_blank\" rel=\"nofollow noopener\">highest number of Tor exit nodes<\/a> \u2014 around 700. The Netherlands ranks second with about 400, and the US comes in third with around 350. Other countries have anywhere from a few to a few dozen. International cooperation among these top exit-node countries played a significant role in deanonymizing the child sexual abuse offender. Logically, the more nodes a country has, the more of them can be state-monitored, increasing the likelihood of catching criminals.<\/p>\n<div id=\"attachment_52553\" style=\"width: 1066px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/11\/07040831\/what-you-need-to-know-about-tor-browser-and-anonymity-01.jpg\"><img decoding=\"async\" aria-describedby=\"caption-attachment-52553\" class=\"size-full wp-image-52553\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/11\/07040831\/what-you-need-to-know-about-tor-browser-and-anonymity-01.jpg\" alt=\"Germany and the Netherlands are among the leaders on the number of Tor exit nodes \u2014 not only in Europe but worldwide.\" width=\"1056\" height=\"711\"><\/a><p id=\"caption-attachment-52553\" class=\"wp-caption-text\">Germany and the Netherlands are among the leaders on the number of Tor exit nodes \u2014 not only in Europe but worldwide. <a href=\"https:\/\/tormap.org\/\" target=\"_blank\" rel=\"nofollow noopener\">Source<\/a><\/p><\/div>\n<p>The Tor Project <a href=\"https:\/\/blog.torproject.org\/tor-is-still-safe\/\" target=\"_blank\" rel=\"nofollow noopener\">responded<\/a> with a blog post discussing the safety of their browser. It concludes that it\u2019s still safe: the de-anonymized individual was a criminal (<em>why else would authorities be interested?<\/em>), using an outdated version of Tor and the <a href=\"https:\/\/www.ricochetrefresh.net\/\" target=\"_blank\" rel=\"nofollow noopener\">Ricochet<\/a> messaging app. However, Tor noted it wasn\u2019t given access to the case files, so their interpretation regarding the security of their own browser might not be definitive.<\/p>\n<p>This kind of story isn\u2019t new; the problem of timing attacks has long been known to the Tor Project, intelligence agencies, and researchers. So although the attack method is well-known, it remains possible, and most likely, more criminals will be identified through timing analysis in the future. However, this method isn\u2019t the only one: in 2015, our experts conducted <a href=\"https:\/\/securelist.com\/uncovering-tor-users-where-anonymity-ends-in-the-darknet\/70673\/\" target=\"_blank\" rel=\"noopener\">extensive research<\/a> detailing other ways to attack Tor users. Even if some of these methods have become outdated in the forms presented in that study, the principles of these attacks remain unchanged.<\/p>\n<h2><strong>\u201cGenerally it is impossible to have perfect anonymity, even with Tor\u201d.<\/strong><\/h2>\n<p>This phrase opens the \u201cAm I totally anonymous if I use Tor?\u201d section of the Tor Browser <a href=\"https:\/\/support.torproject.org\/faq\/\" target=\"_blank\" rel=\"nofollow noopener\">support page<\/a>. Here, the developers provide tips, but these tips can at best only increase the chances of remaining anonymous:<\/p>\n<ul>\n<li><strong>Control what information you provide through web forms. <\/strong>Users are advised against logging in to personal accounts on social networks, as well as posting their real names, email addresses, phone numbers, and other similar information on forums.<\/li>\n<li><strong>Don\u2019t torrent over Tor. <\/strong>Torrent programs often bypass proxy settings and prefer direct connections, which can de-anonymize all traffic \u2014 including Tor.<\/li>\n<li><strong>Don\u2019t enable or install browser plugins. <\/strong>This advice also applies to regular browsers, as there are many <a href=\"https:\/\/www.kaspersky.com\/blog\/dangerous-browser-extensions-2023\/50059\/\" target=\"_blank\" rel=\"noopener nofollow\">dangerous extensions<\/a> out there.<\/li>\n<li><strong>Use<\/strong> <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/https\/\" target=\"_blank\" rel=\"noopener\"><strong>HTTPS<\/strong><\/a><strong> versions of websites. <\/strong>This recommendation, incidentally, applies to all internet users.<\/li>\n<li><strong>Don\u2019t open documents downloaded through Tor while online. <\/strong>Such documents, the Tor Project warns, may contain malicious exploits.<\/li>\n<\/ul>\n<p>With all these recommendations, the Tor Project is essentially issuing a disclaimer: \u201cOur browser is anonymous, but if you misuse it, you may still be exposed\u201d. And this actually makes sense \u2014 your level of anonymity online depends primarily on your actions as a user \u2014 not solely on the technical capabilities of the browser or any other tool.<\/p>\n<p>There is another interesting section on the Tor support page: \u201cWhat attacks remain against onion routing?