

It also isolates local state (like cookies) so it won't leak that way. Tor Browser intelligently isolates your traffic so logging in to your "real" Facebook while doing secret stuff on a different website is not correlate-able via traffic patterns. Many people recommend not logging in to your "real" accounts over Tor, but there's generally nothing wrong with this. It's awesome though, for when you do actually need it. Make people recommend Tails, but it's overkill for the majority of adversary models.

Many people recommend disabling JavaScript and/or setting the security slider to its highest setting, but this is unnecessary for the majority of adversary models and will make the web significantly less usable. I suggest reading that instead.Īll further advice is given without knowing your adversary model, so it's probably a waste of effort.įor example, many people recommend a VPN because it sounds good, but it only helps in a small number of cases, does nothing in most cases, and hurts in a small number of cases.

Edit: I've expanded the below text into a blog post with better formatting.
