Is this what people think about Tor browser? ( discuss.tchncs.de ) Englisch

image transcription:
a YouTube screenshot of a community post, which is a meme regarding incognito mode. it has two panels with an animated figure(person) and chrome logo (chrome) with limbs. in first panel, chrome is asking "which website would you line to see?", to which the person replies " I don't want you to know. " in second panel, chrome has become a ventriloquist, holding a masked muppet with sunglasses and a fedora(symbol for incognito on chrome). it is asking the person "what about telling Mr. incognito?", to which the person joyfully replies "okay."

the screenshot has a main comment with several replies. the main comment(by Paula_Amato) reads, "And then there's Tor browser e CD Catching my brother Scrolling through Tor was the second worst secret I know about him... The first is the website he was using."

replies to the comment:

[30 Pranay Pawar • 1 day ago] May God bless and have mercy on the bro's life. I would knock myself out for eternity if anybody i know found that out too.
[FArid ch. • 1 day ago] what onion website your brother access... out of curiosity
[Griffin McKenzie • 1 day ago (edited)] Tor is literally just a browser like any other but better.

blanketswithsmallpox ,

... Tor is just a modified Firefox though lmfao.

pchem ,

It's based on Firefox, but those modifications do have a rather large impact in terms of privacy.

STUPIDVIPGUY ,

personally I don't care if google knows about my femboy hentai I just don't want it popping up in my search whenever i type "f"

papalonian ,

I don't know anything about Tor and at this point I'm too afraid to ask.

rockSlayer ,

It's a heavily modified firefox browser designed to work with something called "the onion network". It's called this because there are several nodes on the network designed to obfuscate your Internet traffic by wrapping a layer on your Internet traffic, creating an "onion". All of these layers mean that each node only knows what the previous and next nodes are. The most vulnerable nodes are the starting and exit nodes, because they can identify you and potentially trace back your IP. You also can't choose your starting or exit nodes. It's well known that the US federal government controls some of these exit nodes.

  • Alle
  • Abonniert
  • Moderiert
  • Favoriten
  • random
  • memes@lemmy.ml
  • haupteingang
  • Alle Magazine