ESET, a leading computer security company, analyzes what user data collects conventional browsers, the features of Incognito browsing and why Tor is a Alternative to protect your privacy on the Internet.
There are currently different alternatives for surfing the Internet and interacting with different sites. The most used browser worldwide is Google Chrome, which has a market share of almost 62% and the rest of the cake is dealt with browsers such as Firefox, Opera, Safari, Internet Explorer among others. Each of these browsers have their own characteristics that differentiate it from another that go from the interface to the handling of the user’s information.
As mentioned above, when thinking about privacy, the first option is usually to use the Incognito mode that most browsers bring, since the same browser informs that it will not store certain personal or navigation information. However, such information may be visible or registered by the company or the place from which it is being navigated, whether it be a home network or corporate network, since the information can be monitored and recorded by any system administrator, server Proxy or parental control tools on a network.
Therefore if the user wants a navigation with a greater degree of anonymity, an option can be to use a browser like TOR. Although the same is usually associated with the carrying out of illicit actions through the dark web, TOR is highly used in the world of journalistic and scientific research, since it leaves no traces in the user’s network or on the server that is being visited and therefore, allows anonymity.
The information that is transferred through the TOR browser travels completely encrypted, making it more complex to track it, even if network traffic is being monitored. Camilo Gutiérrez, head of ESET’s research laboratory, says that “it is true that this browser can access sites within the dark web containing illegal information or where illegal business is done, but it is a technological tool that correctly used can serve positively to keep users ‘ privacy. “
The feature of privacy of Tor is based on the implementation of a technique called “Onion Routing” – making reference to the layers of an onion – which involves a change in the usual form of routing where a machine is connected directly to the server you are looking for, turning to a distributed system that guarantees the anonymity and privacy of the data.
Tor is intended for all types of users, mainly for those who seek to take better care of their privacy, not only for not revealing personal information, but those who need to search related topics that are preferred to keep private.