Before you post please read how to get help
Quick question on whether the instructions for installing the Tor browser on Mint 17.3 are ok to use for Mint 18? Thought it better to ask before installing it and having problems. I noticed there was a Tor option in the Software area, I did install that but it doesn't show up anywhere that I can find to click on to use. Guessing I need to type in commands that I've seen in instructions for 17.3.
this way you can delete the extracted folder when you're session is done and have a fresh tor every time you start it. no sense in keeping it installed on your system if you are using it for privacy reasons
Then, doing the described steps to Linux from Tor Browser official website: https://www.torproject.org/projects/tor ... l.en#linux, Will this be installed as a "Portable" program on Linux distros?
I read your advice, trytip.
There is the brief method through PPA repository described here: https://mintguide.org/internet/33-insta ... a-ppa.html, the webupd8team Tor works to me, it looks reliable.
The other Tor coming from Upubuntu, it didn't work to me.
LM 17.3 Mate.
and also yes, TOR is not much safer these days than a good firefox profile. but it being so slow i would only use it to get into sites that are blocked by your isp or country on the http protocol. the .onion network is still mainly hidden and safe enough but TOR is being WATCHED by FBI
I have been using the Webupd8 PPA for years to install and keep the Tor Browser bundle up to date and working. It has always worked for me. But, as was already mentioned, you can just download the Tor Browser bundle, and extract it to your "Home" folder, and run it that way.
Here are two interesting links regarding the "Tor" project, which states that it is still secure, but the user has to use it properly, and to be able to recognize warnings, or potential threats, etc... Read the comments as well.
Tor anonymity compromised by researchers, Aug. 03 2015
http://www.techradar.com/us/news/intern ... rs-1300922
https://www.quora.com/Has-the-Tor-Netwo ... f-the-user
Hope this helps ...
Install Whonix in a virtual machine:
This privacy/anonymity-centric OS installs Tor with important configurations and safeguards that are frequently overlooked (time attacks, DNS forwarding, etc.). It's based on Debian so it's a familiar environment for Mint users. I installed this in a KVM but Whonix has a wiki page for the VBox install. Definitely give it a try.
A related curiosity is the Qubes OS. It's an interesting study. There are some hardware restrictions and it's yum but, what the heck, I tried it out on a duel-boot and learned a great deal in the process. (Just a note; one laptop manufacturer ships their product with Qubes pre-installed.)
you can't use TOR for http/https it's useless and slow ... it's mainly for .onoin network and you don't know what the .onion network is you shouldn't even bother with TOR
If a person wants to evade government surveillance, then they should use a one-tme-pad and an offshore numbers station.
For the rest of us, if you are willing to tolerate a slow connection to selected commercial sites, Tor is an effective way to fuzz your geolocation, PII, and visitor footprint and predictability. It's also a hoot to see sites recommend restaurants in London when you're actually fishin' in the Louisiana Bayou. Your favorite social media site tells your friends you are touring South America and Italy. Oh, and Facebook has an onion.
IMHO, it is just smart to try and be as secure and anonymous while surfing the Internet as you can be.
The "Tor Browser Bundle" is great, but as others have mentioned, you do not have any idea where your current Tor server connection might be from, what country, nor do I think you can control that, and that can skew your web browser results. Like user "trapperjohn" stated, it may appear that you are anywhere in the world, maybe in a different language, rather than where you are. So, your search results, and other websites, will reflect that, which is not necessarily a good thing. If you are trying to locate something in your area, like a restaurant or whatever, your results are going to show wherever your Tor connections are at the moment; which means if you are in the USA, your results could be some place in Europe or elsewhere in the world. Of course, you can be more specific when asking in your search to get the correct results. For this reason, I do not think that using Tor is for every day, all day, surfing the Internet, but rather for those special times, when your doing something on the Internet that requires more security and anonymity.
