Is Tor Safe and Completely Anonymous to Use?

is tor browser safe
Is downloading Tor safe?

Downloading Tor on your computer is safe and it’s completely legal to do so and to use it. However, keep in mind that you might get extra attention from your ISP if you do this, so it’s a good idea to hide your IP address with a VPN as you’re downloading Tor.

Is Tor safe? Not as much as you might think. Tor has certain security vulnerabilities that a skilled hacker or a government agency can exploit. However, there are ways to minimize these risks.

Staying safe and anonymous online is definitely no easy task as there are plenty of bad actors that want your sensitive data. Luckily, using the Tor browser can make your online experience more secure and private.

But to what degree? Is Tor browser safe 100% or are there ways for someone to see your browsing activities, IP address and even hack you? 

Unfortunately, the answer is that Tor is not completely safe and anonymous and we’ll show you in this article why, plus what you can do to make it more secure.

What is Tor and How to Use Tor Browser?

Before we delve deeper into Tor’s security issues, it’s important to understand how to use Tor browser and how it works in the first place.
First, you will need to download Tor from the Tor Project website. You can download it for Windows (32 and 64-bit), macOS (64-bit), GNU/Linux (32 and 64-bits and Android. Tor is also available in 32 different languages.

Tor is a free software that allows you to anonymously communicate online. This is done by sending your Internet traffic through “nodes”.
Nodes are run and maintained by Tor volunteers and anyone can run a node (not all nodes are safe, but more on that later).

Essentially, when using Tor, your Internet traffic passes through at least three of these nodes, starting with the entry or guard node, then through the relay or middle node, until it finally goes through the exit or final node before the browser finally opens the webpage or file you were looking for.

As your data passes through each of these nodes, Tor “peels off” a layer of encryption, like you would peel an onion, which is why the service got the name “the onion router”. 

Now with that explanation out of the way, let’s see if Tor is all that safe as it claims.tor defend yourself

Tor Risks and Security Issues

Unfortunately, like anything else in life (online or offline), Tor is not perfect either and it has its flaws.

We’ll go over the biggest ones here:

  1. It can leak your IP address

One of the biggest reasons why it’s not a good idea to rely solely on Tor if you want to stay anonymous online is that it can leak your IP address. 

In November, 2017, for example, a security firm, We Are Segment discovered a security vulnerability in Tor that could leak the user’s real IP address.

They named this TorMoil.

TorMoil specifically affected macOS and Linux users because of the way Firefox handles fille:// URLs, causing the operating system to completely bypass Tor Browser and directly connect to the host if the user clicks on a local file-based address.

Of course, devs quickly patched Tor, so this bug is no longer an issue, but that doesn’t mean there aren’t other ways Tor can leak your IP.

For instance, Windows DRM files can be used to deanonymize Tor users and reveal their IP addresses. 

What happens here is that attackers would use DRM-protected files such as Windows Media Player to lure Tor users into “validating their license”. Once the user clicks on the “Yes” button, they are redirected to an “authorization URL”, which contains malware and can expose their IP address.

  1. Your Connection between the Exit Node and the Destination Server is Unencrypted

As your data passes through Tor nodes, it will stay encrypted and Tor will remove a layer of encryption with each “bounce”.

However, once you get to the exit node, there is no more encryption between it and the destination server.

Even worse, according to Tor’s own documentation, whoever is running the exit node will be able to see your data and eavesdrop on your online communication.

Tor is a decentralized network, meaning that anybody can operate a node. 

Naturally, this has its good sides, but also its bad sides.

The bad side is that not everybody who runs a Tor node does so for altruistic reasons. 

Government agencies and hackers can (and do) operate nodes and that means they can see what you are doing online.

For example, in 2007, Swedish hacker Dan Egerstad managed to collect huge amounts of data, including from embassies, corporate email accounts and NGOs in mere months by setting up nodes on five computers in data centers around the world and simply monitoring them.

That was just one hacker, imagine what a more organized group, like a government agency could do.

