{"id":1836,"date":"2023-02-01T20:28:08","date_gmt":"2023-02-01T20:28:08","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1318"},"modified":"2023-02-01T20:28:08","modified_gmt":"2023-02-01T20:28:08","slug":"tor-bongeszo","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/anonimitas-online\/tor-bongeszo\/","title":{"rendered":"TOR: Az adatv\u00e9delem \u00e9s biztons\u00e1g egyens\u00falya a mai digit\u00e1lis k\u00f6rnyezetben"},"content":{"rendered":"<p>A TOR (The Onion Router) b\u00f6ng\u00e9sz\u0151t sz\u00e9les k\u00f6rben haszn\u00e1lj\u00e1k azok az online felhaszn\u00e1l\u00f3k, akik adatv\u00e9delmet \u00e9s anonimit\u00e1st keresnek. <a href=\"https:\/\/news.ycombinator.com\/item?id=8096951\" target=\"_blank\" rel=\"noreferrer noopener\">Az Egyes\u00fclt \u00c1llamok Haditenger\u00e9szet\u00e9nek<\/a> Kutat\u00e1si Oszt\u00e1lya fejlesztette ki a 90-es \u00e9vek k\u00f6zep\u00e9n, a TOR h\u00e1l\u00f3zat t\u00f6bb rel\u00e9n kereszt\u00fcl ir\u00e1ny\u00edtja az internetes forgalmat, hogy elrejtse a felhaszn\u00e1l\u00f3k hely\u00e9t \u00e9s tev\u00e9kenys\u00e9geit a megfigyel\u00e9s \u00e9s nyomon k\u00f6vet\u00e9s el\u0151l. N\u00e9pszer\u0171s\u00e9ge ellen\u00e9re a TOR-nak vannak korl\u00e1tai \u00e9s kock\u00e1zatai, k\u00fcl\u00f6n\u00f6sen a biztons\u00e1g \u00e9s adatv\u00e9delem ter\u00e9n.<\/p>\n\n\n\n<p>Ezt a h\u00e1l\u00f3zatot \u00fajs\u00e1g\u00edr\u00f3k, aktivist\u00e1k \u00e9s azok az egy\u00e9nek haszn\u00e1lj\u00e1k, akik szeretn\u00e9k megv\u00e9deni online identit\u00e1sukat \u00e9s sz\u00f3l\u00e1sszabads\u00e1gukat. Sajnos b\u0171n\u00f6z\u0151k \u00e9s s\u00f6t\u00e9t webes piacterek is haszn\u00e1lj\u00e1k. A TOR el\u0151nyeinek \u00e9s h\u00e1tr\u00e1nyainak meg\u00e9rt\u00e9se a mai digit\u00e1lis vil\u00e1gban elengedhetetlen. Ebben a cikkben a TOR h\u00e1l\u00f3zat bels\u0151 m\u0171k\u00f6d\u00e9s\u00e9t, felhaszn\u00e1l\u00e1si m\u00f3djait \u00e9s a s\u00f6t\u00e9t webhez val\u00f3 kapcsol\u00f3d\u00e1s\u00e1t fogjuk megvizsg\u00e1lni.<\/p>\n\n\n<h2 class=\"simpletoc-title\">Tartalomjegyz\u00e9k<\/h2>\n<ul class=\"simpletoc-list\">\n<li><a href=\"#tor-and-the-dark-web\">TOR \u00e9s a S\u00f6t\u00e9t Web<\/a>\n\n<\/li>\n<li><a href=\"#the-tor-network-ecosystem\">A TOR H\u00e1l\u00f3zat \u00d6kosziszt\u00e9m\u00e1ja<\/a>\n\n<\/li>\n<li><a href=\"#most-virtuous-and-most-wanted-on-tor-network\">A Legtiszt\u00e1bb \u00e9s a Legkeresettebb a TOR H\u00e1l\u00f3zaton<\/a>\n\n<\/li>\n<li><a href=\"#what-would-a-sceptic-say-about-tor-network\">Mit mondana egy szkeptikus a TOR H\u00e1l\u00f3zatr\u00f3l?