
An open-source OS, Tails has received a good deal of financial support from the Tor Project, and has been running since 2009.

Many users opt to use Tor over The Amnesic Incognito Live System, or ‘Tails’, which is a privacy based operating system focused on privacy and anonymity. That is, browsing using Tor is much slower than connecting directly to the target website. Governments and intelligence services likely consider the use of Tor to be suspicious.įinally, because Tor requires multiple levels of encryption, and hops between at least three computers scattered around the world, it is slow. This allows websites to block access from those addresses.Ī different kind of Tor weakness is that your ISP can see that you are using Tor. Tor Strengths and WeaknessesĪnother weakness is that most Exit Relays are at known IP addresses. Statistical analysis could then possibly identify you. The biggest privacy weakness of Tor is that it is possible to monitor your computer and try to correlate the timing of traffic between your computer and Exit Relays.

This prevents individual Relays in the network from breaking your anonymity. No Relay in the network knows the complete path between your computer and the target website. Tor is good at providing anonymity without the need to trust anyone.