\u201d It specifically mentions possible attacks using timing analysis with the note that \u201cTor does not defend against such a threat model\u201d. However, in a post about the German user\u2019s de-anonymization, the developers claim that an add-on called <a href=\"https:\/\/github.com\/mikeperry-tor\/vanguards\/blob\/master\/README_TECHNICAL.md\" target=\"_blank\" rel=\"nofollow noopener\">Vanguard<\/a>, designed to protect against timing attacks, has been <a href=\"https:\/\/blog.torproject.org\/announcing-vanguards-add-onion-services\/\" target=\"_blank\" rel=\"nofollow noopener\">included<\/a> in Tor Browser since 2018, and in Ricochet-Refresh since June 2022. This discrepancy suggests one of two things: either the Tor Project hasn\u2019t updated its documentation, or it\u2019s being somewhat disingenuous. Both are problematic because they can mislead users.<\/p>\n<h2>So what about anonymity?<\/h2>\n<p>It\u2019s important to remember that Tor Browser can\u2019t guarantee 100% anonymity. At the same time, switching to other tools built on a similar distributed node network structure is pointless, as they are equally vulnerable to timing attacks.<\/p>\n<p>If you\u2019re a law-abiding individual using anonymous browsing simply to avoid intrusive contextual ads, secretly shop for gifts for loved ones, and for other similarly harmless purposes, the private browsing mode in any regular browser will probably suffice. This mode, of course, doesn\u2019t offer the same level of anonymity as Tor and its counterparts, but it can make surfing the net a bit more\u2026 well, private. Just make sure you fully understand <a href=\"https:\/\/www.kaspersky.com\/blog\/incognito-myth-how-private-browsing-works\/51408\/\" target=\"_blank\" rel=\"noopener nofollow\">how this mode works in different browsers, and what it can and can\u2019t protect you from<\/a>.<\/p>\n<p>In addition, all of our <a href=\"https:\/\/www.kaspersky.com\/home-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_blo_lnk_sm-team______\" target=\"_blank\" rel=\"noopener nofollow\">home security solutions<\/a><strong>\u00a0<\/strong>include <a href=\"https:\/\/support.kaspersky.com\/kaspersky-for-windows\/21.19\/93724\" target=\"_blank\" rel=\"noopener\">Private Browsing<\/a>. By default, this feature detects attempts to collect data and logs them in a report but doesn\u2019t block them. To block data collection, you need to either enable <a href=\"https:\/\/support.kaspersky.com\/kaspersky-for-windows\/21.19\/93505\" target=\"_blank\" rel=\"noopener\">Block data collection<\/a> in the Kaspersky app or activate the <a href=\"https:\/\/support.kaspersky.com\/kaspersky-for-windows\/21.19\/93503\" target=\"_blank\" rel=\"noopener\">Kaspersky Protection plugin<\/a> directly in the browser.<\/p>\n<p>Besides this, <a href=\"https:\/\/www.kaspersky.com\/home-security?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_blo_lnk_sm-team______\" target=\"_blank\" rel=\"noopener nofollow\">our protection<\/a>\u00a0can also <a href=\"https:\/\/support.kaspersky.com\/kaspersky-for-windows\/21.19\/89109\" target=\"_blank\" rel=\"noopener\">block ads<\/a>, <a href=\"https:\/\/support.kaspersky.com\/kaspersky-for-windows\/21.19\/222845\" target=\"_blank\" rel=\"noopener\">prevent the hidden installation of unwanted apps<\/a>, detect and remove <a href=\"https:\/\/support.kaspersky.com\/kaspersky-for-windows\/21.19\/222844\" target=\"_blank\" rel=\"noopener\">stalkerware<\/a> and <a href=\"https:\/\/support.kaspersky.com\/kaspersky-for-windows\/21.19\/222846\" target=\"_blank\" rel=\"noopener\">adware<\/a>, and <a href=\"https:\/\/support.kaspersky.com\/kaspersky-for-windows\/21.19\/70902\" target=\"_blank\" rel=\"noopener\">remove traces of your activity<\/a> in the operating system. Meanwhile, the special component <a href=\"https:\/\/support.kaspersky.com\/kaspersky-for-windows\/21.19\/70744\" target=\"_blank\" rel=\"noopener\">Safe Money<\/a> provides maximum protection for all financial operations by conducting them in a protected browser in an isolated environment and preventing other apps from gaining unauthorized access to the clipboard or taking screenshots.<\/p>\n<h2>Double VPN<\/h2>\n<p>You can also stay anonymous on the internet using <a href=\"https:\/\/www.kaspersky.com\/vpn-secure-connection?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____vpn___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky VPN Secure Connection<\/a> that support Double VPN (also known as multi-hop). As the name suggests, this technology allows you to create a chain of two VPN servers in different parts of the world: your traffic first passes through an intermediary server, and then through another. Double VPN in <a href=\"https:\/\/www.kaspersky.com\/vpn-secure-connection?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____vpn___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky VPN Secure Connection<\/a><strong>\u00a0<\/strong>uses nested encryption \u2014 the encrypted tunnel between the client and the destination server runs inside a second encrypted tunnel between the client and the intermediary server. Encryption in both cases is only performed on the client side, and data is not decrypted on the intermediary server. This provides an additional layer of security and anonymity.