{"id":1836,"date":"2023-02-01T20:28:08","date_gmt":"2023-02-01T20:28:08","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1318"},"modified":"2023-02-01T20:28:08","modified_gmt":"2023-02-01T20:28:08","slug":"tor-trinh-duyet","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/an-danh-truc-tuyen\/tor-trinh-duyet\/","title":{"rendered":"TOR: C\u00e2n b\u1eb1ng quy\u1ec1n ri\u00eang t\u01b0 v\u00e0 b\u1ea3o m\u1eadt trong b\u1ed1i c\u1ea3nh k\u1ef9 thu\u1eadt s\u1ed1 ng\u00e0y nay"},"content":{"rendered":"<p>Tr\u00ecnh duy\u1ec7t TOR (The Onion Router) \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng r\u1ed9ng r\u00e3i cho nh\u1eefng ng\u01b0\u1eddi d\u00f9ng tr\u1ef1c tuy\u1ebfn t\u00ecm ki\u1ebfm s\u1ef1 ri\u00eang t\u01b0 v\u00e0 \u1ea9n danh. <a href=\"https:\/\/news.ycombinator.com\/item?id=8096951\" target=\"_blank\" rel=\"noreferrer noopener\">\u0110\u01b0\u1ee3c ph\u00e1t tri\u1ec3n b\u1edfi H\u1ea3i qu\u00e2n Hoa K\u1ef3<\/a> B\u1ed9 ph\u1eadn Nghi\u00ean c\u1ee9u v\u00e0o gi\u1eefa nh\u1eefng n\u0103m 90, m\u1ea1ng TOR \u0111\u1ecbnh tuy\u1ebfn l\u01b0u l\u01b0\u1ee3ng internet qua nhi\u1ec1u tr\u1ea1m chuy\u1ec3n ti\u1ebfp \u0111\u1ec3 che gi\u1ea5u v\u1ecb tr\u00ed v\u00e0 ho\u1ea1t \u0111\u1ed9ng c\u1ee7a ng\u01b0\u1eddi d\u00f9ng kh\u1ecfi s\u1ef1 gi\u00e1m s\u00e1t v\u00e0 theo d\u00f5i. M\u1eb7c d\u00f9 ph\u1ed5 bi\u1ebfn, TOR kh\u00f4ng ph\u1ea3i l\u00e0 kh\u00f4ng c\u00f3 h\u1ea1n ch\u1ebf v\u00e0 r\u1ee7i ro, \u0111\u1eb7c bi\u1ec7t l\u00e0 khi n\u00f3i \u0111\u1ebfn b\u1ea3o m\u1eadt v\u00e0 quy\u1ec1n ri\u00eang t\u01b0.<\/p>\n\n\n\n<p>This network is utilized by journalists, activists, and individuals seeking to protect their online identity and freedom of expression. Unfortunately, it is also used by criminals and dark web marketplaces. Understanding the benefits and drawbacks of TOR in today\u2019s digital landscape is crucial. In this article, we will delve into the inner workings of the TOR network, its uses, and its connection to the dark web.<\/p>\n\n\n<h2 class=\"simpletoc-title\">M\u1ee5c l\u1ee5c<\/h2>\n<ul class=\"simpletoc-list\">\n<li><a href=\"#tor-and-the-dark-web\">TOR v\u00e0 Web T\u1ed1i<\/a>\n\n<\/li>\n<li><a href=\"#the-tor-network-ecosystem\">H\u1ec7 sinh th\u00e1i M\u1ea1ng TOR<\/a>\n\n<\/li>\n<li><a href=\"#most-virtuous-and-most-wanted-on-tor-network\">\u0110\u01b0\u1ee3c T\u00f4n Vinh Nh\u1ea5t v\u00e0 B\u1ecb Truy N\u00e3 Nh\u1ea5t tr\u00ean M\u1ea1ng TOR<\/a>\n\n<\/li>\n<li><a href=\"#what-would-a-sceptic-say-about-tor-network\">M\u1ed9t ng\u01b0\u1eddi ho\u00e0i nghi s\u1ebd n\u00f3i g\u00ec v\u1ec1 M\u1ea1ng TOR?<\/a>\n\n<\/li>\n<li><a href=\"#conclusion\">K\u1ebft lu\u1eadn<\/a>\n<\/li><\/ul>\n\n<h2 class=\"wp-block-heading\" id=\"tor-and-the-dark-web\">TOR v\u00e0 Web T\u1ed1i<\/h2>\n\n\n<p>Web T\u1ed1i, c\u00f2n \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 Web S\u00e2u, l\u00e0 m\u1ed9t ph\u1ea7n c\u1ee7a internet kh\u00f4ng th\u1ec3 truy c\u1eadp th\u00f4ng qua c\u00e1c c\u00f4ng c\u1ee5 t\u00ecm ki\u1ebfm th\u00f4ng th\u01b0\u1eddng. Truy c\u1eadp n\u00f3 y\u00eau c\u1ea7u ph\u1ea7n m\u1ec1m c\u1ee5 th\u1ec3 ho\u1eb7c s\u1ef1 cho ph\u00e9p. M\u1ea1ng TOR (The Onion Router) l\u00e0 m\u1ed9t v\u00ed d\u1ee5 n\u1ed5i ti\u1ebfng c\u1ee7a web t\u1ed1i v\u00e0 c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c m\u00f4 t\u1ea3 nh\u01b0 m\u1ed9t m\u1ea1ng l\u01b0\u1edbi m\u00e1y ch\u1ee7 phi t\u1eadp trung.