{"id":19506,"date":"2021-10-03T21:01:50","date_gmt":"2021-10-03T13:01:50","guid":{"rendered":"https:\/\/www.hongkiat.com\/blog\/?p=19506"},"modified":"2021-10-01T19:11:22","modified_gmt":"2021-10-01T11:11:22","slug":"do-donts-tor-network","status":"publish","type":"post","link":"https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/","title":{"rendered":"The Do&#8217;s and Don&#8217;ts of Tor Network"},"content":{"rendered":"<p><strong>The Onion Router<\/strong> aka <a target=\"_blank\" href=\"https:\/\/www.hongkiat.com\/blog\/introductions-to-bitcoins-tor-network\/\" rel=\"noopener\">TOR<\/a> is a <strong>free software and open network<\/strong> that allows people to improve their privacy and security on the Internet. There is nothing better than Tor when the fear of ongoing large-scale surveillance by NSA haunts those <strong>concerned about the privacy of their digital communications<\/strong>. Tor secretly routes your system\u2019s Internet traffic over several places on the Internet, thus hiding the real source of the communication, and securing your personal identity.<\/p>\n<p>Tor itself can\u2019t guarantee your <a target=\"_blank\" href=\"https:\/\/www.hongkiat.com\/blog\/secure-mobile-payment-tips\/\" rel=\"noopener\">privacy and security<\/a> if you\u2019re not concerned enough. It\u2019s like carrying an umbrella. You can have it with you but there\u2019s no protection from the rain if you don\u2019t use it correctly. In the same manner, you need to <strong>know and understand Tor\u2019s usage tips and guidelines<\/strong> to keep your privacy and security in complete control.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-1\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/safeguard-online-privacy\/\" class=\"ref-block__link\" title=\"Read More: 9 Simple Tips to Safeguard Your Online Privacy\" rel=\"bookmark\"><span class=\"screen-reader-text\">9 Simple Tips to Safeguard Your Online Privacy<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/safeguard-online-privacy.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-18531 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/safeguard-online-privacy.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">9 Simple Tips to Safeguard Your Online Privacy<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tFrom social networking sites to online banking services, the Internet is indeed permeating into our lives like never...\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<p>Fortunately, we have compiled a list of tips and tricks for using Tor to strictly protect your online communications. Keep on reading to learn how to better protect your digital identity and information using Tor.<\/p>\n<h2>1. Do use Tor<\/h2>\n<p>Anyone concerned about online privacy should never trust the people at the back of the Internet such as internet service providers, government agencies, web service providers, etc. Tor network is<strong> well known for providing online anonymity<\/strong>, and that\u2019s the biggest reason why you should use it.<\/p>\n<p>Tor can be used for any and all kind of <strong>sensitive browsing<\/strong> including, but not limited to, reporting abuse or corruption; serious business activities; inter-state or inter-country communications; publishing anonymous posts; sharing personal secrets with family and friends, etc.<\/p>\n<h2>2. Don\u2019t use Windows<\/h2>\n<p>Windows is simply not the best choice of platform to use Tor in an attempt to improve one\u2019s Internet privacy because of the <strong>security bugs and vulnerabilities present in the system<\/strong> may <strong>compromise your privacy<\/strong>, even when using Tor.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/do-donts-tor-network\/1-whonix.jpg\" alt=\"whonix\" width=\"600\" height=\"451\"><\/figure>\n<p><small>(Image source: <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.whonix.org\/wiki\/Screenshots\">whonix.org)<\/a><\/small><\/p>\n<p>That is why you shouldn\u2019t be browsing websites through Tor on Windows systems. You should consider <strong>running Tor-configured Linux systems<\/strong> such as <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/tails.boum.org\/\">Tails<\/a> and <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.whonix.org\/\">Whonix<\/a>, or you can set up Tor on any of your favorite Linux distribution.<\/p>\n<h2>3. Do Update your System<\/h2>\n<p>Tor client is simply <strong>a software which runs on top of your operating system<\/strong>. That means Tor is only as safe and secure as the system running the Tor client. You must regularly, or preferably daily, <strong>update Tor client, Tor-secured applications<\/strong> (browsers, instant messaging clients, email clients, etc.), and the <strong>operating system<\/strong> of your computer.<\/p>\n<p>If an attacker is able to get hold of your computer\u2019s operating system, then even running Tor can\u2019t protect you or your digital communications. Always keep <strong> your system up-to-date <\/strong>for Tor usage.