<\/a>\n\n<\/li>\n<li><a href=\"#conclusion\">K\u00f6vetkeztet\u00e9s<\/a>\n<\/li><\/ul>\n\n<h2 class=\"wp-block-heading\" id=\"tor-and-the-dark-web\">TOR \u00e9s a S\u00f6t\u00e9t Web<\/h2>\n\n\n<p>A S\u00f6t\u00e9t Web, amelyet gyakran M\u00e9ly Webnek is neveznek, az internet egy olyan r\u00e9sze, amelyhez nem lehet hagyom\u00e1nyos keres\u0151motorokkal hozz\u00e1f\u00e9rni. A hozz\u00e1f\u00e9r\u00e9shez speci\u00e1lis szoftver vagy enged\u00e9ly sz\u00fcks\u00e9ges. A TOR (The Onion Router) h\u00e1l\u00f3zat a s\u00f6t\u00e9t web egy j\u00f3l ismert p\u00e9ld\u00e1ja, \u00e9s egy decentraliz\u00e1lt szerverh\u00e1l\u00f3zatk\u00e9nt \u00edrhat\u00f3 le.<\/p>\n\n\n\n<p>A TOR h\u00e1l\u00f3zatba bel\u00e9p\u0151 felhaszn\u00e1l\u00f3k a h\u00e1l\u00f3zat r\u00e9sz\u00e9v\u00e9 v\u00e1lnak, \u00e9s tartalomgazdak\u00e9nt \u00e9s rel\u00e9csom\u00f3pontk\u00e9nt is szolg\u00e1lhatnak. A rel\u00e9csom\u00f3pontok h\u00e1l\u00f3zata lehet\u0151v\u00e9 teszi a felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra, hogy kapcsolatukat a vil\u00e1g k\u00f6r\u00fcl ugr\u00e1ltass\u00e1k, megnehez\u00edtve ezzel b\u00e1rki sz\u00e1m\u00e1ra a felhaszn\u00e1l\u00f3 hely\u00e9nek nyomon k\u00f6vet\u00e9s\u00e9t. Ez az\u00e9rt van, mert egy vizsg\u00e1lat sor\u00e1n t\u00f6bb internetszolg\u00e1ltat\u00f3 \u00e9s eszk\u00f6z is \u00e9rintett lenne.<\/p>\n\n\n\n<p>A felhaszn\u00e1l\u00f3i adatv\u00e9delem fokoz\u00e1sa \u00e9rdek\u00e9ben a TOR h\u00e1l\u00f3zat k\u00fcl\u00f6nf\u00e9le biztons\u00e1gi int\u00e9zked\u00e9seket alkalmaz, p\u00e9ld\u00e1ul t\u00f6bbsz\u00f6r\u00f6s titkos\u00edt\u00e1si r\u00e9tegeket, a felhaszn\u00e1l\u00f3i tev\u00e9kenys\u00e9gek napl\u00f3z\u00e1s\u00e1nak mell\u0151z\u00e9s\u00e9t \u00e9s anonim IP-c\u00edmeket. A TOR h\u00e1l\u00f3zat minden munkamenethez \u00faj, v\u00e9letlenszer\u0171 IP-c\u00edmet rendel a felhaszn\u00e1l\u00f3khoz, megnehez\u00edtve ezzel az online tev\u00e9kenys\u00e9gek nyomon k\u00f6vet\u00e9s\u00e9t ezen inform\u00e1ci\u00f3k alapj\u00e1n.<\/p>\n\n\n\n<p>A TOR h\u00e1l\u00f3zat t\u00f6bb mint 20 \u00e9ve l\u00e9tezik, \u00e9s sz\u00e9les k\u00f6rben haszn\u00e1lj\u00e1k, ami a s\u00f6t\u00e9t webet a TOR b\u00f6ng\u00e9sz\u0151vel t\u00e1rs\u00edtja. B\u00e1r a s\u00f6t\u00e9t web anonim b\u00f6ng\u00e9sz\u00e9se a TOR h\u00e1l\u00f3zat egyik lehets\u00e9ges felhaszn\u00e1l\u00e1si m\u00f3dja, m\u00e1s funkci\u00f3kat is k\u00edn\u00e1l, amelyek felfedez\u00e9sre \u00e9rdemesek.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-tor-network-ecosystem\">A TOR H\u00e1l\u00f3zat \u00d6kosziszt\u00e9m\u00e1ja<\/h2>\n\n\n<p>B\u00e1r a TOR B\u00f6ng\u00e9sz\u0151 k\u00fcl\u00f6n\u00f6sen hat\u00e9kony a s\u00f6t\u00e9t web b\u00f6ng\u00e9sz\u00e9s\u00e9ben, m\u00e1s mindennapi felhaszn\u00e1l\u00e1si esetekre is alkalmazhat\u00f3. Ugyanazzal a biztons\u00e1gorient\u00e1lt megk\u00f6zel\u00edt\u00e9ssel a TOR H\u00e1l\u00f3zat k\u00fcl\u00f6nf\u00e9le funkci\u00f3kat fejlesztett ki, p\u00e9ld\u00e1ul azonnali \u00fczenetk\u00fcld\u00e9st a TOR Chat-en kereszt\u00fcl.