Ask HN: How do I explain Tor to my Mom?
Point is: with most of today's computing done in a browser and most users being non-techie: is it even possible to spread proper secure/private browsing? A simple click-install-go solution?
Point is: with most of today's computing done in a browser and most users being non-techie: is it even possible to spread proper secure/private browsing? A simple click-install-go solution?
[+] [-] glimcat|12 years ago|reply
When Tor is actually appropriate, the drop-and-go version is the Tor Browser Bundle, which uses a customized Firefox distribution.
https://www.torproject.org/projects/torbrowser.html.en
Note that all this does is proxy your requests, it won't prevent you from deanonymizing yourself through characteristic requests, traffic patterns, or whatever. That's often where people screw up, since it involves a running battle where losing a few bits of entropy here and there can and will expose you.
But to explain it:
A group of people don't want others to be able to snoop on what websites they want to view. So they agree to lump all their requests together, and then they don't keep any records about who ordered what once it has been delivered.
If someone's snooping, all they can tell is that someone in the group requested it - they can't point a finger at any specific person.
[+] [-] User8712|12 years ago|reply
As someone else mentioned, if your mom is a journalist or political activist, and needs to access information anonymously, while at the same time is careful enough not to release any information over TOR that could be used to identify herself, than it might be in her advantage. If you're setting her up on TOR so she can browse her favorite social networks, cooking blogs, and e-mail, then she's most likely going to be less secure, entrusting personal information to strangers instead of her ISP, and waiting on the slow load times of the TOR network.
TOR isn't some magic bullet that makes browsing safe and anonymous. In short, I'd recommend your mom doesn't use TOR. Based on her profile, she's going to make the mistake of sending unencrypted personal information, and when that happens, I think she's better off trusting her ISP over a stranger with that data.
[+] [-] frostmatthew|12 years ago|reply
"Let's say I want to access the website that's located at this server. My computer connects to another computer in the Tor network, which connects to another, and so on. Eventually, one of them will connect to the server, which can send back information using this pattern. However, none of the computers in the Tor network know who is getting what. The computer that you connect to isn't the same as the one that connected to the server, so it's very anonymous."
[+] [-] joshfraser|12 years ago|reply
[+] [-] huckleberryfinn|12 years ago|reply
[+] [-] kurumo|12 years ago|reply
That should do as far as Tor goes, but the more general problem of explaining why is such a thing needed by your mom is much harder. (Unless she lives in North Korea or some such place).
[+] [-] michaelmcmillan|12 years ago|reply
[+] [-] coldtea|12 years ago|reply
[+] [-] fsk|12 years ago|reply