For example, in 2014, during “Operation Onymous”, Europol seized several Tor nodes. This led to 400 seized hidden services and 17 arrests.

You can read more about the case on the Tor blog.

  1. There are Plenty of Malicious Nodes Out There

In a perfect world (and how we assume Tor devs intended it), going through Tor nodes would be completely safe.

However, that’s not the case and there are plenty of malicious nodes out there.

In 2016, professor Guevara Noubir and computer science Ph.D. student Amirali Sanatinia of the College of Computer and Information Science at Northeastern University discovered 110 malicious nodes in just 72 hours.

They published their findings in the research paper “HOnions: Toward Detection and Identification of Misbehaving Tor HSDirs”.

Furthermore, in 2014, a Russian hacker was using the Tor network to spread a powerful virus. He did this by modifying the exit nodes he was running to put his own executable in any program that the user would download over Tor.

  1. Tor Gets Funds from the US Government

While the amount that Tor receives in funding from the US government is dropping year-by-year (it was 85% in 2015 and then 51% in 2017), Tor still gets a good chunk of its funding from government agencies.

And this isn’t even a secret as Tor annually publishes a financial transparency report.

Specifically, throughout the years, Tor received:

Apart from government funding, there are three more ways Tor gets money. These are:

  • Individual donations and core organization support; used mainly for Tor’s day-to-day operations.
  • R&D funding from DARPA, Radio Free Asia and similar groups; used to build safer tools.
  • Research funding from the National Science Foundation and groups like it; used to improve Tor’s privacy and safety.
  1. Tor Devs Sometimes Work with Government Agencies

If you think all Tor developers are 100% opposed to working closely with government agencies, you are wrong. 

In fact, some of them have no qualms about this.

For example, Tor’s co-founder and current director and research director at Tor Project, Roger  Dingedine had an interesting email correspondence with the FBI and the Department of Justice, which you can read in full here.

At one point, Dingledine even says that he met with about 50 DoJ and FBI agents in San Diego on 22-23rd October.

To make things even worse, according to the FOIA (Freedom of Information Act) documents Tor privately tips off the government about security vulnerabilities before they alert the public about them.

For example, in an email to Dingledine, Tor developer Steven Murdoch wrote this about a security vulnerability they discovered:

“Currently this document is private, but eventually some or all of it should be public. I’ll leave this discussion for a later date, but essentially my thought is that while we should not rely on secrecy, it might be a good idea to delay the release of anything like “this attack is bad; I hope nobody realizes it before we fix it”.

  1. It’s Not Safe to Run an Exit Node Either

Of course, we still believe that the vast majority of people who run exit nodes do so out of good motives.

That said, before you decide to do so yourself, you should be aware that there are certain risks involved in operating a Tor exit node.

For instance, let’s say that criminals are using Tor for illegal activities, like distributing child pornography, selling girls into prostitution, or selling drugs. In that case, if the traffic goes through your exit node, the police will be able to track it to your IP address and knock on your door.

This happened in 2012 to a Tor node operator from Graz, Austria William Weber, when he was charged with distributing child pornography simply for running Tor exit nodes that criminals were using.

In another case, that happened a year before, Tor user Clemens Eisserer said that the police seized his hardware because someone was misusing the exit node he was running.

And these are just two cases where people were legally operating exit nodes, but ended up being charged with a crime because actual criminals were using their nodes.

  1. The FBI Doesn’t Need a Warrant to Spy on Tor Users

The Federal Bureau of Investigation (FBI) and other agencies like it don’t even need a warrant to spy on what you’re doing on Tor.

Government agencies normally do this when they need to catch criminals as they did in Operation Pacifier when they busted no less than 1,500 pedophiles visiting a child pornography site PlayPen on the Dark Web.

A senior US District Court Judge Henry Coke Morgan, Jr. ruled in relation to the case that the FBI does not need a warrant to hack into a US citizen’s computer system”.

