Hi everyone! We're hard at work trying to keep our community clean, so if you see any spam, please report it here and we'll review ASAP!  Thanks a million!
8,819 Users Online
  • 640,129,772 Downloads
  • 1,696,349 Wallpapers
  • 1,565,068 Members
  • 12,971,712 Votes
  • 5,965,287 Favorites
pamelapatterson
pamelapatterson
Login to Become a Fan
 
ProfileWallpapers (1)Favorites (0)Journal (1)DiscussionContact Member
Journal for pamelapattersonJournal for pamelapatterson
Feb
25
Geeky


What is Tor?

Tor, short for The Onion Router, is an online privacy service. This is a decentralized system that enables users to connect through a relay network rather than establish a direct connection. The advantage of this method is that your IP address is not visible to the sites you visit: your connection randomly jumps from server to server, which inevitably leads to the loss of the ability to track your path.

Disadvantages:

Despite the fact that your data is encrypted on each of the relay nodes, the endpoint of the connection on the last relay may be insecure if the desired site does not use SSL, In addition, it is known that the Tor service significantly slows down the opening of sites due to that your data should go through several nodes. The Tor service was developed in conjunction with the U.S. Navy specifically for those who do not want government agencies to track their actions. Tor is now used by many government agencies. Since the Tor service is actively used by dissidents, journalists, and even criminal elements, intelligence agencies of many countries pay special attention to Tor users. As a result, when using this system, you can be attributed to unreliable elements and begin to monitor your actions on the Internet.


What is a VPN?

VPN (Virtual Private Network) is a network connection that allows you to create a secure connection with another host, giving the impression that you are in a sudden place. You do not have to download it as an application, there is also a VeePN extension for chrome. Your computer generates an encrypted virtual tunnel leading to the VPN server, and all your Internet activities look like they come from this VPN server. All Internet traffic passes through this encrypted tunnel, which protects your data from those who wish to grab them on the way from the computer to the VPN server.

Disadvantages:

It is very important to use a quality VPN service that does not store data or data exchange logs. In the event that the government service requires the disclosure of logs from the VPN service provider, unauthorized persons may access the user data. In addition, it is very important that the VPN service uses proper load balancing and server randomization: in this case, users always connect to different VPN servers.

The PIA does not store data exchange logs - thus, your data is always safe.


What is a proxy?

A proxy, like a VPN, directs your traffic through a different computer than yours. There are private and public proxies, but only private proxies, usually paid ones, can provide stability and reliability.

Disadvantages:

The most common proxy protocols used today are SOCKS and HTTP / HTTPS. SOCKS and HTTP do not provide encryption, while HTTPS proxies provide the same level of encryption as any website that uses SSL. However, proxies are not designed to protect all of your Internet traffic: they usually protect only browser traffic. More generally, many proxies transmit the user\'s initial IP address to the target site, which makes them unusable by users for whom security and privacy are important. Finally, proxies must be manually configured for each application (mail client, browser, third-party applications), and some applications may not support proxies.
Times Viewed: 106Bookmark and Share
0 responses have been posted to this journal entry. Post Your Response!
Advertisement

Recently Spotted Members


No members found. Be the first.