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-2\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/lesser-known-operating-systems\/\" class=\"ref-block__link\" title=\"Read More: 8 Operating Systems You Should Know\" rel=\"bookmark\"><span class=\"screen-reader-text\">8 Operating Systems You Should Know<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/lesser-known-operating-systems.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-18084 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/lesser-known-operating-systems.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">8 Operating Systems You Should Know<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tAre you tired of the same old operating systems dominating your computer experience? You're not alone, and there's...\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<h2>4. Don\u2019t use HTTP Websites<\/h2>\n<p>The Onion Router, as the name suggests, is only a <strong>traffic router<\/strong> and <strong>not a tool to encrypt the network traffic <\/strong>throughout the Internet. That means Tor <strong>anonymizes<\/strong> the origin of your network traffic and encrypts everything inside the Tor network, but it doesn\u2019t encrypt your Internet traffic outside the network.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-3\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/introductions-to-bitcoins-tor-network\/\" class=\"ref-block__link\" title=\"Read More: The Beginner\u2019s Guide to Bitcoins & Tor Network\" rel=\"bookmark\"><span class=\"screen-reader-text\">The Beginner\u2019s Guide to Bitcoins & Tor Network<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/introductions-to-bitcoins-tor-network.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-13167 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/introductions-to-bitcoins-tor-network.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">The Beginner\u2019s Guide to Bitcoins & Tor Network<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tInternet users familiar with the underground community are likely to have heard the phrase \"deep web\". It combines...\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<p>This implies that the <strong>exit nodes of the Tor network can read your Internet traffic<\/strong> if it\u2019s in the <strong>form of plain unencrypted data<\/strong>. That is why you should always <strong>use end-to-end encryption<\/strong> such as SSL or TLS when doing sensitive online communications, and that requires you to use HTTPS websites.<\/p>\n<p>You should also consider using add-ons such as <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.eff.org\/https-everywhere\">HTTPS Everywhere<\/a> to automatically switch to HTTPS-mode browsing for supported websites.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/do-donts-tor-network\/2-https-everywhere.jpg\" alt=\"https everywhere\" width=\"600\" height=\"132\"><\/figure>\n<h2>5. Do Encrypt your Data Storage<\/h2>\n<p>Tor does anonymize your Internet traffic\u2019s origin location but it does nothing in <strong>securing your digital data on your computer<\/strong>. Security of your data on your system can only be achieved when the information is encrypted using <strong>strong cryptographic algorithms<\/strong>.<\/p>\n<p><a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Linux_Unified_Key_Setup\">LUKS<\/a> can be used to encrypt your data to protect you from various threats. LUKS offers a reasonably safe data protection on Linux systems while TrueCrypt also proves to be handy in protecting your data.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/do-donts-tor-network\/3-luks.jpg\" alt=\"luks\" width=\"600\" height=\"236\"><\/figure>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-4\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/online-storage-with-encryption\/\" class=\"ref-block__link\" title=\"Read More: 10 Online Storage Solutions with Encryption\" rel=\"bookmark\"><span class=\"screen-reader-text\">10 Online Storage Solutions with Encryption<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/online-storage-with-encryption.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-14931 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/online-storage-with-encryption.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">10 Online Storage Solutions with Encryption<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tOnline storage solutions provide users with a backup facility for their digital data. Every day, many electronic devices...\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<h2>6. Don\u2019t use Tor Browser Bundle<\/h2>\n<p>Tor Browser Bundle should not be used to protect one\u2019s online privacy and security. FBI\u2019s recent takedown of Freedom Hosting (an anonymous web-hosting service running as a hidden service on the Tor network) was possible due to <strong>vulnerabilities<\/strong> in the Tor Browser Bundle.<\/p>\n<p>That is why you <strong>shouldn\u2019t use Tor Browser Bundle for browsing websites<\/strong> anonymously through Tor.<\/p>\n<h2>7. Do disable JavaScript, Flash and Java<\/h2>\n<p>Tor cannot protect your data with <strong>active content<\/strong> such as JavaScript, Adobe Flash, Java, QuickTime, ActiveX controls, VBScripts, etc. because these binary applications <strong>run with your user account\u2019s privileges, and may access and share your data<\/strong>.