Back to Resources
What the Zuck!
Evangelizing About the Erosion of Privacy


What the Zuck!
Evangelizing About the Erosion of Privacy

Defensive Tools


TOR Browser

Tor Project

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

Originally developed for the US Navy, TOR is an open source project run independently and supported completely by a volunteer network of approximately 8000 servers (called relays). By randomly passing your traffic through these relays, which change at least every 10 minutes, your internet traffic exits from multiple points and thus hides your identity.

Using the built in encryption technology in TOR, even the relay server does not know where you came from or where you are going.

Each encryption layer is built on-top of another encryption layer when passing through the relays. And the layers are peeled off at the very end. These layers of encryption are like the layers of an onion. Thus, the name The Onion Router (TOR).

Today, TOR is the highest level of security one can get on the Internet. Due to the limited number of servers, the bandwidth is capped and thus traffic is slow compared to a VPN. However, with absolute anonymity in mind, there is no better option.

You are able to use TOR as a browser. The TOR Browser is available from the link above. However, TOR downloads are tracked by 3-Letter agencies so it should only be downloaded with a VPN.

The limitation of a TOR Browser is that it only anonymizes browsing activities. Other things you do on the Internet will identify you, particularly email and DNS requests. Thus the next level solution is called TOR Routing. I createad a VPN product that has a built in TOR Routing called BytzVPN.

Bytz VPN by Rob Braxman
TOR Browser

Tor Project

Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.

Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

Originally developed for the US Navy, TOR is an open source project run independently and supported completely by a volunteer network of approximately 8000 servers (called relays). By randomly passing your traffic through these relays, which change at least every 10 minutes, your internet traffic exits from multiple points and thus hides your identity.

Using the built in encryption technology in TOR, even the relay server does not know where you came from or where you are going.

Each encryption layer is built on-top of another encryption layer when passing through the relays. And the layers are peeled off at the very end. These layers of encryption are like the layers of an onion. Thus, the name The Onion Router (TOR).

Today, TOR is the highest level of security one can get on the Internet. Due to the limited number of servers, the bandwidth is capped and thus traffic is slow compared to a VPN. However, with absolute anonymity in mind, there is no better option.

You are able to use TOR as a browser. The TOR Browser is available from the link above. However, TOR downloads are tracked by 3-Letter agencies so it should only be downloaded with a VPN.

The limitation of a TOR Browser is that it only anonymizes browsing activities. Other things you do on the Internet will identify you, particularly email and DNS requests. Thus the next level solution is called TOR Routing. I createad a VPN product that has a built in TOR Routing called BytzVPN.

Bytz VPN by Rob Braxman
Buy VPN Bytz VPN - with Built-in TOR Routing
by Rob Braxman
Buy Now


Buy VPN

Copyright 2018 Rob Braxman - All Rights Reserved