Anyone can make their system more secure and more anonymous, using any browser to surf the Internet, by:
1.) Changing your Local ISP connection's DNS server IP addresses to a neutral, secure, & anonymous, DNS provider's server IP addresses, like from the "openNic project", or "dns.watch", or "openDNS", etc... It is an easy thing to do. Personally, I think everyone should do this immediately, if you have not done this already. There are many advantages to this, besides the security and anonymity, like it can help you visit websites that your ISP might be blocking (which they do), usually faster speeds, probably more search results without a bias, and some can protect you from known "bad" websites that can harm your computer systems, and or for parental control.
2.) Additionally, using a VPN provider is another excellent way to make your surfing the Internet more secure and more anonymous, like the excellent, low-cost, system-wide, "Private Internet Access (PIA)" VPN provider with great service, and speed, and access to server connections world wide.
Having access to connect to VPN servers outside of where you are is important to view "geo-blocked" content which is where countries are (still unbelievably) blocking people from outside of that country from viewing their websites. So, if you wanted to see videos from the British News (BBC), or an Adele concert only available on BBC iPlayer, you could just connect to a UK server there, and be able to read, watch, or listen to, those videos and broadcasts. Another example is, you might be from one country, but happen to be in another country right now, and are homesick (want) to hear (or view) news, or music, or watch a local TV channel through the Internet, catch up with distant relatives, etc..., or maybe you are just curious and want to learn more about that country, then you could just connect to a VPN server in that country to do this.
And even the free VPN providers are better than using no VPN provider, like "vpnbook" or "vpngate". "vpnbook" is really nice, and pretty fast too, but they only have a few world-wide VPN servers, and they change their logon passwords every other week, which means you will have to update your VPN connections passwords every time they do that (not hard to do), and they allow no torrenting or p2p. "vpngate" is really nice as well, has locations all over the world, the logon is always the same, you can do whatever you want, but their VPN servers come and go; so one day you might be using a server connection, and the next day it no longer works, so you have to delete the non-working VPN connection, go to "vpngate" website, download another server configuration file for whatever country you wan to connect to, and set that VPN up, and try again. It is not hard to do once you have done some, but it is annoying to have to do it a lot.
There are also really nice & reliable VPN providers that are using VPN browser plug-ins that you can simply add to your browser(s), like "Hoxx" VPN, and "DotVPN", among others; these offer free VPN access to servers world wide, and low-cost paid for options as well which provide faster access and more server locations. But, browser VPN add-ons will not secure your whole system and all your programs accessing the Internet, like a "system-wide" VPN will do. This means that if you are using a desktop messaging client, or streaming (viewing or sending) video or audio through other applications, multi-media servers, Torrent clients, etc... that are run outside of the browsers, then these are not protected by the browser VPN add-ons, but these would be protected from a system-wide VPN provider. Some messaging clients are already secure whether you use a VPN or not ("QTox", "Jitsi", Linphone, Ekiga, KDE Telepathy, Empathy, Wickr, (Not Skype), etc...) Note, that It is easier to install and use a browser VPN add-on than setting up a "system-wide" VPN though. Although, once a "system-wide" VPN is installed and setup, it is truly simple to manage your VPN connection(s) through the Linux Mint Network Manager in your system tray panel, and all your programs that access the internet are protected by it.
3.) You can also "double up", or "Triple up", on your security and anonymity, by using a "system-wide" VPN, and a browser VPN, and or using the Tor Browser as well when needed or wanted.
Hope this helps ...
The first is courtesy of the Electronic Frontiers Foundation: https://panopticlick.eff.org/
(When the test is done, you may have to click show full results for fingerprinting to see the nitty gritty details.)
Of special interest is the uniqueness of your browser (being unique is bad for anonymity). For example, on my desktop running Firefox 47.0 with a customized about:config, locked-down with No-Script, one out of every 1020 users are like me. For comparison, I have Debian Jessie VM with Firefox 45.0.2 where one in every 133,000 users are like me. Based on this one one parameter I am about 100 times more identifiable if I browse with the VM. If you live in a city with a population of ~130,000 people and you are using my Jessie VM, then you are probably the only one in town with that profile. (You can tweak this a bit with useragent switchers, etc.) You can take your laptop to the candy store 800 miles away and you will still show the same results for this statistic.