<\/p>\n<p>JavaScript is a powerful browser language which <strong>websites can use to track you<\/strong> in ways which is not possible to protect using Tor. Java and Adobe Flash run in virtual machines which may <strong>ignore your system\u2019s configured proxy settings, <\/strong>and<strong> thus bypass Tor\u2019s protection<\/strong> to share your data directly with the websites.<\/p>\n<p>Moreover, they may also store cookies and site\u2019s data separately from the browser and operating system, which may be hard to detect and delete. By <strong>disabling these technologies<\/strong> in your system using Tor, you can achieve a greater level of protection.<\/p>\n<h2>8. Don\u2019t use P2P<\/h2>\n<p>P2P is unwanted in Tor network because it is simply <strong>not built for peer-to-peer file sharing<\/strong>. Exit nodes of the network are set up to block file sharing traffic. You <strong>abuse Tor network if you download torrents<\/strong> and it slows down other users\u2019 browsing. Moreover, using Tor with BitTorrent is not secure and is a threat to your online anonymity.<\/p>\n<p>Due to the insecure design of BitTorrent clients, using Tor with them doesn\u2019t make you anonymous because <strong>those clients send your IP address directly to the tracker and other peers<\/strong>, thus compromising your anonymity.<\/p>\n<h2>9. Do delete Cookies and site\u2019s Local Data<\/h2>\n<p>Tor does route your network traffic through many relays in order to protect you from traffic analysis. It hides your real identity from the websites <strong>using network packets to prevent them<\/strong> from gathering information about you. But websites may use workarounds such as cookies and local data storage to track your online activities, analyze your Internet usage, and detect your real identity.<\/p>\n<p>That is why, you must <strong>always drop cookies and site local data<\/strong> while using Tor to protect your privacy. You can also consider using add-on such as <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/self-destructing-cookies-webex\/\">Self-Destructing Cookies<\/a> to <strong>automatically delete cookies<\/strong>.<\/p>\n<h2>10. Don\u2019t use your Real Email<\/h2>\n<p>You should not use your real <a target=\"_blank\" href=\"https:\/\/www.hongkiat.com\/blog\/gmail-security-tips\/\" rel=\"noopener\">email<\/a> on websites while using Tor. Tor is used to protect online privacy and hide real identity. How can you <strong>hide your real identity<\/strong> if you\u2019re giving out your real email on the websites? It\u2019s like going to a mask party but wearing your name tag on your costume.<\/p>\n<p>If you\u2019re really privacy-conscious and don\u2019t want to leave your mark anywhere on the Internet while using Tor, then you must <strong>consider a virtual identity<\/strong> which <strong>includes no matching information from your original, real-world identity<\/strong>.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-5\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/anonymous-email-providers\/\" class=\"ref-block__link\" title=\"Read More: 15 Websites to Send Anonymous Emails\" rel=\"bookmark\"><span class=\"screen-reader-text\">15 Websites to Send Anonymous Emails<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/anonymous-email-providers.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-18586 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/anonymous-email-providers.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">15 Websites to Send Anonymous Emails<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tWhy go for anonymous email when there are plenty of premium featured and free email services such as...\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<h2>11. Don\u2019t use Google<\/h2>\n<p>You should not use Google to search the Internet if you care for your privacy. Google is known for <strong>collecting information on users\u2019 browsing and search data<\/strong> to facilitate the growth of its ads revenue.<\/p>\n<p>You should consider using alternatives such as <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/startpage.com\/\">Startpage<\/a> and <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/duckduckgo.com\/\">DuckDuckGo<\/a>. These services offer search results without logging your IP address and storing cookies on your computer. In simple words, these search engines are <strong>anonymity-compliant services<\/strong>, and that is why you should use them while using Tor instead of Google.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-6\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/infographics-internet-privacy-tips\/\" class=\"ref-block__link\" title=\"Read More: 9 Tips For Internet Privacy [Infographic]\" rel=\"bookmark\"><span class=\"screen-reader-text\">9 Tips For Internet Privacy [Infographic]<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/infographics-internet-privacy-tips.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-19475 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/infographics-internet-privacy-tips.