<\/p>\n\n\n\n<p><br>Emellett n\u00e9h\u00e1ny Linux oper\u00e1ci\u00f3s rendszer, p\u00e9ld\u00e1ul a Tails OS, a TOR H\u00e1l\u00f3zatot alap\u00e9rtelmezett h\u00e1l\u00f3zati kapcsolati funkci\u00f3k\u00e9nt val\u00f3s\u00edtja meg, \u00edgy egyfajta v\u00e9szkapcsol\u00f3v\u00e1 v\u00e1lik a h\u00e1l\u00f3zati adatv\u00e9delem sz\u00e1m\u00e1ra, mivel a kapcsolat a TOR H\u00e1l\u00f3zaton kereszt\u00fcl t\u00f6rt\u00e9nik, am\u00edg az oper\u00e1ci\u00f3s rendszer fut.<\/p>\n\n\n\n<p><br>Ha kutat\u00f3 vagy \u00edr\u00f3 vagy, \u00e9s sz\u00fcks\u00e9ged van a S\u00f6t\u00e9t Web forgalm\u00e1val kapcsolatos metrik\u00e1kra, haszn\u00e1lhatod a TOR Metrics-et, egy teljesen ingyenes inform\u00e1ci\u00f3forr\u00e1st, amelyet pontos statisztik\u00e1k \u00e9s metrik\u00e1k megszerz\u00e9s\u00e9hez haszn\u00e1lhatsz.<\/p>\n\n\n\n<p>F\u00e1jlokat oszthatsz meg a TOR H\u00e1l\u00f3zaton kereszt\u00fcl az OnionShare haszn\u00e1lat\u00e1val, vagy telep\u00edtheted a TORBirdy b\u0151v\u00edtm\u00e9nyt a Mozilla Thunderbirdre az e-mailek anonimiz\u00e1l\u00e1s\u00e1hoz. A TOR H\u00e1l\u00f3zathoz val\u00f3 csatlakoz\u00e1st fejlettebb szinteken is megval\u00f3s\u00edthatod olyan eszk\u00f6z\u00f6kkel, mint a <a href=\"https:\/\/github.com\/tor2web\/Tor2web\" target=\"_blank\" rel=\"noreferrer noopener\">TOR2Web<\/a>, egy \u00e1tj\u00e1r\u00f3szolg\u00e1ltat\u00e1s, amely lehet\u0151v\u00e9 teszi a felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra, hogy a TOR szolg\u00e1ltat\u00e1sokat a szok\u00e1sos web b\u00f6ng\u00e9sz\u0151n kereszt\u00fcl \u00e9rj\u00e9k el (lehet\u0151v\u00e9 t\u00e9ve a TOR H\u00e1l\u00f3zat el\u00e9r\u00e9s\u00e9t a TOR B\u00f6ng\u00e9sz\u0151 n\u00e9lk\u00fcl), vagy a Torify, egy eszk\u00f6z, amely b\u00e1rmely alkalmaz\u00e1s kapcsolat\u00e1t a TOR H\u00e1l\u00f3zatra ir\u00e1ny\u00edtja.<\/p>\n\n\n\n<p>A TOR H\u00e1l\u00f3zat alkalmazhat\u00f3s\u00e1ga \u00e9s sokoldal\u00fas\u00e1ga, valamint a szabadon haszn\u00e1lhat\u00f3, ny\u00edlt forr\u00e1sk\u00f3d\u00fa alkalmaz\u00e1sok \u00f6kosziszt\u00e9m\u00e1ja n\u00e9pszer\u0171v\u00e9 \u00e9s szinte azonnali v\u00e1laszt\u00e1ss\u00e1 tette mindazok sz\u00e1m\u00e1ra, akik anonim m\u00f3don szeretn\u00e9k b\u00f6ng\u00e9szni mind a szok\u00e1sos, mind a s\u00f6t\u00e9t webet.<br>Ez sajnos azt jelenti, hogy a TOR n\u00e9pszer\u0171 v\u00e1laszt\u00e1s azok k\u00f6r\u00e9ben, akik meg akarj\u00e1k v\u00e9deni mag\u00e1n\u00e9let\u00fcket, hogy biztons\u00e1gosan r\u00e9szt vehessenek illeg\u00e1lis tev\u00e9kenys\u00e9gekben a s\u00f6t\u00e9t weben, p\u00e9ld\u00e1ul drogok, fegyverek \u00e9s lopott adatok v\u00e1s\u00e1rl\u00e1s\u00e1ban \u00e9s elad\u00e1s\u00e1ban.