<\/p>\n\n\n\n<p>Users who enter the TOR network become part of the network and can serve as both content hosts and relay nodes. The network of relay nodes allows users to bounce their connection around the world, making it challenging for anyone to track a user\u2019s location. This is because multiple ISPs and devices would be involved in an investigation.<\/p>\n\n\n\n<p>\u0110\u1ec3 t\u0103ng c\u01b0\u1eddng quy\u1ec1n ri\u00eang t\u01b0 c\u1ee7a ng\u01b0\u1eddi d\u00f9ng, m\u1ea1ng TOR s\u1eed d\u1ee5ng c\u00e1c bi\u1ec7n ph\u00e1p b\u1ea3o m\u1eadt kh\u00e1c nhau nh\u01b0 nhi\u1ec1u l\u1edbp m\u00e3 h\u00f3a, kh\u00f4ng ghi nh\u1eadt k\u00fd ho\u1ea1t \u0111\u1ed9ng c\u1ee7a ng\u01b0\u1eddi d\u00f9ng v\u00e0 \u0111\u1ecba ch\u1ec9 IP \u1ea9n danh. M\u1ea1ng TOR g\u00e1n cho ng\u01b0\u1eddi d\u00f9ng m\u1ed9t \u0111\u1ecba ch\u1ec9 IP m\u1edbi, ng\u1eabu nhi\u00ean cho m\u1ed7i phi\u00ean, l\u00e0m cho vi\u1ec7c theo d\u00f5i ho\u1ea1t \u0111\u1ed9ng tr\u1ef1c tuy\u1ebfn d\u1ef1a tr\u00ean th\u00f4ng tin n\u00e0y tr\u1edf n\u00ean kh\u00f3 kh\u0103n.<\/p>\n\n\n\n<p>M\u1ea1ng TOR \u0111\u00e3 t\u1ed3n t\u1ea1i h\u01a1n 20 n\u0103m v\u00e0 vi\u1ec7c s\u1eed d\u1ee5ng n\u00f3 r\u1ea5t ph\u1ed5 bi\u1ebfn, d\u1eabn \u0111\u1ebfn s\u1ef1 li\u00ean k\u1ebft c\u1ee7a web t\u1ed1i v\u1edbi tr\u00ecnh duy\u1ec7t TOR. M\u1eb7c d\u00f9 \u0111i\u1ec1u h\u01b0\u1edbng \u1ea9n danh c\u1ee7a web t\u1ed1i l\u00e0 m\u1ed9t c\u00e1ch s\u1eed d\u1ee5ng c\u00f3 th\u1ec3 c\u1ee7a m\u1ea1ng TOR, n\u00f3 cung c\u1ea5p c\u00e1c ch\u1ee9c n\u0103ng kh\u00e1c \u0111\u00e1ng \u0111\u1ec3 kh\u00e1m ph\u00e1.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-tor-network-ecosystem\">H\u1ec7 sinh th\u00e1i M\u1ea1ng TOR<\/h2>\n\n\n<p>M\u1eb7c d\u00f9 Tr\u00ecnh duy\u1ec7t TOR \u0111\u1eb7c bi\u1ec7t hi\u1ec7u qu\u1ea3 trong vi\u1ec7c \u0111i\u1ec1u h\u01b0\u1edbng web t\u1ed1i, n\u00f3 c\u0169ng c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng cho c\u00e1c tr\u01b0\u1eddng h\u1ee3p s\u1eed d\u1ee5ng h\u00e0ng ng\u00e0y kh\u00e1c. V\u1edbi c\u00e1ch ti\u1ebfp c\u1eadn h\u01b0\u1edbng \u0111\u1ebfn b\u1ea3o m\u1eadt t\u01b0\u01a1ng t\u1ef1, M\u1ea1ng TOR \u0111\u00e3 ph\u00e1t tri\u1ec3n c\u00e1c ch\u1ee9c n\u0103ng kh\u00e1c nhau, ch\u1eb3ng h\u1ea1n nh\u01b0 Nh\u1eafn tin t\u1ee9c th\u00ec qua TOR Chat.<\/p>\n\n\n\n<p><br>Ngo\u00e0i ra, m\u1ed9t s\u1ed1 h\u1ec7 \u0111i\u1ec1u h\u00e0nh Linux, ch\u1eb3ng h\u1ea1n nh\u01b0 Tails OS, tri\u1ec3n khai M\u1ea1ng TOR l\u00e0m ch\u1ee9c n\u0103ng k\u1ebft n\u1ed1i m\u1ea1ng m\u1eb7c \u0111\u1ecbnh, bi\u1ebfn n\u00f3 th\u00e0nh m\u1ed9t c\u00f4ng t\u1eafc ng\u1eaft cho quy\u1ec1n ri\u00eang t\u01b0 m\u1ea1ng, v\u00ec k\u1ebft n\u1ed1i \u0111\u01b0\u1ee3c bu\u1ed9c th\u00f4ng qua M\u1ea1ng TOR mi\u1ec5n l\u00e0 h\u1ec7 \u0111i\u1ec1u h\u00e0nh \u0111ang ch\u1ea1y.