Get a Pentest and security assessment of your IT network.

Cyber Security

Tor: Can You Still Be Tracked?

TL;DR

It’s unlikely you’ll be tracked down simply for stopping using Tor, but it depends on what you did while using it. If you were careful and didn’t link your real identity to your Tor usage, the risk is low. However, mistakes can happen. This guide explains how to minimise risks and what factors matter.

Understanding the Risks

Tor protects your privacy by bouncing your internet traffic through a network of relays. However, it’s not foolproof. Here’s what could potentially link you back to Tor activity:

  • Unencrypted Traffic: If you visited websites over HTTP (not HTTPS), your data was sent in plain text and could be intercepted at various points.
  • Browser Fingerprinting: Websites can identify you based on your browser settings, plugins, fonts, etc., even through Tor.
  • JavaScript: JavaScript can reveal information about your system and location.
  • Tor Exit Node Monitoring: While rare, exit nodes could be compromised or monitored.
  • Correlation Attacks: Sophisticated attackers might try to correlate your entry and exit points with timing information.
  • Linking Real Identity to Tor Usage: This is the biggest risk – logging into accounts (email, social media) while using Tor, using identifiable usernames, or making purchases.

Steps to Take After Stopping Tor

  1. Assess Your Activity: Think carefully about what you did while using Tor.
    • Did you log into any accounts?
    • Did you download anything?
    • Did you visit websites that require personal information?
    • Did you use your real name or email address anywhere?
  2. Check for Leaks: If you suspect a leak, consider these steps:
    • Email Accounts: Review recent login activity and security settings. Change passwords if necessary. Enable two-factor authentication (2FA).
    • Social Media Accounts: Do the same as with email accounts.
    • Financial Accounts: Monitor for any unusual transactions.
  3. Browser History & Cookies: If you used Tor Browser, it’s designed to not save history or cookies by default. However, if you modified settings, clear your browser data.
    # This is a general example for clearing browsing data in Firefox (Tor Browser base).
    # You can access this through the browser settings.
    about:preferences#privacy
  4. Operating System Logs: Your operating system might have logs of your Tor usage. The method to clear these varies depending on your OS:
    • Windows: Event Viewer (search for Tor-related entries). Be cautious when deleting event log entries, as it can affect system stability.
    • macOS: Console app (search for Tor-related entries).
    • Linux: System logs (usually in /var/log/). Use commands like journalctl -g tor to search.
  5. Network Monitoring Tools: If you’re very concerned, you could use network monitoring tools on your current connection to check for any unusual activity. This is advanced and requires technical knowledge.

Minimising Future Risk

Even if you’ve stopped using Tor, it’s good practice to protect your privacy generally:

  • Use Strong Passwords: And a password manager.
  • Enable 2FA: On all important accounts.
  • Be Careful What You Share Online: Avoid sharing personal information unnecessarily.
  • Keep Your Software Updated: Including your operating system and browser.
  • Use HTTPS Everywhere: Ensure websites use encryption (look for the padlock icon in your browser).

cyber security Considerations

Remember that cyber security is about layers of protection. Tor is a powerful tool, but it’s only one part of a broader strategy. If you were involved in illegal activities while using Tor, stopping use doesn’t guarantee safety; legal consequences may still apply.

Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation