DATA DOCTORS

What is the most secure private browsing system to use on a computer?

Feb 15, 2016, 5:30 AM

(AP Photo/Eric Risberg)...

(AP Photo/Eric Risberg)

(AP Photo/Eric Risberg)

Q: What’s the difference between Tor and private browsing sessions in my browser?

A: On the surface, both are used as privacy measures but from a technical standpoint, they are worlds apart.

Tor, which stands for “The Onion Router,” was originally developed by the United States Naval Research labs to protect communications online for intelligence purposes.

They wanted a tool that would allow journalists or dissidents to safely communicate from within restricted countries, amongst other potential uses.

The “onion” component refers to a very sophisticated layering of communication and security protocols for the purposes of hiding a user’s location and activities from those conducting online surveillance.

Tor is now the tool of choice for millions that want to make tracking of their activities very difficult.

Ironically, this government-developed tool is being used by the Internet underworld and foreign governments to make surveillance from our government much more difficult.

It’s technically, the closest thing that currently exists to anonymous browsing of the Internet.

Private browsing sessions that you can launch from your web browser do nothing to mask your location or usage from the rest of the Internet; it simply means that your browser won’t retain the information.

An example of how private browsing can be helpful is when you’re shopping for a surprise gift for your significant other and don’t want your computer to give away the surprise.

Advertising technology known as retargeting is why you often see ads follow you around the Internet and on social networks.

When you visit the website of a company that uses retargeting technology, a tracking “cookie” is dropped on your computer that tells the entire ad network you were interested in a specific product.

When you use private browsing sessions, both the history and the cookies get cleared away when you shut down the session.

You can hide your activity from other users of the same computer or from retargeting networks, but all of the digital footprints that are commonly created as you traverse the Internet are still generated.

This means your Internet Service Provider as well as the sites that you visited and lots of other entities can still capture specific information that can be traced back to you.

So think of it as internal anonymity (private browsing sessions) versus external anonymity (Tor browsing sessions).

Using Tor also has its downsides; in order to help mask your session, Tor randomly bounces your requests around lots of other participating nodes, which generally results in slower performance (in some cases, really slow performance).

For this reason, most people don’t use Tor for every day browsing, unless they’re Edward Snowden or the like.

To be clear, simply using Tor as your browser does not automatically make you completely anonymous from online tracking, as it’s only one layer that needs to be addressed.

Finally, some reports suggest that using Tor or other known anonymity tools could actually put you on a watch list for some of the automated surveillance programs, so surfer beware!

Data Doctors

Patrick Mahomes #15 and head coach Andy Reid of the Kansas City Chiefs are recorded on a phone as t...

Data Doctors

Handy tech tips all Valley residents should use to find lost phones in a snap

Q: My phone went missing, and I haven’t been able to locate it using the Find My service, so what should I do next?

6 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are tips for freeing up Google storage space

Google provides a generous amount of free online storage but it can fill up quickly depending on how many of its resources you use.

13 days ago

Discover how to assess, estimate, and shop for the right battery pack with this concise guide. (Pex...

Data Doctors

Here is everything you need to know for testing and buying battery banks

Discover how to assess, estimate and shop for the right battery pack with this concise guide.

20 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are the truly free smartphone video editing apps

The processing power on our smartphones has grown exponentially, allowing anyone to perform sophisticated video editing easily.

27 days ago

Google Maps app....

Data Doctors

How to rediscover places visited years ago on Google maps

Whether you're an Android or iOS user, or prefer accessing Google Maps on your computer, you'll find step-by-step instructions to unlock your travel memories effortlessly.

1 month ago

(Photo by Michael Bocchieri/Getty Images)...

Ken Colburn, Data Doctors

Here’s how to calculate your bandwidth needs

When searching for an alternative internet service provider, here are some tips on how to know how much bandwidth is needed.

1 month ago

Sponsored Articles

...

DISC Desert Institute for Spine Care

Sciatica pain is treatable but surgery may be required

Sciatica pain is one of the most common ailments a person can face, and if not taken seriously, it could become one of the most harmful.

...

Collins Comfort Masters

Here’s 1 way to ensure your family is drinking safe water

Water is maybe one of the most important resources in our lives, and especially if you have kids, you want them to have access to safe water.

...

Fiesta Bowl Foundation

The 51st annual Vrbo Fiesta Bowl Parade is excitingly upon us

The 51st annual Vrbo Fiesta Bowl Parade presented by Lerner & Rowe is upon us! The attraction honors Arizona and the history of the game.

What is the most secure private browsing system to use on a computer?