<\/p>\n\n\n\n<p><br>N\u1ebfu b\u1ea1n l\u00e0 m\u1ed9t nh\u00e0 nghi\u00ean c\u1ee9u ho\u1eb7c nh\u00e0 v\u0103n v\u00e0 c\u1ea7n s\u1ed1 li\u1ec7u v\u1ec1 l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp Web T\u1ed1i, b\u1ea1n c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng TOR Metrics, m\u1ed9t ngu\u1ed3n th\u00f4ng tin ho\u00e0n to\u00e0n mi\u1ec5n ph\u00ed m\u00e0 b\u1ea1n c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng \u0111\u1ec3 c\u00f3 s\u1ed1 li\u1ec7u th\u1ed1ng k\u00ea v\u00e0 s\u1ed1 li\u1ec7u ch\u00ednh x\u00e1c.<\/p>\n\n\n\n<p>B\u1ea1n c\u00f3 th\u1ec3 chia s\u1ebb t\u1ec7p qua M\u1ea1ng TOR b\u1eb1ng c\u00e1ch s\u1eed d\u1ee5ng OnionShare ho\u1eb7c c\u00e0i \u0111\u1eb7t plugin TORBirdy tr\u00ean Mozilla Thunderbird \u0111\u1ec3 \u1ea9n danh email. B\u1ea1n c\u0169ng c\u00f3 th\u1ec3 tri\u1ec3n khai k\u1ebft n\u1ed1i v\u1edbi M\u1ea1ng TOR \u1edf c\u00e1c c\u1ea5p \u0111\u1ed9 n\u00e2ng cao h\u01a1n v\u1edbi c\u00e1c c\u00f4ng c\u1ee5 nh\u01b0 <a href=\"https:\/\/github.com\/tor2web\/Tor2web\" target=\"_blank\" rel=\"noreferrer noopener\">TOR2Web<\/a>, m\u1ed9t d\u1ecbch v\u1ee5 c\u1ed5ng cho ph\u00e9p ng\u01b0\u1eddi d\u00f9ng truy c\u1eadp c\u00e1c d\u1ecbch v\u1ee5 TOR tr\u00ean tr\u00ecnh duy\u1ec7t web th\u00f4ng th\u01b0\u1eddng (cho ph\u00e9p b\u1ea1n truy c\u1eadp M\u1ea1ng TOR m\u00e0 kh\u00f4ng c\u1ea7n Tr\u00ecnh duy\u1ec7t TOR), ho\u1eb7c Torify, m\u1ed9t c\u00f4ng c\u1ee5 \u0111\u1ecbnh tuy\u1ebfn k\u1ebft n\u1ed1i c\u1ee7a b\u1ea5t k\u1ef3 \u1ee9ng d\u1ee5ng n\u00e0o \u0111\u1ebfn M\u1ea1ng TOR.<\/p>\n\n\n\n<p>T\u00ednh \u1ee9ng d\u1ee5ng v\u00e0 t\u00ednh linh ho\u1ea1t c\u1ee7a M\u1ea1ng TOR v\u00e0 h\u1ec7 sinh th\u00e1i \u1ee9ng d\u1ee5ng m\u00e3 ngu\u1ed3n m\u1edf mi\u1ec5n ph\u00ed s\u1eed d\u1ee5ng c\u1ee7a n\u00f3 \u0111\u00e3 l\u00e0m cho n\u00f3 tr\u1edf th\u00e0nh m\u1ed9t l\u1ef1a ch\u1ecdn ph\u1ed5 bi\u1ebfn v\u00e0 g\u1ea7n nh\u01b0 ngay l\u1eadp t\u1ee9c cho m\u1ecdi ng\u01b0\u1eddi mu\u1ed1n \u0111i\u1ec1u h\u01b0\u1edbng c\u1ea3 web th\u00f4ng th\u01b0\u1eddng v\u00e0 web t\u1ed1i m\u1ed9t c\u00e1ch \u1ea9n danh.<br>\u0110i\u1ec1u n\u00e0y, \u0111\u00e1ng ti\u1ebfc, ng\u1ee5 \u00fd r\u1eb1ng TOR l\u00e0 m\u1ed9t l\u1ef1a ch\u1ecdn ph\u1ed5 bi\u1ebfn trong s\u1ed1 nh\u1eefng ng\u01b0\u1eddi mu\u1ed1n b\u1ea3o v\u1ec7 quy\u1ec1n ri\u00eang t\u01b0 c\u1ee7a h\u1ecd \u0111\u1ec3 tham gia an to\u00e0n v\u00e0o c\u00e1c ho\u1ea1t \u0111\u1ed9ng b\u1ea5t h\u1ee3p ph\u00e1p tr\u00ean web t\u1ed1i, ch\u1eb3ng h\u1ea1n nh\u01b0 mua v\u00e0 b\u00e1n ma t\u00fay, v\u0169 kh\u00ed v\u00e0 d\u1eef li\u1ec7u b\u1ecb \u0111\u00e1nh c\u1eafp.<\/p>\n\n\n\n<p>Th\u01b0\u1eddng c\u00f3 tin t\u1ee9c xung quanh web t\u1ed1i, nhi\u1ec1u trong s\u1ed1 \u0111\u00f3 g\u00f3p ph\u1ea7n l\u00e0m th\u1ea7n b\u00ed h\u00f3a h\u00e0o quang c\u1ee7a M\u1ea1ng TOR c\u0169ng nh\u01b0, nh\u01b0ng t\u1ea1o ra nhi\u1ec1u huy\u1ec1n tho\u1ea1i h\u01a1n l\u00e0 s\u1ef1 r\u00f5 r\u00e0ng kh\u00f4ng h\u1eefu \u00edch, \u0111\u00f3 l\u00e0 l\u00fd do t\u1ea1i sao, trong ph\u1ea7n ti\u1ebfp theo, t\u00f4i s\u1ebd xem x\u00e9t m\u1ed9t s\u1ed1 s\u1ef1 th\u1eadt v\u1ec1 vi\u1ec7c s\u1eed d\u1ee5ng h\u1ee3p ph\u00e1p v\u00e0 b\u1ea5t h\u1ee3p ph\u00e1p c\u1ee7a M\u1ea1ng TOR \u0111\u00e3 t\u1ea1o ra m\u1ed9t s\u1ed1 cu\u1ed9c tranh lu\u1eadn s\u00f4i n\u1ed5i nh\u1ea5t.