<\/p>\n\n\n\n<p>Gyakran hallani h\u00edreket a s\u00f6t\u00e9t webr\u0151l, amelyek k\u00f6z\u00fcl sok hozz\u00e1j\u00e1rul a TOR H\u00e1l\u00f3zat aur\u00e1j\u00e1nak misztifik\u00e1l\u00e1s\u00e1hoz is, de t\u00f6bb m\u00edtosz l\u00e9trehoz\u00e1sa, mint tiszt\u00e1z\u00e1s, nem seg\u00edt, ez\u00e9rt a k\u00f6vetkez\u0151 szakaszban \u00e1ttekintem a TOR H\u00e1l\u00f3zat jogszer\u0171 \u00e9s jogellenes haszn\u00e1lat\u00e1val kapcsolatos t\u00e9nyeket, amelyek a leg\u00e9l\u00e9nkebb vit\u00e1kat v\u00e1ltott\u00e1k ki.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"most-virtuous-and-most-wanted-on-tor-network\">A Legtiszt\u00e1bb \u00e9s a Legkeresettebb a TOR H\u00e1l\u00f3zaton<\/h2>\n\n\n<p>\u201cA szabads\u00e1g \u00e1ra az \u00f6r\u00f6k \u00e9bers\u00e9g\u201d egy id\u00e9zet, amelyet gyakran k\u00fcl\u00f6nb\u00f6z\u0151 szerz\u0151knek tulajdon\u00edtanak, \u00e1m val\u00f3di eredete bizonytalan marad. Ennek ellen\u00e9re ez az id\u00e9zet j\u00f3l illik a TOR H\u00e1l\u00f3zathoz, mivel az \u00e1ltala biztos\u00edtott anonimit\u00e1st k\u00fcl\u00f6nf\u00e9le erk\u00f6lcsileg megk\u00e9rd\u0151jelezhet\u0151 c\u00e9lokra haszn\u00e1lt\u00e1k.<\/p>\n\n\n\n<p>Egyr\u00e9szt a TOR H\u00e1l\u00f3zat \u00e9s a hozz\u00e1 kapcsol\u00f3d\u00f3 \u00f6kosziszt\u00e9ma \u00e9rt\u00e9kes eszk\u00f6zt biztos\u00edt az \u00fajs\u00e1g\u00edr\u00f3knak \u00e9s a kisziv\u00e1rogtat\u00f3knak tev\u00e9kenys\u00e9g\u00fck biztons\u00e1gos v\u00e9gz\u00e9s\u00e9hez. A kisziv\u00e1rogtat\u00e1s joga ma sok mag\u00e1nv\u00e1llalatn\u00e1l v\u00e9dett, mivel biztos\u00edt\u00e9kk\u00e9nt szolg\u00e1l a korrupt hatalom ellen. Ebben az \u00e9rtelemben a TOR H\u00e1l\u00f3zat seg\u00edt az embereknek biztons\u00e1gban \u00e9rezni magukat, amikor a helytelen cselekedetek ellen sz\u00f3lalnak fel, anonimit\u00e1st biztos\u00edtva sz\u00e1mukra pajzsk\u00e9nt.<\/p>\n\n\n\n<p>Tov\u00e1bb\u00e1 a TOR H\u00e1l\u00f3zat lehet\u0151v\u00e9 teszi, hogy felhaszn\u00e1l\u00f3k milli\u00f3i megker\u00fclj\u00e9k a cenz\u00far\u00e1t \u00e9s a korm\u00e1nyzati blokkokat, hozz\u00e1f\u00e9r\u00e9st biztos\u00edtva olyan soksz\u00edn\u0171 inform\u00e1ci\u00f3khoz \u00e9s k\u00f6z\u00f6ns\u00e9gekhez, amelyek egy\u00e9bk\u00e9nt korl\u00e1tozottak lenn\u00e9nek. Azonban egyesek azt \u00e1ll\u00edthatj\u00e1k, hogy az \u00e1llam \u00e1ltal el\u0151\u00edrt korl\u00e1toz\u00e1sok megker\u00fcl\u00e9s\u00e9t nem szabad mentegetni, b\u00e1rmennyire is j\u00f3 sz\u00e1nd\u00e9k\u00fa. Az orsz\u00e1gok titoktart\u00e1st \u00e9s cenz\u00far\u00e1t vezetnek be olyan okokb\u00f3l, mint a nemzetbiztons\u00e1g \u00e9s a k\u00f6zrend.<\/p>\n\n\n\n<p>Sajnos a <a href=\"https:\/\/ccdcoe.org\/uploads\/2018\/10\/TOR_Anonymity_Network.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">TOR H\u00e1l\u00f3zat h\u00edrhedt h\u00edrn\u00e9vvel rendelkezik<\/a> az illeg\u00e1lis \u00e9s k\u00e1ros t\u00e9telek, p\u00e9ld\u00e1ul drogok \u00e9s gyermekpornogr\u00e1fia terjeszt\u00e9se miatt. B\u00e1r sz\u00e1mos s\u00f6t\u00e9t webes oldal azt \u00e1ll\u00edtja, hogy ezeket a szolg\u00e1ltat\u00e1sokat k\u00edn\u00e1lja, fontos megjegyezni, hogy a legt\u00f6bb oldal csal\u00f3, \u00e9s nem szabad megb\u00edzni benn\u00fck. Ennek ellen\u00e9re voltak olyan esetek, mint a Silk Road \u00e9s a Playpen nyomoz\u00e1s, ahol fegyvereket, drogokat \u00e9s gyermekporn\u00f3t ny\u00edltan kereskedtek.