We have reasons to be afraid. After all it is our privacy at stake. And there isn’t one big brother watching over, but a huge number of potentially divulging brothers of all sizes. There are many internet based anonymisation tools available, some free, others cost money, some are effective, many aren’t. I had tried a few which promised to keep my identity camouflaged, but my exact IP address and other details appeared on the stat tracker of this blog. Nevertheless, they were of a great help during the recent blog block.
Now’s here another anonymiser called Topark – which is in fact a tweaked Portable Firefox browser (I’m yet to make it undergo some tests, so this post shouldn’t be interpreted as a recommendation. It is more of a news than an analysis). Topark claims to “turn any internet terminal into a secure connection” and is “developed and maintained by just one dedicated university student.”
You can carry it anywhere with you in an USB and plug it to the machine and run the programme and “and it will launch a Tor circuit connection, which creates an encrypted tunnel from your computer indirectly to a Tor exit computer, allowing you to surf the internet anonymously.”
You may have heard about those heavily advertised second-rate software packages like Anonymizer, SafeSharing, InvisibleIP, SecretSurfer, etc. Well, not only do they charge you money and/or a subscription fee, but they are bloated and full of useless components. They also require an installation which leaves tracks on your computer. How is that anonymous? Try Torpark; its small, portable, clean, open-source, free of spyware/adware, and free.
But how does it actually work? Hacktivismo provides the details:
When a user logs onto the Internet, a unique IP address is assigned to manage the computer’s identity. Each website the user visits can see and log the user’s IP address. Hostile governments and data thieves can easily monitor this interaction to correlate activity and pinpoint a user’s identity.
Torpark causes the IP address seen by the website to change every few minutes to frustrate eavesdropping and mask the requesting source. For example, a user could be surfing the Internet from a home computer in Ghana, and it might appear to websites that the user was coming from a university computer in Germany or any other country with servers in the TOR network.
It is important to note that the data passing from the user’s computer into the TOR network is encrypted. Therefore, the user’s Internet Service Provider (ISP) cannot see the information that is passing through the Torpark browser, such as the websites visited, or posts the user might have made to a forum. The ISP can only see an encrypted connection to the TOR network.
However, users must understand that there are limitations to the anonymity. Torpark anonymizes the user’s connection but not the data. Data traveling between the client and the TOR network is encrypted, but the data between the TOR network and websites is unencrypted. Therefore, the user should not use his/her username or password on websites that do not offer a secure login and session (noted by a golden padlock at the bottom of the Torpark browser screen).
Torpark is dedicated to the Panchen Lama.
You can download Torpark v220.127.116.11 from here.