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"most-virtuous-and-most-wanted-on-tor-network\">\u0110\u01b0\u1ee3c T\u00f4n Vinh Nh\u1ea5t v\u00e0 B\u1ecb Truy N\u00e3 Nh\u1ea5t tr\u00ean M\u1ea1ng TOR<\/h2>\n\n\n<p>\u201cThe Price of Freedom is Eternal Vigilance\u201d is a quote often credited to various authors, yet its true origin remains uncertain. Nevertheless, this quote fits well with the TOR Network, as the anonymity it provides has been used for various morally questionable purposes.<\/p>\n\n\n\n<p>M\u1ed9t m\u1eb7t, M\u1ea1ng TOR v\u00e0 h\u1ec7 sinh th\u00e1i li\u00ean quan c\u1ee7a n\u00f3 cung c\u1ea5p cho c\u00e1c nh\u00e0 b\u00e1o v\u00e0 ng\u01b0\u1eddi t\u1ed1 gi\u00e1c m\u1ed9t c\u00f4ng c\u1ee5 c\u00f3 gi\u00e1 tr\u1ecb \u0111\u1ec3 th\u1ef1c hi\u1ec7n c\u00e1c ho\u1ea1t \u0111\u1ed9ng c\u1ee7a h\u1ecd m\u1ed9t c\u00e1ch an to\u00e0n. Quy\u1ec1n t\u1ed1 gi\u00e1c \u0111\u01b0\u1ee3c b\u1ea3o v\u1ec7 trong nhi\u1ec1u c\u00f4ng ty t\u01b0 nh\u00e2n ng\u00e0y nay v\u00ec n\u00f3 \u0111\u00f3ng vai tr\u00f2 nh\u01b0 m\u1ed9t bi\u1ec7n ph\u00e1p an to\u00e0n ch\u1ed1ng l\u1ea1i quy\u1ec1n l\u1ef1c tham nh\u0169ng. Theo ngh\u0129a n\u00e0y, M\u1ea1ng TOR gi\u00fap m\u1ecdi ng\u01b0\u1eddi c\u1ea3m th\u1ea5y an to\u00e0n khi l\u00ean ti\u1ebfng ch\u1ed1ng l\u1ea1i h\u00e0nh vi sai tr\u00e1i, trao cho h\u1ecd s\u1ef1 \u1ea9n danh nh\u01b0 m\u1ed9t l\u00e1 ch\u1eafn.<\/p>\n\n\n\n<p>H\u01a1n n\u1eefa, M\u1ea1ng TOR cho ph\u00e9p h\u00e0ng tri\u1ec7u ng\u01b0\u1eddi d\u00f9ng v\u01b0\u1ee3t qua ki\u1ec3m duy\u1ec7t v\u00e0 ch\u1eb7n c\u1ee7a ch\u00ednh ph\u1ee7, cung c\u1ea5p quy\u1ec1n truy c\u1eadp v\u00e0o th\u00f4ng tin v\u00e0 kh\u00e1n gi\u1ea3 \u0111a d\u1ea1ng m\u00e0 n\u1ebfu kh\u00f4ng s\u1ebd b\u1ecb h\u1ea1n ch\u1ebf. Tuy nhi\u00ean, c\u00f3 th\u1ec3 l\u1eadp lu\u1eadn r\u1eb1ng vi\u1ec7c v\u01b0\u1ee3t qua c\u00e1c h\u1ea1n ch\u1ebf do nh\u00e0 n\u01b0\u1edbc \u00e1p \u0111\u1eb7t kh\u00f4ng n\u00ean \u0111\u01b0\u1ee3c tha th\u1ee9, cho d\u00f9 c\u00f3 \u00fd t\u1ed1t \u0111\u1ebfn \u0111\u00e2u. C\u00e1c qu\u1ed1c gia \u00e1p \u0111\u1eb7t b\u00ed m\u1eadt v\u00e0 ki\u1ec3m duy\u1ec7t v\u00ec nh\u1eefng l\u00fd do nh\u01b0 an ninh qu\u1ed1c gia v\u00e0 tr\u1eadt t\u1ef1 c\u00f4ng c\u1ed9ng.<\/p>\n\n\n\n<p>\u0110\u00e1ng ti\u1ebfc, <a href=\"https:\/\/ccdcoe.org\/uploads\/2018\/10\/TOR_Anonymity_Network.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">M\u1ea1ng TOR c\u00f3 danh ti\u1ebfng kh\u00e9t ti\u1ebfng<\/a> v\u00ec \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 ph\u00e2n ph\u1ed1i c\u00e1c m\u1eb7t h\u00e0ng b\u1ea5t h\u1ee3p ph\u00e1p v\u00e0 c\u00f3 h\u1ea1i nh\u01b0 ma t\u00fay v\u00e0 n\u1ed9i dung khi\u00eau d\u00e2m tr\u1ebb em. M\u1eb7c d\u00f9 nhi\u1ec1u trang web tr\u00ean web t\u1ed1i tuy\u00ean b\u1ed1 cung c\u1ea5p c\u00e1c d\u1ecbch v\u1ee5 n\u00e0y, \u0111i\u1ec1u quan tr\u1ecdng c\u1ea7n l\u01b0u \u00fd l\u00e0 h\u1ea7u h\u1ebft c\u00e1c trang web l\u00e0 l\u1eeba \u0111\u1ea3o v\u00e0 kh\u00f4ng n\u00ean tin t\u01b0\u1edfng. M\u1eb7c d\u00f9 v\u1eady, \u0111\u00e3 c\u00f3 nh\u1eefng tr\u01b0\u1eddng h\u1ee3p th\u1ecb tr\u01b0\u1eddng tr\u1ef1c tuy\u1ebfn h\u1ee3p ph\u00e1p, ch\u1eb3ng h\u1ea1n nh\u01b0 The Silk Road v\u00e0 cu\u1ed9c \u0111i\u1ec1u tra Playpen, n\u01a1i v\u0169 kh\u00ed, ma t\u00fay v\u00e0 n\u1ed9i dung khi\u00eau d\u00e2m tr\u1ebb em \u0111\u01b0\u1ee3c bu\u00f4n b\u00e1n c\u00f4ng khai.