<\/p>\n\n\n\n<p>A Silk Road egy online piact\u00e9r volt, amely lehet\u0151v\u00e9 tette a felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra, hogy illeg\u00e1lis \u00e1rukat \u00e9s szolg\u00e1ltat\u00e1sokat v\u00e1s\u00e1roljanak \u00e9s adjanak el anonim m\u00f3don. <a href=\"https:\/\/www.cnn.com\/2013\/10\/04\/world\/americas\/silk-road-ross-ulbricht\/index.html\" rel=\"nofollow\">Az FBI 2011-ben kezdett nyomozni<\/a> \u00e9s v\u00e9g\u00fcl 2013-ban letart\u00f3ztatta Ross Ulbrichtot, az alap\u00edt\u00f3t \u00e9s \u00fczemeltet\u0151t. \u00c9letfogytiglani b\u00f6rt\u00f6nb\u00fcntet\u00e9sre \u00edt\u00e9lt\u00e9k. A Playpen nyomoz\u00e1s 2014 \u00e9s 2015 k\u00f6z\u00f6tt zajlott, \u00e9s t\u00f6bb szem\u00e9ly letart\u00f3ztat\u00e1s\u00e1val v\u00e9gz\u0151d\u00f6tt, akik gyermekpornogr\u00e1fi\u00e1t terjesztettek az oldalon kereszt\u00fcl. Mindk\u00e9t esetben a TOR H\u00e1l\u00f3zat haszn\u00e1lata lehet\u0151v\u00e9 tette az \u00fczemeltet\u0151k sz\u00e1m\u00e1ra, hogy t\u00fal sok\u00e1ig anonimak maradjanak.<\/p>\n\n\n\n<p>Ezek a nyomoz\u00e1sok r\u00e1vil\u00e1g\u00edtottak a TOR H\u00e1l\u00f3zat erk\u00f6lcsi agg\u00e1lyaira \u00e9s korl\u00e1taira, mint anonimit\u00e1si pajzs. A TOR H\u00e1l\u00f3zat korl\u00e1tait a k\u00f6vetkez\u0151 szakaszban t\u00e1rgyaljuk.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-would-a-sceptic-say-about-tor-network\">Mit mondana egy szkeptikus a TOR H\u00e1l\u00f3zatr\u00f3l?<\/h2>\n\n\n<p>A TOR H\u00e1l\u00f3zat bizonyos m\u00e9rt\u00e9kig biztons\u00e1got \u00e9s adatv\u00e9delmet ny\u00fajt, de vannak jelent\u0151s korl\u00e1tai, amelyeket figyelembe kell venni. Ezek a korl\u00e1tok a k\u00f6vetkez\u0151k:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>V\u00e9gpontok k\u00f6z\u00f6tti sebezhet\u0151s\u00e9gek<\/strong>: A TOR H\u00e1l\u00f3zat sebezhet\u0151 a t\u00e1mad\u00e1sokkal szemben, amelyek vesz\u00e9lyeztethetik a bel\u00e9p\u00e9si vagy kil\u00e9p\u00e9si csom\u00f3pontjait, lehet\u0151v\u00e9 t\u00e9ve a t\u00e1mad\u00f3 sz\u00e1m\u00e1ra, hogy figyelje vagy m\u00f3dos\u00edtsa az azokon \u00e1thalad\u00f3 forgalmat. Anonimit\u00e1si funkci\u00f3i ellen\u00e9re a h\u00e1l\u00f3zaton l\u00e9v\u0151 g\u00e9pek tov\u00e1bbra is ki vannak t\u00e9ve m\u00e1s t\u00e1mad\u00e1si form\u00e1knak.<\/li>\n\n\n\n<li><strong>\u00d6nk\u00e9ntesekre val\u00f3 t\u00e1maszkod\u00e1s<\/strong>: A TOR H\u00e1l\u00f3zat \u00f6nk\u00e9ntesekre t\u00e1maszkodik a csom\u00f3pontjainak m\u0171k\u00f6dtet\u00e9s\u00e9hez, ami n\u00f6veli a rosszindulat\u00fa csom\u00f3pontok h\u00e1l\u00f3zatba val\u00f3 bevezet\u00e9s\u00e9nek kock\u00e1zat\u00e1t. Ez korl\u00e1tozhatja a h\u00e1l\u00f3zat megb\u00edzhat\u00f3s\u00e1g\u00e1t.