OFFICIAL SECURITY BLOG
April 24, 2012 | BY Adam Kujawa
Security Level: Light
Purpose: To hide who you are while performing research through your browser.
What you’ll need:
You want to perform some malware research and are worried about being noticed and flagged by people who do not have your best interest in mind. You don’t plan on doing anything serious, just poking around.
What are we doing?
We are going to use a browser which sends all your traffic through a service which anonymizes your IP address.
Q. What the hell is Tor!?
A.Tor, which is short for The Onion Router, is a network system which allows online anonymity by routing your traffic through the systems of worldwide volunteers in order to conceal your IP, location or usage from anyone who might be performing network analysis or monitoring on you. It also hides your true IP from bad guys who might notice when you start poking around their servers performing research. Here is a neat diagram I stole from Wikipedia!
Tor can be exploited is if a person is one of the Tor nodes they can see where the user link (see diagram above) is originating from, if they use a specific method. However each packet of information you send through the network is always encrypted and encapsulated by multiple layers, so you know it’s safe.
Check out these sites for more info on Tor:
Using the Tor Browser bundle is a great way to hide your IP and location from bad guys who might notice you performing research on them. Its biggest drawback is how slow it is, security and being anonymous has its price when it comes to speed. Tor was not just made for malware researchers; it was originally created as a method to preserve freedom of speech and a way for people to keep their identities safe in various sensitive situations. You can use it for whatever you want, be sure to tell your friends about it too!