<\/p>\n\n\n\n<p>The Silk Road l\u00e0 m\u1ed9t th\u1ecb tr\u01b0\u1eddng tr\u1ef1c tuy\u1ebfn cho ph\u00e9p ng\u01b0\u1eddi d\u00f9ng mua v\u00e0 b\u00e1n h\u00e0ng h\u00f3a v\u00e0 d\u1ecbch v\u1ee5 b\u1ea5t h\u1ee3p ph\u00e1p m\u1ed9t c\u00e1ch \u1ea9n danh. <a href=\"https:\/\/www.cnn.com\/2013\/10\/04\/world\/americas\/silk-road-ross-ulbricht\/index.html\" rel=\"nofollow\">FBI b\u1eaft \u0111\u1ea7u \u0111i\u1ec1u tra v\u00e0o n\u0103m 2011<\/a> v\u00e0 cu\u1ed1i c\u00f9ng \u0111\u00e3 b\u1eaft gi\u1eef Ross Ulbricht, ng\u01b0\u1eddi s\u00e1ng l\u1eadp v\u00e0 \u0111i\u1ec1u h\u00e0nh, v\u00e0o n\u0103m 2013. Anh ta b\u1ecb k\u1ebft \u00e1n t\u00f9 chung th\u00e2n. Cu\u1ed9c \u0111i\u1ec1u tra Playpen di\u1ec5n ra t\u1eeb n\u0103m 2014 \u0111\u1ebfn 2015, d\u1eabn \u0111\u1ebfn vi\u1ec7c b\u1eaft gi\u1eef nhi\u1ec1u c\u00e1 nh\u00e2n ph\u00e2n ph\u1ed1i n\u1ed9i dung khi\u00eau d\u00e2m tr\u1ebb em qua trang web. Trong c\u1ea3 hai tr\u01b0\u1eddng h\u1ee3p, vi\u1ec7c s\u1eed d\u1ee5ng M\u1ea1ng TOR cho ph\u00e9p c\u00e1c nh\u00e0 \u0111i\u1ec1u h\u00e0nh \u1ea9n danh qu\u00e1 l\u00e2u.<\/p>\n\n\n\n<p>These investigations have highlighted the TOR Network\u2019s moral concerns and its limitations as an anonymity shield. The limitations of the TOR Network will be discussed in the next section.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-would-a-sceptic-say-about-tor-network\">M\u1ed9t ng\u01b0\u1eddi ho\u00e0i nghi s\u1ebd n\u00f3i g\u00ec v\u1ec1 M\u1ea1ng TOR?<\/h2>\n\n\n<p>M\u1ea1ng TOR cung c\u1ea5p b\u1ea3o m\u1eadt v\u00e0 quy\u1ec1n ri\u00eang t\u01b0 \u1edf m\u1ed9t m\u1ee9c \u0111\u1ed9 nh\u1ea5t \u0111\u1ecbnh, nh\u01b0ng n\u00f3 c\u0169ng c\u00f3 m\u1ed9t s\u1ed1 h\u1ea1n ch\u1ebf \u0111\u00e1ng k\u1ec3 c\u1ea7n \u0111\u01b0\u1ee3c xem x\u00e9t. Nh\u1eefng h\u1ea1n ch\u1ebf n\u00e0y bao g\u1ed3m:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>L\u1ed7 h\u1ed5ng \u0111\u1ea7u cu\u1ed1i<\/strong>: M\u1ea1ng TOR d\u1ec5 b\u1ecb t\u1ea5n c\u00f4ng l\u00e0m t\u1ed5n h\u1ea1i \u0111\u1ebfn c\u00e1c n\u00fat v\u00e0o ho\u1eb7c ra c\u1ee7a n\u00f3, cho ph\u00e9p k\u1ebb t\u1ea5n c\u00f4ng gi\u00e1m s\u00e1t ho\u1eb7c thay \u0111\u1ed5i l\u01b0u l\u01b0\u1ee3ng truy c\u1eadp qua ch\u00fang. M\u1eb7c d\u00f9 c\u00f3 c\u00e1c t\u00ednh n\u0103ng \u1ea9n danh, c\u00e1c m\u00e1y tr\u00ean m\u1ea1ng v\u1eabn d\u1ec5 b\u1ecb c\u00e1c h\u00ecnh th\u1ee9c t\u1ea5n c\u00f4ng kh\u00e1c.<\/li>\n\n\n\n<li><strong>Ph\u1ee5 thu\u1ed9c v\u00e0o t\u00ecnh nguy\u1ec7n vi\u00ean<\/strong>: The TOR Network relies on volunteers to run its nodes, which increases the risk of malicious nodes being introduced into the network. This can limit the network\u2019s reliability.