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">9 Tips For Internet Privacy [Infographic]<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tYou probably can't live without your smartphone, or to a lesser degree, your smartphone has to be within...\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<h2>Final thoughts<\/h2>\n<p>Anonymity is not easy when everyone is after your privacy. Tor, in spite of many known vulnerabilities and weaknesses, is still the best tool we have to protect us from malicious people and organizations. Tor can protect your digital privacy and you can browse the Internet without revealing the real you!<\/p>\n<p>Technology itself can\u2019t simply protect you if you\u2019re not willing to <strong>strictly follow the rules and comply with the regulations<\/strong>. Human error may disable your identity protection and reveal your information to the outside world. What good is the alarm and CCTV system in your home if you forget to turn it on?<\/p>\n<p>You need to use Tor and duly comply with the usage rules to completely protect your online privacy. Just follow the above given Do\u2019s and Don\u2019ts of the Tor network for better personal security online.<\/p>","protected":false},"excerpt":{"rendered":"<p>The Onion Router aka TOR is a free software and open network that allows people to improve their privacy and security on the Internet. There is nothing better than Tor when the fear of ongoing large-scale surveillance by NSA haunts those concerned about the privacy of their digital communications. Tor secretly routes your system\u2019s Internet&hellip;<\/p>\n","protected":false},"author":120,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3401],"tags":[1964],"topic":[4521],"class_list":["entry-content","is-maxi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Do&#039;s and Don&#039;ts of Tor Network - Hongkiat<\/title>\n<meta name=\"description\" content=\"The Onion Router aka TOR is a free software and open network that allows people to improve their privacy and security on the Internet. There is nothing\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Do&#039;s and Don&#039;ts of Tor Network\" \/>\n<meta property=\"og:description\" content=\"The Onion Router aka TOR is a free software and open network that allows people to improve their privacy and security on the Internet. There is nothing\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/\" \/>\n<meta property=\"og:site_name\" content=\"Hongkiat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hongkiatcom\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-03T13:01:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.hongkiat.com\/uploads\/do-donts-tor-network\/1-whonix.jpg\" \/>\n<meta name=\"author\" content=\"Ashutosh KS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:site\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ashutosh KS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/do-donts-tor-network\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/do-donts-tor-network\\\/\"},\"author\":{\"name\":\"Ashutosh KS\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/0c0611010da9a578caa32a34232cf7bd\"},\"headline\":\"The Do&#8217;s and Don&#8217;ts of Tor Network\",\"datePublished\":\"2021-10-03T13:01:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/do-donts-tor-network\\\/\"},\"wordCount\":1438,\"commentCount\":16,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/do-donts-tor-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/do-donts-tor-network\\\/1-whonix.jpg\",\"keywords\":[\"tor network\"],\"articleSection\":[\"Culture\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/do-donts-tor-network\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/do-donts-tor-network\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/do-donts-tor-network\\\/\",\"name\":\"The Do's and Don'ts of Tor Network - Hongkiat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/do-donts-tor-network\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/do-donts-tor-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/do-donts-tor-network\\\/1-whonix.jpg\",\"datePublished\":\"2021-10-03T13:01:50+00:00\",\"description\":\"The Onion Router aka TOR is a free software and open network that allows people to improve their privacy and security on the Internet. There is nothing\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/do-donts-tor-network\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/do-donts-tor-network\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/do-donts-tor-network\\\/#primaryimage\",\"url\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/do-donts-tor-network\\\/1-whonix.jpg\",\"contentUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/do-donts-tor-network\\\/1-whonix.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/do-donts-tor-network\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Do&#8217;s and Don&#8217;ts of Tor Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"name\":\"Hongkiat\",\"description\":\"Tech and Design Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\",\"name\":\"Hongkiat.com\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"width\":1200,\"height\":799,\"caption\":\"Hongkiat.