Description
Justification
Tor has complex security tradeoffs, and isn't a good recommendation for everyone.
On the up side, it hides your traffic from your wifi operator or ISP. On the downside, traffic eventually exits through an exit node who is completely unknown and unaccountable to you, and this exit node can both inspect and modify the traffic.
So as a baseline, Tor is a good choice for people who would rather roll the dice in trusting anyone in the world than trust their local network. That might be the case for criminals, political dissidents or people suffering domestic abuse, but it doesn't seem like the right tradeoff for the majority of users, who have a not-actively-hostile commercial ISP.
You say, and I would agree, that you should be careful in connecting to public wifi, because it may conduct active or passive attacks. But very similar problems apply to using Tor, with perhaps less obvious benefit.
As well as the performance impact, one should also consider:
- a possible false sense of security if information leaks through DNS or other programs
- Tor-supporting browsers might lag behind the upstream Firefox or Chromium in fixing security bugs
- whether using a browser with Tor built in or a separate proxy, you have a larger trusted software base
Activity