<\/li>\n\n\n\n<li><strong>C\u01a1 s\u1edf h\u1ea1 t\u1ea7ng t\u1eadp trung<\/strong>: M\u1eb7c d\u00f9 c\u00f3 thi\u1ebft k\u1ebf phi t\u1eadp trung, M\u1ea1ng TOR v\u1eabn ph\u1ee5 thu\u1ed9c v\u00e0o c\u01a1 s\u1edf h\u1ea1 t\u1ea7ng t\u1eadp trung \u0111\u1ec3 c\u1eadp nh\u1eadt ph\u1ea7n m\u1ec1m v\u00e0 x\u1eed l\u00fd m\u1ed9t s\u1ed1 ho\u1ea1t \u0111\u1ed9ng c\u1ee7a n\u00f3. \u0110i\u1ec1u n\u00e0y l\u00e0m d\u1ea5y l\u00ean lo ng\u1ea1i v\u1ec1 \u0111\u1ed9 tin c\u1eady v\u00e0 t\u00ednh nh\u1ea5t qu\u00e1n c\u1ee7a c\u00e1c b\u1ea3n c\u1eadp nh\u1eadt.<\/li>\n<\/ol>\n\n\n\n<p>Nh\u1eefng h\u1ea1n ch\u1ebf n\u00e0y c\u00f3 th\u1ec3 khi\u1ebfn m\u1ed9t s\u1ed1 ng\u01b0\u1eddi d\u00f9ng kh\u00f4ng s\u1eed d\u1ee5ng M\u1ea1ng TOR. Tuy nhi\u00ean, t\u00ednh h\u1eefu \u00edch v\u00e0 kh\u1ea3 n\u0103ng \u00e1p d\u1ee5ng c\u1ee7a n\u00f3 n\u00ean \u0111\u01b0\u1ee3c \u0111\u00e1nh gi\u00e1 so v\u1edbi c\u00e1c l\u1ef1a ch\u1ecdn thay th\u1ebf, v\u00e0 th\u1ef1c t\u1ebf l\u00e0 m\u1ed9t s\u1ed1 h\u1ea1n ch\u1ebf \u00e1p d\u1ee5ng cho n\u00f3 kh\u00f4ng n\u00ean c\u1ea3n tr\u1edf vi\u1ec7c s\u1eed d\u1ee5ng n\u00f3.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\">K\u1ebft lu\u1eadn<\/h2>\n\n\n<p>Tr\u01b0\u1edbc khi tham gia v\u00e0o b\u1ea5t k\u1ef3 ho\u1ea1t \u0111\u1ed9ng n\u00e0o tr\u00ean M\u1ea1ng TOR, \u0111i\u1ec1u quan tr\u1ecdng l\u00e0 ph\u1ea3i xem x\u00e9t c\u1ea9n th\u1eadn t\u1ea5t c\u1ea3 c\u00e1c t\u00f9y ch\u1ecdn thay th\u1ebf. M\u1eb7c d\u00f9 s\u1ef1 \u1ea9n danh v\u00e0 quy\u1ec1n ri\u00eang t\u01b0 do TOR cung c\u1ea5p l\u00e0 v\u00f4 song, b\u1ea3n ch\u1ea5t m\u00e3 ngu\u1ed3n m\u1edf c\u1ee7a n\u00f3 c\u00f3 th\u1ec3 khi\u1ebfn n\u00f3 tr\u1edf th\u00e0nh m\u1ed9t l\u1ef1a ch\u1ecdn k\u00e9m tin c\u1eady h\u01a1n cho vi\u1ec7c s\u1eed d\u1ee5ng chuy\u00ean nghi\u1ec7p. N\u1ebfu b\u1ea1n th\u00f4ng th\u1ea1o c\u00f4ng ngh\u1ec7 internet v\u00e0 duy\u1ec7t web, c\u1ed9ng \u0111\u1ed3ng v\u00e0 nh\u1eefng huy\u1ec1n tho\u1ea1i xung quanh TOR kh\u00f4ng n\u00ean l\u00e0 m\u1ed1i quan t\u00e2m. Tuy nhi\u00ean, n\u1ebfu b\u1ea1n kh\u00f4ng quen thu\u1ed9c v\u1edbi nh\u1eefng c\u00f4ng ngh\u1ec7 n\u00e0y, n\u00ean c\u00e2n nh\u1eafc nh\u1eefng y\u1ebfu t\u1ed1 n\u00e0y tr\u01b0\u1edbc khi s\u1eed d\u1ee5ng TOR.<\/p>","protected":false},"excerpt":{"rendered":"<p>Tr\u00ecnh duy\u1ec7t TOR (The Onion Router) \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng r\u1ed9ng r\u00e3i cho ng\u01b0\u1eddi d\u00f9ng tr\u1ef1c tuy\u1ebfn t\u00ecm ki\u1ebfm s\u1ef1 ri\u00eang t\u01b0 v\u00e0 \u1ea9n danh. \u0110\u01b0\u1ee3c ph\u00e1t tri\u1ec3n b\u1edfi B\u1ed9 ph\u1eadn nghi\u00ean c\u1ee9u H\u1ea3i qu\u00e2n Hoa K\u1ef3 v\u00e0o gi\u1eefa nh\u1eefng n\u0103m 90, m\u1ea1ng TOR \u0111\u1ecbnh tuy\u1ebfn\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/an-danh-truc-tuyen\/tor-trinh-duyet\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">TOR: C\u00e2n b\u1eb1ng quy\u1ec1n ri\u00eang t\u01b0 v\u00e0 b\u1ea3o m\u1eadt trong b\u1ed1i c\u1ea3nh k\u1ef9 thu\u1eadt s\u1ed1 ng\u00e0y nay<\/span><\/a><\/p>","protected":false},"author":4,"featured_media":1327,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[33,34,35],"class_list":["post-1836","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-anonymity-online","tag-anonymity","tag-political-subject","tag-tor","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Stay Anonymous Online with Tor VPN | Security Briefing<\/title>\n<meta name=\"description\" content=\"Stay safe and secure while browsing the internet with the anonymity provided by Tor VPN. Discover the benefits of using Tor VPN.