Posted on 03/08/2016 6:10:51 PM PST by ShadowAce
Thank you for the very good options.
I use Safari for work and Epic for all other browsing. Options:
Epic. https://epicsearch.in/
Comodo. https://www.comodo.com/\
Cuil. http://cuil.pt/
Dogpile. http://www.dogpile.com/
Thanks for the ping.
checkout later
I’ve only tried the Comodo Dragon and the Maxthon. Both seemed to work fine.
And where does Safari stack up in this biased article?
Why is it biased?
there’s a fella online on youtube that talks about TOR and how it actually sends up red flags to the f bi when they see it beign used- and they can break into it and know who’s using it-
There is no security online-
[[I thought the NSA likes people to use Tor.]]
they do- people think it’s veiling their identity, but it doesn’t- it’s just like a big red sign that says’ ‘hey, I’m trying to evade detection’
BFL
bfl
Part of your problem is that you believe everything you read/see online.
The use of TOR is NOT a red flag. If, however, your IP address pops up on a TOR egress point for a kiddie porn site or some al Qaeda affiliate, THEN you might get a call.
TOR was developed by the government for secure communications, and it's an excellent tool. A majority of web traffic is filtered through fewer than a dozen sites (e.g. Google, Facebook, Twitter). Seeing the Internet in all of its glory, warts and all, is what TOR does for an average user.
The way I like to tell the story is that there are 65535 TCP/UDP ports available on every computer in the world. The grand majority of traffic is on ports under 1000. Anything over 1000 is generally used for port randomization in domain/enterprise environments. MOST of the world's Internet traffic travels over ports 80 (HTTP) and 443 (HTTPS). There are literally thousands of other protocols in use (e.g. NNTP, XMPP, IRC, FTP) still very much in use around the world. To think that the Internet you all know through your web browser is the extent of it is foolish.
BFL
bkmk
[[THEN you might get a call.]]
So basically you are saying it is a red flag tool- The fella explained it very well on youtube- you can check it out yourself if you wish- Tor is designed to flag users who are trying to hide their identity- while it may be a fine tool for other purposes, it’s also used to determine if folks are trying to evade detection
Problem with that statement is that your identity isn’t hidden, per se. It’s a way to mask your habits, no completely obscure your identity. All it takes is compromising an endpoint, and everything you’re doing is easy to track.
If you want anonymity, use VPN.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.