Of course, you could say that these were criminals and that the FBI was justified, but a ruling like this opens the door for government agencies to spy on any Tor user without a warrant, regardless if he is a criminal or not.

How to Stay Safe on Tor?

Ok, with all (or at least the biggest) Tor issues laid out before us, how to stay safe on Tor?

There are a couple of things you can do:

  1. Turn the Safety to “High” in Settings

Note that some websites on Tor won’t work as well, or might even stop working entirely if you crank the safety slider all the way to “High” in the Tor browser settings, but this is a small price to pay to protect against JS hacking and online tracking.

  1. Install an Antivirus Software

Don’t rely too much on Tor’s safety settings (even if you boost them up to “High”. There are lots of folks out there, especially on the Dark Web, that won’t be deterred by this.

Instead, install a trustworthy antivirus software to add another layer of protection.

  1. Forget about Extensions on Tor

Keep the Tor browser clean from extensions and add-ons, unless it’s absolutely necessary to add them. This isn’t your Google Chrome that you would fill up with extensions. A bad extension might just add an extra security vulnerability that a hacker could exploit.

Even Tor Project itself warns against installing add-ons or plugins, saying:

“We do not recommend installing additional add-ons or plugins into Tor browser.

Plugins or addons may bypass Tor or compromise your privacy. Tor Browser already comes with HTTPS Everywhere, NoScript and other patches to protect your privacy and security.”

  1. Use Tor with a VPN

Is Tor safe without a VPN?

As you can see, Tor actually has quite a few vulnerabilities. Luckily, some of them can be mitigated and sometimes even completely eradicated by using a good Virtual Private Network or VPN.

Namely, using a VPN will do two things: hide your real IP address and encrypt your data. This will solve two of the problems we’ve outlined above – Tor leaking your IP address and the unencrypted connection between the exit node and the destination server.

There are two ways you can connect Tor with a VPN. Both have their advantages, but also some disadvantages you should know about.

The first is to use a VPN over Tor. This might be a bit more complicated as it requires you to connect via Tor and encrypt the data as it gets routed through the entry node. 

The advantages of this method are:

  • It filters all your traffic through Tor, even programs that aren’t compatible.
  • You can choose your server location and further boost your anonymity that way.
  • You can avoid blocked exit nodes and reduce the risk of no Internet connection.
  • Your IP is anonymized and the ISP will only be able to see the exit node IP address.
  • It will encrypt your data before entering or exiting Tor network and that way protects you against malicious exit nodes.

Here are the disadvantages of using a VPN over Tor:

  • You’ll be unable to access .onion sites and hidden services on Tor. Unfortunately, this is often the main point of using Tor in the first place.
  • Your Internet Service Provider will be able to see that you are using Tor to connect to the Internet. While using Tor itself is not illegal, it will almost certainly mark you as someone the police will pay more attention to.

The second, easier method, is to use Tor with a VPN.

The advantages of this method are:

  • The VPN will hide your real IP, which means that your ISP will be oblivious to you using Tor.
  • Tor will remain accessible. As you saw in the previous method, .onion sites and hidden services will be inaccessible if you use a VPN over Tor. However, with this method, that’s not the case if you are using a VPN as the entry node.
  • It’s much easier to set up. All you need to do is activate the VPN first and then start using Tor.

There are, however, some disadvantages of using Tor in combo with a VPN and they are mostly related to the exit nodes:

  • You’re vulnerable if the VPN connection drops and your data could be exposed to the ISP.
  • It’s also possible to be left unable to connect to the Internet if your exit node is blocked.
  • Exit nodes will be unencrypted and you can be tracked by your ISP.

Conclusion

As you can see, Tor is not the ultimate online privacy and security solution. It has its flaws, but you can address most of them by being smart when you use Tor and especially by using a VPN.

Once you start doing that, the answer to the question we posed “is Tor safe from viruses?” suddenly becomes a more clear “Yes”.

You can use CTemplar over Tor. Sign up with CTemplar and visit us on the official CTemplar .onion address to make your email even more anonymous and secure.