Understanding the Tor Project and hidden services
The internet is arguably the largest source of mass surveillance in the world but is also one of the safest ways to send anonymous messages. Most internet users use the default applications and settings available, which makes it possible to track, log, and analyze almost all of their communications. This has been exemplified by data exfiltration being performed in large companies that aim to obtain economic benefits from the data of their users.
There are different types of anonymous browsing, such as browsing through a single proxy, which offers us a level of anonymity at the network level. Here, the user's IP address can be tracked throught the exit node that we are using in the Tor network.
Another widely used system for anonymization is the use of VPNs to send traffic. In general, this works the same way as Tor, sending your traffic through another user's computer. The difference is the lack of anonymization between...