With my Whonix Tor Browser (6.0.2), which one might think would be rather unique, one in 1300 people are like me.
The next site is http://haunted-river.net/rdns2.php
This is a site that I setup as a test platform and the page linked above is intended to show what a given machine reveals (handy in my trade). The host server is located in Ohio so the time stamp is central time, easily converted to the time of day at the location revealed. It knows my IP, my ISP, my unique ISP account number, my browser, my OS platform, my city, country, region, language, and my character encoding.
Humm, hello world, it's 7:45 , I'm in Wastewater Texas, and my Verizon account is XYZ. By the way I use en_US.UTF-8 on a Linux computer and I'm using Firefox 47.0. I have nothing to hide but I'm not sure I'd step up to some suspicious slug on the street corner and tell 'em all this.
On the tor browser, I am in Holland today, my ISP is torservers, the IP is not my own, the time is off, there's no account number, I am using Firefox/Win32.. However, fortunately for me, It does preserve the fact that I speak English, so my searches don't crop up in a language I don't speak.
BTW: What is the most identity-revealing thing in this post? It's my sentence construction, the words I use, the mistakes I make, and the way I punctuate. You reveal your identity to big data by your voice as it occurs in writing. It's as good as a fingerprint.
There is however a newish development, known as the EOMA68 Computing Standard. Have a look at this development if you are super-paranoid (like me) forget about Tor and use these devices in due course.
I wonder, if Tor browser was a choice, Could this "official Tor Repository to Ubuntu versions" be successfull to Linux Mint 17, 18??:
If your issue is solved, kindly indicate that by editing the first post in the topic, and adding [SOLVED] to the title. Thanks!
I added the official Tor repository and its gpg key, then after, I installed tor and its deb.torproject.org-keyring, as it says there.
What do features I get with them installed?
Please, if someone can try, and instruct us.
Then, could we install "Tor Browser" and keep it Updated with this Official Tor Repository?
Info from Tor website https://www.torproject.org/docs/debian.html.en#ubuntu:
To Ubuntu Trusty:
You need to add the following entry in /etc/apt/sources.list or a new file in /etc/apt/sources.list.d/:
Code: Select all
deb http://deb.torproject.org/torproject.org trusty main deb-src http://deb.torproject.org/torproject.org trusty main
Code: Select all
gpg --keyserver keys.gnupg.net --recv A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 gpg --export A3C4F0F979CAA22CDBA8F512EE8CBC9E886DDD89 | sudo apt-key add -
Code: Select all
$ apt-get update $ apt-get install tor deb.torproject.org-keyring
I think. Perhaps, this prior steps are not necessary to using Tor browser.
https://www.torproject.org/projects/tor ... l.en#linux :
Download the architecture-appropriate of .tar.xz Tor-browser-linux package (eg: v6.0., save it somewhere, then run one of the following two commands to extract the package archive:
Code: Select all
tar -xvJf tor-browser-linux32-6.0.8_LANG.tar.xz
Code: Select all
tar -xvJf tor-browser-linux64-6.0.8_LANG.tar.xz
Once that's done, switch to the Tor browser directory by running:
Code: Select all
To run Tor Browser, click either on the Tor Browser or the Tor Browser Setup icon or execute the start-tor-browser.desktop file in a terminal:
Code: Select all
Reason: normailized font
Tor unexpectedly exited. This might be due to a bug in Tor itself, another program on your system, or faulty hardware. Until you restart Tor, the Tor Browser will not be able to reach any websites. If the problem persists, please send a copy of your Tor Log to the support team.
Mobo: X570 GAMING X
Resolution: 1920x1080@60Hz, 1920x1080@60Hz
DE: Cinnamon 4.4.8
WM: Mutter (Muffin)
CPU: AMD Ryzen 9 3900X 12- (24) @ 3.800GHz
GPU: AMD Radeon RX 5700 XT