Time
1 hour 55 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:07
Hello Peoples of the Interwebs. This is Tim Stover, and welcome to the next video on our comprehensive guide to the tour browser.
00:16
On this episode, we're comparing the Tor browser to Firebox.
00:21
Before we get my father into this course, Let's look over the pre Rex.
00:25
There aren't any
00:26
this did you? Is the final one of the fire box. Probably Detour Tour versus Firebox. This is your first video with me. Welcome aboard.
00:35
I would recommend going back and watching the previous videos, though, as I feel a great setup where we are now.
00:43
As you can read here. Basic networking is a plus, but not required. Also, you basically just have a need and Ori want me not online, especially since eyes, peas or Internet service providers Ken Log and will lock all that you are doing.
01:00
Student. The fact we're in discussions now of the Deep Web Dark Lab, Dark Net. I'm going to give you the proper schools, teach you how to use that
01:07
and advise on how to safely navigate the deep, dark Web dark.
01:11
With that said, This is not an endorsement of going there illegally. Your place of work or home,
01:18
nor Unfortunately, if anything should happen to you, their equipment or any other possessions is library or myself liable. Please be careful.
01:26
Okay, so we played with Fire Fox and tour a bit. Now
01:30
it's time to compare the two side by side
01:34
on a top five. Best private Web browser from Life Wire
01:38
Tour came in first so closely by a fire Fox in third place.
01:42
Brave. Beat it out by a slim margin. Braves a browser I may need to look into.
01:48
What do you all think?
01:49
All right. Toure has been around for a long time. Mid nineties. Remember our history?
01:53
It is why he trusted as leader of privacy and security. It could be installed on all major platforms enjoyed uses. Orbach tour
02:02
iPhone, iPad, Onion browsers as well as on the USB stick.
02:07
It works on a system of relays, really pills back a layer of security and sends a request to the next relay. Due to this system of relays, speeds can suffer a bit. But
02:17
as more and more people used for more relays pop up, allowing speeds to increase,
02:23
you can also use dot onion sites or clear websites. Either way
02:28
runs on a modified and customized firebox code base
02:31
like a second cousin kind of a thing,
02:35
but does not need extensions. Plug. It's like fire boxwood.
02:40
All right now for Firefox, one of the oldest and most well established browsers. Also available for all major platforms. Windows Max, Android, IOS.
02:52
You made it just in time, adjusting settings for privacy tracking and clear history,
02:58
whose private browsing by default and, it said,
03:00
a bit of a hit against there.
03:04
Firefox does allow extensions, which can up the privacy factor using privacy. Badger you block origin
03:09
https everywhere. But then again, this is all customizing and not default out of the box where you go like torque. And
03:20
so in conclusion, Firefox is more popular but does have some weaknesses. Talked about how they're moving towards a non plug and needed browser, but currently they aren't there yet. It needs begins to keep it secure, and while having such a customized ability is great, it adds complexity your normal person won't know or may not want to deal with. So
03:40
I'm basing this on default browser insulation. My money's on using Tor browser for anonymity, security and privacy. I'll take the hit on speed for left. As Tor browser becomes more and more popular, you are going to see the speed increase.
03:55
Final word here is using both. Put your plug into the firebox and don't plug in anything to tour and goes for the Web's safely.

Up Next

Guide to the Tor Browser

This is a comprehensive Tor course including, but not limited to: major misconceptions, installation, history, strengths and weaknesses, discussions on onion addresses, and ending on a comparison of the Deep Web and Dark Web.

Instructed By

Instructor Profile Image
Tim Stover
Cybersecurity Research Analyst
Instructor