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/an-danh-truc-tuyen\/tor-trinh-duyet\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stay Anonymous Online with Tor VPN | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Stay safe and secure while browsing the internet with the anonymity provided by Tor VPN. Discover the benefits of using Tor VPN.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/an-danh-truc-tuyen\/tor-trinh-duyet\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-01T20:28:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"574\" \/>\n\t<meta property=\"og:image:height\" content=\"294\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alessandro Mirani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alessandro Mirani\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/\"},\"author\":{\"name\":\"Alessandro Mirani\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/223f15fc2ffff8f95cd1f3faa3c422d2\"},\"headline\":\"TOR: Balancing Privacy and Security in Today&#8217;s Digital Landscape\",\"datePublished\":\"2023-02-01T20:28:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/\"},\"wordCount\":1301,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg\",\"keywords\":[\"Anonymity\",\"Political Subject\",\"TOR\"],\"articleSection\":[\"Anonymity online\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/\",\"url\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/\",\"name\":\"Stay Anonymous Online with Tor VPN | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg\",\"datePublished\":\"2023-02-01T20:28:08+00:00\",\"description\":\"Stay safe and secure while browsing the internet with the anonymity provided by Tor VPN. Discover the benefits of using Tor VPN.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg\",\"width\":574,\"height\":294,\"caption\":\"TOR Balancing Privacy and Security in Today's Digital Landscape\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TOR: Balancing Privacy and Security in Today&#8217;s Digital Landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/223f15fc2ffff8f95cd1f3faa3c422d2\",\"name\":\"Alessandro Mirani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cc902d0ba95f7eaadf8581d353dcdfe4f1a1dd3e219cda1a3c3666cfe139d887?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cc902d0ba95f7eaadf8581d353dcdfe4f1a1dd3e219cda1a3c3666cfe139d887?s=96&d=mm&r=g\",\"caption\":\"Alessandro Mirani\"},\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/alessandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gi\u1eef \u1ea9n danh tr\u1ef1c tuy\u1ebfn v\u1edbi Tor VPN | T\u00f3m t\u1eaft b\u1ea3o m\u1eadt","description":"Lu\u00f4n an to\u00e0n v\u00e0 b\u1ea3o m\u1eadt khi duy\u1ec7t internet v\u1edbi t\u00ednh n\u0103ng \u1ea9n danh do Tor VPN cung c\u1ea5p. Kh\u00e1m ph\u00e1 nh\u1eefng l\u1ee3i \u00edch khi s\u1eed d\u1ee5ng Tor VPN.