Ella S.
*temp banned*
I'm posting this through the Tor relay. Suffice to say, yes, I think so.
It's not enough to just use Tor. You also want to use free, privacy focused software and operating systems. There's no sense in using Tor on Windows 11 when it's sending all of your keystrokes to Microsoft, anyway. In a pinch, you can use TAILS for this.
If you're in a country that blocks Tor use, you can use bridge nodes.
I think it's worth noting that Tor is not as anonymous as you think. If you have access to where someone is connecting from and their end-node, then you have essentially de-anonymized them completely. In the US, the NSA has access to basically all traffic sent through ISPs, so it knows where you're connecting from. They also run many of the end-nodes, so there's a higher chance that they will know exactly what you're doing.
That's part of the reason so many users are moving over to i2p, which uses a p2p network that isn't vulnerable to end-node snooping.
It's not enough to just use Tor. You also want to use free, privacy focused software and operating systems. There's no sense in using Tor on Windows 11 when it's sending all of your keystrokes to Microsoft, anyway. In a pinch, you can use TAILS for this.
If you're in a country that blocks Tor use, you can use bridge nodes.
I think it's worth noting that Tor is not as anonymous as you think. If you have access to where someone is connecting from and their end-node, then you have essentially de-anonymized them completely. In the US, the NSA has access to basically all traffic sent through ISPs, so it knows where you're connecting from. They also run many of the end-nodes, so there's a higher chance that they will know exactly what you're doing.
That's part of the reason so many users are moving over to i2p, which uses a p2p network that isn't vulnerable to end-node snooping.