<\/p>\n<p>Double VPN is available to users of Windows and Mac versions of <a href=\"https:\/\/www.kaspersky.com\/vpn-secure-connection?icid=gl_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____vpn___\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky VPN Secure Connection<\/a>. Before enabling <a href=\"https:\/\/support.kaspersky.com\/ksec-for-windows\/5.19\/255391\" target=\"_blank\" rel=\"noopener\"><strong>Double VPN<\/strong><\/a>, make sure that the <a href=\"https:\/\/support.kaspersky.com\/ksec-for-windows\/5.19\/236273\" target=\"_blank\" rel=\"noopener\">Catapult Hydra protocol is selected<\/a> in the application settings: <strong>Main \u2192 <\/strong><strong>Settings (gear icon) \u2192 Protocol \u2192 Select automatically, or Catapult Hydra<\/strong>.<\/p>\n<p><strong>After that, you can enable Double VPN: <\/strong><\/p>\n<ol>\n<li>Open the main application window.<\/li>\n<li>Click the <strong>Location<\/strong> drop-down to open the list of locations of VPN servers.<\/li>\n<li>Click the <strong>Double VPN<\/strong><\/li>\n<li>Select two locations and click <strong>Connect<\/strong>.<\/li>\n<\/ol>\n<p>You can add your\u00a0Double\u00a0VPN server pair to\u00a0<strong>Favorites<\/strong>\u00a0by clicking the\u00a0<strong>Add to Favorites<\/strong>\u00a0button.<\/p>\n<div id=\"attachment_52552\" style=\"width: 837px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/11\/07040406\/what-you-need-to-know-about-tor-browser-and-anonymity-02-EN.png\"><img decoding=\"async\" aria-describedby=\"caption-attachment-52552\" class=\"size-full wp-image-52552\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2024\/11\/07040406\/what-you-need-to-know-about-tor-browser-and-anonymity-02-EN.png\" alt=\"How to enable Double VPN in Kaspersky VPN Secure Connection\" width=\"827\" height=\"567\"><\/a><p id=\"caption-attachment-52552\" class=\"wp-caption-text\">How to enable Double VPN in Kaspersky VPN Secure Connection<\/p><\/div>\n<p>Congratulations! Now your traffic is encrypted more securely than usual \u2014 but remember that these traffic encryption methods are not intended for illegal activities. Double VPN will help you conceal personal information from data-gathering sites, avoid undesirable ads, and access resources unavailable in your current location.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksec\">\n","protected":false},"excerpt":{"rendered":"<p>The Tor Browser is a bastion of online anonymity, yet even this tool can\u2019t ensure complete privacy \u2014 and here&#8217;s why.<\/p>\n","protected":false},"author":2754,"featured_media":52550,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788],"tags":[1052,1278,43,558],"class_list":{"0":"post-52549","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"tag-anonymity","9":"tag-browsers","10":"tag-privacy","11":"tag-tor"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/52549\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/28257\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/23509\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/12151\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/30649\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/28394\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/27807\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/30549\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/29293\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/38482\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/12952\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/22377\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/23128\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/31763\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/what-you-need-to-know-about-tor-browser-and-anonymity\/37389\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/29463\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/what-you-need-to-know-about-tor-browser-and-anonymity\/28454\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/34349\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/what-you-need-to-know-about-tor-browser-and-anonymity\/33975\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/tor\/","name":"tor"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/52549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2754"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=52549"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/52549\/revisions"}],"predecessor-version":[{"id":52557,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/52549\/revisions\/52557"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/52550"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=52549"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=52549"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=52549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}