Achieving Anonymity with the Help of TOR

Harsh Kumar; Akash; Arun; Dr. Prashant Dixit1

1

Publication Date: 2023/04/21

Abstract: Browsers play a critical role in today's world since they are the most often adopted programme for readily accessing web material. Here, data plays an important role because it is the thing with which anyone can learn about a specific individual's interests. In today's digital culture, users are becoming more aware of bad actors of secret data, but doing an unsafe task to store their data as well as making applications insecure. As a result, privacy protection is the solution, and many firms are providing this solution to consumers for a hefty price. However, many individuals are unaware of what an Onion Router browser or the TOR Network are. They are unaware that the Onion Router browser or the TOR Network can be an effective way to protect data by ensuring privacy goals. But, in addition to privacy, it also gives anonymity, which means that no one will ever know who is seeking and what he is searching for. Because of this fantastic feature, the majority of users use TOR browsers for personal and private communication, normal searches, and a variety of other hateful and spiteful activities. People frequently utilise these networks/browsers to remove annoying adverts. Tor is a well-known privacy-protection technology. TOR operates on a virtual encrypted tunnel that is used to transfer the user's data, enhancing the user's privacy policy and allowing the user to avoid being stalked by hackers. Many people, from ordinary people to terrorists and hackers, utilise these browsers or the TOR network. This article goes into detail about Tor, how it works, its goals, some of its related activities, and some of its challenges.

Keywords: Web Browser, Forensics, Private Browsing, TOR. Onion Routing, Anonymity, Tor Traffic.

DOI: https://doi.org/10.5281/zenodo.7852655

PDF: https://ijirst.demo4.arinfotech.co/assets/upload/files/IJISRT22NOV1595.pdf

REFERENCES

No References Available