Published by Abhishek Upadhayay on


Anonymity is the state when nobody knows who are you on the internet.

This state is used by Hacker Worldwide to perform their activities so that no one can trace them.

Internet Protocol (IP)

Internet protocol is a unique numeric identification number of every individual internet user which can be used to track your name, geographical location, and your online activities.

An IP Looks like this

This is your address and to this address, the data is being sent by your internet provider as data packets and this is how your internet works.

Hackers hide their identification on the internet to perform hacking activities so that no one can trace them.

How Hackers Hide their IP?

There are so many ways to hide an IP, let’s discuss them.

VPN(Virtual Private Network)

VPN is a network that is constructed by using public wires, usually the internet.
To connect to a private network, such as a company’s internal network. There are a number of systems that enables you to create networks using the internet as the medium for transporting data.

How VPN Works

VPN works as a medium between you and the internet, the data is first received by the VPN server then it will come to your computer.

Proxy Servers

A proxy or proxy servers is basically another computer which serves as a hub through which internet requests are processed. By connecting through one of these servers, your computer sends your requests to the proxy servers which then processes your request and returns what you were wanting.

This way you IP is not shown to the tracker.

TOR BROWSER  (The Onion Router)

The Tor Browser is a web browser that anonymizes your web traffic using the Tor network, making it easy to protect your identity online.

The Tor browser is the best software for anonymous browsing to date. Even the FBI can’t trace it easily. This works on a layer IP basis. A circuit of the different internet protocol is created (minimum 8 ) which acts as layers. (just like layers of an onion) The data is first received by the first IP than transferred to second then third and so on. Then finally you get the data on your browser. This is the first tool every hacker should have and surprisingly this is free software. Very few people know about this browser.

How to use the Tor Browser on mobile and cellphones

More and more people are browsing the web from their phones, and in poorer parts of the world that are mobile-first, people are browsing the web only from their phones. As a result, the Tor Project has spent a couple of years working to build a better Tor Browser for mobile phone users.

In September 2019, the Tor Project announced the official release of Tor Browser for Android, replacing the Guardian Project’s Orfox as the officially endorsed Tor Browser for Android. (The Guardian Project’s similarly named Orbot, a Tor proxy for Android that lets you tunnel all your app traffic over Tor, not just web traffic, continues to be alive and well.)

Due to technical restrictions on Apple’s proprietary iOS platform, the Tor Project has not yet released an official Tor Browser for iPhone and iPad users, but endorses OnionBrowser for iOS users who want to browse the web anonymously. Major security improvements are in the pipeline for OnionBrowser, including fixing some information leakage issues and enabling per-website security parameters. The latest and greatest version of Onion Browser should be out by early November 2019, the developers tell CSO.

How Tor Browser Works

Tor Browser routes all your web traffic through the Tor network, anonymizing it. As the images below illustrate, Tor consists of a three-layer proxy, like layers of an onion (hence Tor’s onion logo). Tor Browser connects at random to one of the publicly listed entry nodes, bounces that traffic through a randomly selected middle relay, and finally spits out your traffic through the third and final exit node.

Is The Tor Browser Is Legal?

For most people reading this article, Tor Browser is completely legal to use. In some countries, however, Tor is either illegal or blocked by national authorities. China has outlawed the anonymity service and blocks Tor traffic from crossing the Great Firewall. Countries such as Russia, Saudi Arabia and Iran, are working hard to prevent citizens from using Tor.

Is Tor Browser anonymous?

Tor Browser offers the best anonymous web browsing available today, but that anonymity is not perfect. We are currently witnessing an arms race between researchers seeking to strengthen Tor, or even develop a next generation anonymity tool, and governments around the world studying how to break Tor’s anonymity properties.

The most successful technique to de-anonymize Tor Browser users has been to hack them. The FBI has used this technique successfully in numerous criminal cases, and under Rule 41, enacted in 2016 by US Chief Justice Roberts of the Supreme Court, the FBI can now mass hack large numbers of computers anywhere in the world using a single warrant.

Such hacking techniques ought to concern everyone, as innocent Tor users will inevitably get caught up in such fishing expeditions.

Does that mean you shouldn’t use Tor? Certainly not, if you care about your privacy online. Tor Browser is an essential tool that will only improve with time. If you don’t care about your privacy?



Leave a Reply

Your email address will not be published. Required fields are marked *