<\/li>\n\n\n\n<li><strong>K\u00f6zpontos\u00edtott infrastrukt\u00fara<\/strong>: Decentraliz\u00e1lt kialak\u00edt\u00e1sa ellen\u00e9re a TOR H\u00e1l\u00f3zat tov\u00e1bbra is k\u00f6zpontos\u00edtott infrastrukt\u00far\u00e1ra t\u00e1maszkodik szoftver\u00e9nek friss\u00edt\u00e9s\u00e9hez \u00e9s n\u00e9h\u00e1ny m\u0171velet\u00e9nek kezel\u00e9s\u00e9hez. Ez aggodalmakat vet fel a friss\u00edt\u00e9sek megb\u00edzhat\u00f3s\u00e1g\u00e1val \u00e9s k\u00f6vetkezetess\u00e9g\u00e9vel kapcsolatban.<\/li>\n<\/ol>\n\n\n\n<p>Ezek a korl\u00e1tok elriaszthatj\u00e1k egyes felhaszn\u00e1l\u00f3kat a TOR H\u00e1l\u00f3zat haszn\u00e1lat\u00e1t\u00f3l. Hasznoss\u00e1g\u00e1t \u00e9s alkalmazhat\u00f3s\u00e1g\u00e1t azonban az alternat\u00edv\u00e1khoz k\u00e9pest kell \u00e9rt\u00e9kelni, \u00e9s az a t\u00e9ny, hogy bizonyos korl\u00e1tok vonatkoznak r\u00e1, nem akad\u00e1lyozhatja meg a haszn\u00e1lat\u00e1t.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\">K\u00f6vetkeztet\u00e9s<\/h2>\n\n\n<p>Miel\u0151tt b\u00e1rmilyen tev\u00e9kenys\u00e9get v\u00e9gezne a TOR H\u00e1l\u00f3zaton, elengedhetetlen, hogy alaposan m\u00e9rlegelje az \u00f6sszes alternat\u00edv lehet\u0151s\u00e9get. B\u00e1r a TOR \u00e1ltal k\u00edn\u00e1lt anonimit\u00e1s \u00e9s adatv\u00e9delem p\u00e1ratlan, ny\u00edlt forr\u00e1sk\u00f3d\u00fa term\u00e9szete miatt kev\u00e9sb\u00e9 megb\u00edzhat\u00f3 v\u00e1laszt\u00e1s lehet professzion\u00e1lis haszn\u00e1latra. Ha j\u00f3l ismeri az internetes \u00e9s b\u00f6ng\u00e9sz\u00e9si technol\u00f3gi\u00e1kat, a TOR k\u00f6r\u00fcli k\u00f6z\u00f6ss\u00e9g \u00e9s m\u00edtoszok nem jelentenek probl\u00e9m\u00e1t. Ha azonban nem ismeri ezeket a technol\u00f3gi\u00e1kat, aj\u00e1nlott figyelembe venni ezeket a t\u00e9nyez\u0151ket, miel\u0151tt a TOR-t haszn\u00e1ln\u00e1.<\/p>","protected":false},"excerpt":{"rendered":"<p>The TOR (The Onion Router) browser is widely used for online users seeking privacy and anonymity. Developed by the US Naval Research Department in the mid-90s, the TOR network routes\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/anonimitas-online\/tor-bongeszo\/\">Folytat\u00e1s <span class=\"screen-reader-text\">TOR: Az adatv\u00e9delem \u00e9s biztons\u00e1g egyens\u00falya a mai digit\u00e1lis k\u00f6rnyezetben<\/span><\/a><\/p>","protected":false},"author":4,"featured_media":1327,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[33,34,35],"class_list":["post-1836","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-anonymity-online","tag-anonymity","tag-political-subject","tag-tor","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Stay Anonymous Online with Tor VPN | Security Briefing<\/title>\n<meta name=\"description\" content=\"Stay safe and secure while browsing the internet with the anonymity provided by Tor VPN. Discover the benefits of using Tor VPN.