The goal is, under certain circumstances, not sure
Experts emphasize again and again that the use of Tor for the average Internet User does not generate more value. If you are not familiar with the subject, your data may be significantly more vulnerable than without Tor encryption. To understand this better, we have described in the following list of short and extremely simplified description of how a request via Tor is processed:
- Prerequisite for the use of the Tor network is the free Tor Bundle. This consists of a Client and a modified Version of the Mozilla Firefox browser.
- Send a request through the Browser, notes, this, which Tor servers are available, and selects a random Route across a minimum of three of these servers.
- Your Browser establishes an encrypted connection with the 1. Server, which will be extended over the rest of the Server.
- The last Server, which acts as the exit point (exit node), and forwards the request. From here on, this is no longer encrypted.

Tor is really safe?
Goal: to trust the Server to serve as a prerequisite
- As long as all the Tor servers are clean, so trustworthy, does the encryption work seamlessly. Different the Situation is when the exit node (exit point from the network) is trusted.
- Any Person or Institution can build a Tor Server. Through this Server the user flow data of different User. Including data are necessarily of a sensitive nature, such as passwords and the like. It follows that the operator of the last server can spy on the encryption chain (exit node) all data and recycle.
Conclusion: So sure, you can use Tor
- The targeted Spying on individuals via the Tor network is extremely difficult if the user has mastered certain Tricks.
- However, operators of Tor servers can intercept the passing smuggled data. In connection with any meta data also as to a location Etc can. be closed.
- Not really sure the gate is so only if you communicate any personal data over the network: do not Log into your existing accounts, and no personal information, such as your E-Mail address, or your address. Online Banking, you should use in any case on the Tor network.
- Instead, you should use all of the accounts that you want to use Tor, only Tor. You create first a Mail account via the Tor network, which you can use and then for any user account. Log in, but never in these accounts to be without a gate connected to the Internet. You should also as often as possible, to the Hidden gate-Services use.
- But the fact is that there is no safer Alternative to Tor. You want to surf anonymously on the Internet, Tor is quite a good choice - as long as you use the network conscientiously.
- Alternatively, or in addition to Tor you can also make Connections via VPN.
