Index/Organizations/Tails

Tails

Linux distribution for anonymity and privacy

Fact-Checks

15 results
Dec 4, 2025
Most Viewed

How can DNS leaks occur when using Tor and how do they expose search terms to my ISP?

DNS leaks occur when DNS queries escape the Tor network and go to the local resolver or ISP instead of being resolved by the Tor exit node; real-world bugs and OS/app behavior have repeatedly caused s...

Oct 7, 2025
Most Viewed

how do i route qtox through tor?

Routing qTox through Tor is feasible by configuring qTox’s proxy settings to use a Tor SOCKS proxy (typically 127.0.0.1:9050) and by ensuring Tor is running locally or available via a trusted system-l...

Dec 13, 2025
Most Viewed

What steps can I take to minimize traffic-correlation risk and timing-volume leaks while using Tor?

Traffic-correlation and timing/volume leaks remain the chief practical threats to Tor’s anonymity: Tor does not protect against a global passive adversary that can observe both the client→guard and ex...

Dec 14, 2025

What metadata leaks can still expose Tor users to government surveillance?

Traffic and protocol metadata — such as which IP is connecting to which Tor relay, circuit timing and volume, and relay bandwidth claims — can still allow network-level observers (like ISPs or states)...

Nov 22, 2025

Can Tor browser users be identified through other means, such as browser fingerprinting?

Tor Browser is engineered to minimize browser-fingerprint uniqueness—using techniques like letterboxing, user-agent spoofing, font fallbacks and other hardening so a Tor Browser instance should look l...

Jan 4, 2026

https://thehiddenwiki.org/ 

The Hidden Wiki is best understood as a directory of .onion links on the Tor network rather than a single centralized site, and while it can serve legitimate privacy-minded users it also routinely poi...

Nov 11, 2025

What are the limitations of Tor for online privacy?

Tor provides meaningful anonymity by routing traffic through multiple relays, but it is not a silver bullet for online privacy: . Operational security, browser settings, and complementary tools (like ...

Nov 26, 2025

Does Tor Browser's 'connection is secure' indicator guarantee no third party can monitor activity?

The Tor Browser’s “connection is secure” padlock indicates encryption on the leg between your browser and the site (or that Tor’s internal links are encrypted), but it does not guarantee that no third...

Nov 12, 2025

What causes DNS leaks in Tor Browser?

DNS leaks in Tor Browser occur when DNS queries escape the Tor network because they are resolved outside the Tor SOCKS proxy; . Recent community and project analyses show recurring causes: application...

Jan 19, 2026

What specific OPSEC mistakes most frequently appear in court filings related to Tor cases?

Court records and public write‑ups of “Tor cases” repeatedly point to human operational security failures — not a universal collapse of Tor itself — and the mistakes that recur most often are predicta...

Jan 18, 2026

Is a USB stick an example of a pluggable transport on TOR?

A USB stick is commonly used to carry or run Tor software — for example by extracting the Tor Browser onto removable media or running live OSes like Tails from a USB — but that practical use is differ...

Jan 6, 2026

Are there common DNS leaks in Tor Browser and how to fix them?

Tor Browser is designed not to perform DNS lookups locally — DNS resolution is routed through the Tor network and performed by exit nodes — so native DNS leaks from the Tor Browser itself are not comm...

Nov 23, 2025

How do browser-specific privacy modes (Tor, Brave, Firefox Private) differ in residual data retention?

Tor Browser is built to minimize residual traces and network-identifying data by routing traffic through the Tor network and aiming to leave “no traces” on the host when used as intended; specialized ...

Nov 10, 2025

Can Tor browser protect against zero-day exploits on .onion sites?

Tor Browser reduces risk but does not eliminate the possibility of zero‑day exploits on .onion sites: historical incidents show browser vulnerabilities have been exploited in the wild, Tor maintainers...

Nov 7, 2025

What are the most effective ways to protect Tor user anonymity on onion sites?

The collected materials converge on a clear, actionable thesis: protecting anonymity on onion sites requires layered measures combining well-configured Tor software, strict operational security practi...