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/anonimitas-online\/tor-bongeszo\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stay Anonymous Online with Tor VPN | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Stay safe and secure while browsing the internet with the anonymity provided by Tor VPN. Discover the benefits of using Tor VPN.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/anonimitas-online\/tor-bongeszo\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-01T20:28:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"574\" \/>\n\t<meta property=\"og:image:height\" content=\"294\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alessandro Mirani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alessandro Mirani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/\"},\"author\":{\"name\":\"Alessandro Mirani\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/223f15fc2ffff8f95cd1f3faa3c422d2\"},\"headline\":\"TOR: Balancing Privacy and Security in Today&#8217;s Digital Landscape\",\"datePublished\":\"2023-02-01T20:28:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/\"},\"wordCount\":1301,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg\",\"keywords\":[\"Anonymity\",\"Political Subject\",\"TOR\"],\"articleSection\":[\"Anonymity online\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/\",\"url\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/\",\"name\":\"Stay Anonymous Online with Tor VPN | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg\",\"datePublished\":\"2023-02-01T20:28:08+00:00\",\"description\":\"Stay safe and secure while browsing the internet with the anonymity provided by Tor VPN. Discover the benefits of using Tor VPN.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg\",\"width\":574,\"height\":294,\"caption\":\"TOR Balancing Privacy and Security in Today's Digital Landscape\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TOR: Balancing Privacy and Security in Today&#8217;s Digital Landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/223f15fc2ffff8f95cd1f3faa3c422d2\",\"name\":\"Alessandro Mirani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cc902d0ba95f7eaadf8581d353dcdfe4f1a1dd3e219cda1a3c3666cfe139d887?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cc902d0ba95f7eaadf8581d353dcdfe4f1a1dd3e219cda1a3c3666cfe139d887?s=96&d=mm&r=g\",\"caption\":\"Alessandro Mirani\"},\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/alessandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Maradj n\u00e9vtelen online a Tor VPN-nel | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Maradjon biztons\u00e1gban \u00e9s v\u00e9dett az internet b\u00f6ng\u00e9sz\u00e9se k\u00f6zben a Tor VPN \u00e1ltal ny\u00fajtott anonimit\u00e1ssal. Fedezze fel a Tor VPN haszn\u00e1lat\u00e1nak el\u0151nyeit.