Not too long ago, a wonderful thing called onion routing (OR) has been invented. It was meant to protect your online privacy without slowing down your broadband connectivity. Shortly thereafter, Tor brought OR to the mainstream and allowed many people to browse the internet without feeling like someone’s snooping over their shoulder. After people found out in mid-2013 that the NSA has been keeping records of their phone calls and web data transfers, a massive panic broke out. People who resort to using Tor ask themselves whether they’re still safe or not. People considering using Tor to block any breach attempts by the NSA are concerned about whether their information really is protected. I’m here to tell you under what circumstances your data will still be looked at, and what you should really worry about.

Note: Before we begin, check the link above if you don’t fully understand how OR works. The article will explain, in lucid detail, how the OR network is utilized. Anything written below this line assumes you already know how onion routing works.

The Concern

Media outlets are reporting that using encrypted services like Tor could paint a big red dot on your shoulder, making government organizations more likely to keep your data. Their source is a secret government document titled “Minimization Procedures Used by the National Security Agency in Connection with Acquisitions of Foreign Intelligence.” It allows the NSA to treat people using Tor (which makes you look like you’re located in a country other than the US) as foreigners, allowing more “flexibility” with what they can snoop. If and when they determine that you’re in the US, the data must be destroyed. Of course, the destruction of your data can be suspended because they are “reasonably believed to contain secret meaning,” according to the document.

Document that show NSA can collect data on Tor network

Even if the NSA is not directly ordered to track the information of US citizens, it still has that ability. In fact, it gets some of your data from companies that hand it out.

Can Tor Protect Your Online Privacy?

If Tor presents such a hazard for data breaches, how bad can it really be? OR uses a chain of computers from around the world to relay your data. That means that even if a government organization gets its hands on what comes out of the exit node, the data says it comes from the node behind it (in other words, the data will not disclose your computer as the origin). You’re safe, right?

I’d say yes. They won’t figure out the source of the data unless they manage to infiltrate each node and crack the multiple levels of encryption behind each set of data to match it against its final form. This is a very labor-intensive process and is not likely to happen to the average Joe. You’re most likely safe, unless you’re using plain-old HTTP. You see, with a normal web transaction, it really doesn’t matter where your computer is. If you’re logging into your email using Tor, for example, and you don’t use encryption (“https://”) to connect to the destination server, the exit node can easily track your activity. It knows your email address and can cross-reference it with a database. That’s enough to gather what you’re doing and who you are. Your identity will be snatched.

So here’s where it gets complicated: You’re relatively safe, as long as you’re using HTTPS (TLS/SSL encryption). In other words, as long as you’re connecting to an address with an “https://” before it, you’ll be at least somewhat protected. Even in such a case, there are ways around the barriers.

use https together with Tor to protect your online privacy

Also, encryption isn’t the only problem you face when using Tor.

Leaking Your IP Address Is Easier Than You Think!

If you have JavaScript and plugins enabled on your browser, you’re naked. Tor doesn’t exactly protect you from data leaks through these conventions. It all depends on the browser. However, everything will potentially fall apart at one point and give away your real IP address, making the fact that you are using Tor completely futile.

Also, as an added note, if you’re using other applications like BitTorrent, you can potentially expose your IP, even if you set up a proxy.

To address this issue, you should abandon Tor altogether and use AdvOR while hooking it onto the application you’re using directly. AdvOR takes over the entire application’s Internet connectivity, tricking it into using the OR network without giving it any possibility of revealing your real IP. It’s the only application (that I know) so far that does this. If you come across another application like this, do let me know.

Any Other Concerns?

If you have any questions about using the OR network to escape the grasp of government data-snatching programs, please comment below. I’ll be around to answer your questions.

How to Password Protect a Spreadsheet in Google Drive

Google Drive offers a lot of features for users, but some of the basics have always been missing, such as password protection. Here is how you can password protect a spreadsheet in Google Drive.

How Is Simple Different From Traditional Banking?

Simple is an online service that seeks to change the way people manage their money, but just how is it different from traditional banking?

3 Ways to Allow Guest Users on Google Chrome

If you’re using Chrome and don’t feel like letting people poking into your privacy, here are some ways to set up guest users account in Google Chrome.

How to Delete a URL From Chrome’s Omnibox Suggestions

If you entered a wrong URL in Chrome’s omnibar, it will continue to show up in the suggestion, which can be rather annoying. Here is a quick way to delete a URL from the Chrome omnibar.

The Easiest Way to Automatically Open Websites in Incognito Mode [Chrome]

Are there websites that you only want to view in Incognito Mode? The Incognito-Filter Chrome extension will let you do that in a snap.

Get Facebook Chat Heads in Google Chrome

Facebook chat heads is only available for Facebook Messenger app, but now you can use it in Google Chrome with the faces.im extension.

What’s New in WordPress 4.0 – Features Round Up

WordPress released the beta version of WordPress 4.0 that includes some new and improved features to improve back-end user experience. Let’s check out what’s new in this WordPress 4.0 Beta 1 Release.

5 Mistakes That Every WordPress User Should Avoid Making

As we focus all our attention to post great content, we tend to make some mistakes on WordPress that can be fatal. Here are top 5 mistakes that every WordPress user should avoid making.

5 of the Best Gmail Plugins You Should Start Using Right Away

Email plugins are useful to help you get your tasks done on time. Here are some Gmail plugins to help you improve your productivity.

How to Enable Timed Website Blocking In Firefox

There are many distractions in the Web. PomodoroFox for Firefox lets you blocks unproductive websites that you specify and be more productive.

How to Copy Links as Plain Text in Firefox

Do you just want to copy the text of a link, and not the link? Link Stun can disable links in highlighted text so you can copy them as plain text.

4 Big Questions About Elon Musk’s Satellite Internet Plan Answered

A network in space to provide internet access throughout the world sounds good, but is it feasible? Here are the answers to some of the major questions asked.