The Tor encryption service is a high-profile bastion of computer security, but the project appears to have been compromised earlier this year. Today, the Tor Project blog announced that an unknown party likely managed to gather information about people who were looking up hidden services — websites that users can operate and visit anonymously, like Silk Road — and could theoretically have compromised other parts of the network.
If you want to use Tor, then Tails is your best friend. Tails is a version of Linux that sends data through the Tor network.
All Internet traffic to/from Tails goes through Tor, making it resistant to end user mistakes. Tails is not normally installed on a computer, instead it's run from a bootable DVD, USB flash drive or flash memory card. Compared to the Tor Browser Bundle, Tails is unquestionably the way to go. Ed Snowden uses it.
TAILS Linux, used by Edward Snowden to communicate with journalists, is patching holes in one of its network overlays
The Tails operating system is one of the most trusted platforms in cryptography, favored by Edward Snowden and booted up more than 11,000 times per day in May. But according to the security firm Exodus Intelligence, the program may not be as secure as many thought. The company says they've discovered an undisclosed vulnerability that will let attackers deanonymize Tails computers and even execute code remotely, potentially exposing users to malware attacks. Exodus is currently working with Tails to patch the bug, and expects to hand over a full report on the exploit next week.
Tor is an anonymizing network that’s designed to protect you by “bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.”
That’s cool, but does Tor really guarantee you what you think or assume it does? I can’t say for sure, but when facing a state-sponsored entity with time and resources on its side, you cannot be too careful. At least if pays to know what other people think about Tor, especially when what they have to say runs counter to what you know, or what you think you know.