this post was submitted on 26 Nov 2025
526 points (99.3% liked)
Technology
77072 readers
3323 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Anyone know how to get started with Tor?
TOR Wikipedia page - explains the key concepts and gives a link to the website so you can download the Tor Browser.
Tails (Amnesiac OS) Wikipedia page - If you want the real Fort Knox solution to browsing something or sending something without anyone finding out. It's more of a process than downloading Tor Browser, but probably the most secure option possible for browsing the web. (The OS runs everything through the TOR network, is only retained in RAM, and wipes the RAM clean during shutdown)
How secure is something like Orbot? I like the idea of connecting to Tor while still using my preferred browser.
It's a half-measure, kind of like using a VPN. The problem with using your preferred browser is that it's not designed to prevent any identifying leaks, so you could be fingerprinted at basically any time and your efforts will have been for nothing. Also, if you're using an insecure OS (like the version of android that comes preinstalled with your phone), that'll prevent its effectiveness full stop.
For situations like those, you aren't really using Orbot (or any VPN-esque solution) for genuine privacy. Those tools are useful for Utility (circumventing region blocks, ISP filters, IP blocks, so on), and Plausible Deniability (Piracy, usually through torrenting). If what you seek falls into those two categories, good for you, but true privacy has to be achieved through something like Tails or a secure OS with Tor Browser, sorry.