Anonymous browsing with Tor reduces exposure
by GLENN FLEISHMAN
Feb 17, 2017
3 minutes
You can be tracked and have your data intercepted from many angles, by legitimate and illegitimate actors alike: governments, criminals, personal enemies, corporate spies, children without moral compasses, you name it. Many techniques let you encrypt and shield your data at rest— on your devices and on remote servers— and in transit.
Each Tor session creates a “circuit” through intermediate routers, none of which knows the full path.
ut there’s one problem with all the shields you can put up: when you need to use, as activists and average citizens in many countries have discovered.
You’re reading a preview, subscribe to read more.
Start your free 30 days