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hongkiatcom\",\"https:\\\/\\\/x.com\\\/hongkiat\",\"https:\\\/\\\/www.pinterest.com\\\/hongkiat\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/0c0611010da9a578caa32a34232cf7bd\",\"name\":\"Ashutosh KS\",\"description\":\"Ashutosh is a writer, entrepreneur, and a tech evangelist with expertise in the area of Computer Programming.\",\"sameAs\":[\"https:\\\/\\\/www.hongkiat.com\\\/\"],\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/author\\\/ashutosh_ks\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Do's and Don'ts of Tor Network - Hongkiat","description":"The Onion Router aka TOR is a free software and open network that allows people to improve their privacy and security on the Internet. There is nothing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/","og_locale":"en_US","og_type":"article","og_title":"The Do's and Don'ts of Tor Network","og_description":"The Onion Router aka TOR is a free software and open network that allows people to improve their privacy and security on the Internet. There is nothing","og_url":"https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/","og_site_name":"Hongkiat","article_publisher":"https:\/\/www.facebook.com\/hongkiatcom","article_published_time":"2021-10-03T13:01:50+00:00","og_image":[{"url":"https:\/\/assets.hongkiat.com\/uploads\/do-donts-tor-network\/1-whonix.jpg","type":"","width":"","height":""}],"author":"Ashutosh KS","twitter_card":"summary_large_image","twitter_creator":"@hongkiat","twitter_site":"@hongkiat","twitter_misc":{"Written by":"Ashutosh KS","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/#article","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/"},"author":{"name":"Ashutosh KS","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/0c0611010da9a578caa32a34232cf7bd"},"headline":"The Do&#8217;s and Don&#8217;ts of Tor Network","datePublished":"2021-10-03T13:01:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/"},"wordCount":1438,"commentCount":16,"publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/do-donts-tor-network\/1-whonix.jpg","keywords":["tor network"],"articleSection":["Culture"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/","url":"https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/","name":"The Do's and Don'ts of Tor Network - Hongkiat","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/#primaryimage"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/do-donts-tor-network\/1-whonix.jpg","datePublished":"2021-10-03T13:01:50+00:00","description":"The Onion Router aka TOR is a free software and open network that allows people to improve their privacy and security on the Internet. There is nothing","breadcrumb":{"@id":"https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/#primaryimage","url":"https:\/\/assets.hongkiat.com\/uploads\/do-donts-tor-network\/1-whonix.jpg","contentUrl":"https:\/\/assets.hongkiat.com\/uploads\/do-donts-tor-network\/1-whonix.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hongkiat.com\/blog\/do-donts-tor-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hongkiat.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Do&#8217;s and Don&#8217;ts of Tor Network"}]},{"@type":"WebSite","@id":"https:\/\/www.hongkiat.com\/blog\/#website","url":"https:\/\/www.hongkiat.com\/blog\/","name":"Hongkiat","description":"Tech and Design Tips","publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hongkiat.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hongkiat.com\/blog\/#organization","name":"Hongkiat.com","url":"https:\/\/www.hongkiat.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","contentUrl":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","width":1200,"height":799,"caption":"Hongkiat.com"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hongkiatcom","https:\/\/x.com\/hongkiat","https:\/\/www.pinterest.com\/hongkiat\/"]},{"@type":"Person","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/0c0611010da9a578caa32a34232cf7bd","name":"Ashutosh KS","description":"Ashutosh is a writer, entrepreneur, and a tech evangelist with expertise in the area of Computer Programming.","sameAs":["https:\/\/www.hongkiat.com\/"],"url":"https:\/\/www.hongkiat.com\/blog\/author\/ashutosh_ks\/"}]}},"jetpack_featured_media_url":"https:\/\/","jetpack_shortlink":"https:\/\/wp.me\/p4uxU-54C","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/19506","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/comments?post=19506"}],"version-history":[{"count":3,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/19506\/revisions"}],"predecessor-version":[{"id":57712,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/19506\/revisions\/57712"}],"wp:attachment":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/media?parent=19506"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/categories?post=19506"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/tags?post=19506"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/topic?post=19506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}