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/anonimitas-online\/tor-bongeszo\/","og_locale":"hu_HU","og_type":"article","og_title":"Stay Anonymous Online with Tor VPN | Security Briefing","og_description":"Stay safe and secure while browsing the internet with the anonymity provided by Tor VPN. Discover the benefits of using Tor VPN.","og_url":"https:\/\/securitybriefing.net\/hu\/anonimitas-online\/tor-bongeszo\/","og_site_name":"Security Briefing","article_published_time":"2023-02-01T20:28:08+00:00","og_image":[{"width":574,"height":294,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg","type":"image\/jpeg"}],"author":"Alessandro Mirani","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"Alessandro Mirani","Becs\u00fclt olvas\u00e1si id\u0151":"6 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/"},"author":{"name":"Alessandro Mirani","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/223f15fc2ffff8f95cd1f3faa3c422d2"},"headline":"TOR: Balancing Privacy and Security in Today&#8217;s Digital Landscape","datePublished":"2023-02-01T20:28:08+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/"},"wordCount":1301,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg","keywords":["Anonymity","Political Subject","TOR"],"articleSection":["Anonymity online"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/","url":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/","name":"Maradj n\u00e9vtelen online a Tor VPN-nel | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg","datePublished":"2023-02-01T20:28:08+00:00","description":"Maradjon biztons\u00e1gban \u00e9s v\u00e9dett az internet b\u00f6ng\u00e9sz\u00e9se k\u00f6zben a Tor VPN \u00e1ltal ny\u00fajtott anonimit\u00e1ssal. Fedezze fel a Tor VPN haszn\u00e1lat\u00e1nak el\u0151nyeit.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg","width":574,"height":294,"caption":"TOR Balancing Privacy and Security in Today's Digital Landscape"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"TOR: Balancing Privacy and Security in Today&#8217;s Digital Landscape"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/223f15fc2ffff8f95cd1f3faa3c422d2","name":"Alessandro Mirani","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cc902d0ba95f7eaadf8581d353dcdfe4f1a1dd3e219cda1a3c3666cfe139d887?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cc902d0ba95f7eaadf8581d353dcdfe4f1a1dd3e219cda1a3c3666cfe139d887?s=96&d=mm&r=g","caption":"Alessandro Mirani"},"url":"https:\/\/securitybriefing.net\/hu\/author\/alessandro\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1836"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1836\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1327"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}