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/an-danh-truc-tuyen\/tor-trinh-duyet\/","og_locale":"vi_VN","og_type":"article","og_title":"Stay Anonymous Online with Tor VPN | Security Briefing","og_description":"Stay safe and secure while browsing the internet with the anonymity provided by Tor VPN. Discover the benefits of using Tor VPN.","og_url":"https:\/\/securitybriefing.net\/vi\/an-danh-truc-tuyen\/tor-trinh-duyet\/","og_site_name":"Security Briefing","article_published_time":"2023-02-01T20:28:08+00:00","og_image":[{"width":574,"height":294,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg","type":"image\/jpeg"}],"author":"Alessandro Mirani","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"Alessandro Mirani","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"6 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/"},"author":{"name":"Alessandro Mirani","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/223f15fc2ffff8f95cd1f3faa3c422d2"},"headline":"TOR: Balancing Privacy and Security in Today&#8217;s Digital Landscape","datePublished":"2023-02-01T20:28:08+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/"},"wordCount":1301,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg","keywords":["Anonymity","Political Subject","TOR"],"articleSection":["Anonymity online"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/","url":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/","name":"Gi\u1eef \u1ea9n danh tr\u1ef1c tuy\u1ebfn v\u1edbi Tor VPN | T\u00f3m t\u1eaft b\u1ea3o m\u1eadt","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg","datePublished":"2023-02-01T20:28:08+00:00","description":"Lu\u00f4n an to\u00e0n v\u00e0 b\u1ea3o m\u1eadt khi duy\u1ec7t internet v\u1edbi t\u00ednh n\u0103ng \u1ea9n danh do Tor VPN cung c\u1ea5p. Kh\u00e1m ph\u00e1 nh\u1eefng l\u1ee3i \u00edch khi s\u1eed d\u1ee5ng Tor VPN.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/TOR-Balancing-Privacy-and-Security-in-Todays-Digital-Landscape-1.jpg","width":574,"height":294,"caption":"TOR Balancing Privacy and Security in Today's Digital Landscape"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/anonymity-online\/tor-browser\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"TOR: Balancing Privacy and Security in Today&#8217;s Digital Landscape"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/223f15fc2ffff8f95cd1f3faa3c422d2","name":"Alessandro Mirani","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cc902d0ba95f7eaadf8581d353dcdfe4f1a1dd3e219cda1a3c3666cfe139d887?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cc902d0ba95f7eaadf8581d353dcdfe4f1a1dd3e219cda1a3c3666cfe139d887?s=96&d=mm&r=g","caption":"Alessandro Mirani"},"url":"https:\/\/securitybriefing.net\/vi\/author\/alessandro\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1836","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=1836"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1836\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/1327"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=1836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=1836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=1836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}